Rcarter: analyzing network protocols is hardly illegal, and show me any text that implied that Mistress
was intending any kind of unauthorized service theft. Until you can demonstrate intent to harm,
knock off the alarmism.
_H*
Not sure what you are asking:Tesla is networked bound through it’s supercharger network by online or not?
If not then I apologize.
Why waste countless thousands of dollars on a pointless modification. Just get the adapter whenever it comes out.
Even if you switch over the port on your car today, you still wouldn't be able to charge on the supercharger network. Tesla will know that a hacked car is trying to access the network. It's difficult for salvaged teslas to charge on the supercharger network, if they even charge at all. I have no idea how you would clone a tesla account and it not raise an alarm in the system either - a third party tesla to ccs adapter hasn't been made for a reason.
You are basically asking how to do something that will ultimately turn your car into a brick. It doesn't make sense. If you are that desperate to get onto the tesla network, just sell your niro and buy a tesla or be patient and wait for the tesla to ccs adapter when it gets made by tesla.
I recommend: https://en.wikipedia.org/wiki/OSI_model
I would defer to any recommendations from @hobbit or the OBD scanning tool builders.
- Physical layer - just buy parts from eBay
- Data link layer - there are reports it is CAN bus but also mixed with J1772 protocol. I would start with a digital oscope to identify protocol and get a microprocessor with appropriate interface.
- Network layer - you'll need to identify the communication frames (i.e., packets.) From this point, you'll need a SuperCharger enabled Tesla to 'wire tap' the communications and record sessions. You'll also need a network bus analyzer, or build one, to capture sessions to support reverse engineering.
- Transport layer - it may need to reach from the car back to servers using SuperCharger as a repeater or router.
- Session layer - how your vehicle and equipment identifies itself to the SuperCharger network. I would expect a VIN and potentially password and/or encryption keys. Some of them can be 'difficult.'
- Presentation layer - setup communications to share battery and charger status
- Application layer - when charging voltage and current pass from SuperCharger to vehicle
Bob Wilson
lol. Suit yourself. You'll spend thousands and your car will be a brick.Go away