{"id":16722,"date":"2017-03-29T21:30:18","date_gmt":"2017-03-30T02:30:18","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=16722"},"modified":"2017-03-29T21:30:18","modified_gmt":"2017-03-30T02:30:18","slug":"why-american-farmers-are-hacking-their-tractors-with-ukrainian-firmware","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=16722","title":{"rendered":"Why American Farmers Are Hacking Their Tractors With Ukrainian Firmware"},"content":{"rendered":"<blockquote><p>Tractor hacking is growing increasingly popular because John Deere and other manufacturers have made it impossible to perform &#8220;unauthorized&#8221; repair on farm equipment, which farmers see as an attack on their sovereignty and quite possibly an existential threat to their livelihood if their tractor breaks at an inopportune time.<\/p><\/blockquote>\n<p>Source: <em><a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/why-american-farmers-are-hacking-their-tractors-with-ukrainian-firmware\">Why American Farmers Are Hacking Their Tractors With Ukrainian Firmware &#8211; Motherboard<\/a><\/em><\/p>\n<blockquote><p>A <a href=\"https:\/\/www.deere.com\/privacy_and_data\/docs\/agreement_pdfs\/english\/2016-10-28-Embedded-Software-EULA.pdf\" target=\"_blank\">license agreement John Deere required farmers to sign in October<\/a> forbids nearly all repair and modification to farming equipment, and prevents farmers from suing for &#8220;crop loss, lost profits, loss of goodwill, loss of use of equipment \u2026 arising from the performance or non-performance of any aspect of the software.&#8221;<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Tractor hacking is growing increasingly popular because John Deere and other manufacturers have made it impossible to perform &#8220;unauthorized&#8221; repair on farm equipment, which farmers see as an attack on their sovereignty and quite possibly an existential threat to their &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=16722\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33],"tags":[102,47,1405],"class_list":["post-16722","post","type-post","status-publish","format-standard","hentry","category-ip","tag-hacking","tag-monopolistic-practices","tag-right-torepair"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/16722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16722"}],"version-history":[{"count":1,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/16722\/revisions"}],"predecessor-version":[{"id":16723,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/16722\/revisions\/16723"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=16722"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=16722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}