Summary of Why American Farmers Are Hacking Their Tractors with Ukrainian Firmware

Looking for the article?
We have the summary! Get the key insights in just 5 minutes.

Why American Farmers Are Hacking Their Tractors with Ukrainian Firmware summary
Start getting smarter:
or see our plans

Rating

7 Overall

8 Importance

7 Innovation

7 Style

Recommendation

A farmer has always been a jack of all trades, but now American farmers are adding an unexpected skill to their repertoire: hacking. In a dispute that pits equipment maker John Deere against customers who insist on their right to maintain and modify their own machines, farmers are learning to hack their own tractors using pirated software purchased on the Eastern European black market. Journalist Jason Koebler uncovers the dark side of tractor software, whereby American farmers purchase pirated firmware to bring home the bacon. getAbstract recommends this article to anyone interested in intellectual property, farming and stories of resistance to corporate power.

In this summary, you will learn

  • How tractor manufacturers like John Deere are making life difficult for farmers,
  • Why farmers feel their sovereignty is under attack and
  • Why farmers in America’s heartland are adding hacking to their job description.
 

About the Author

Jason Koebler is a senior staff writer at Motherboard and has written on science and technology for The Atlantic, The Washington Post and U.S. News & World Report.

 

Summary

John Deere – one of America’s most iconic tractor manufacturers – is putting farmers in a bind. In the past, if your tractor broke down, you rolled up your sleeves, got your hands dirty and fixed the problem yourself. This wasn’t just a matter of pride but one of necessity: With farms often located many miles away from the next dealership, you risked losing entire harvests by waiting for a technician to come out and repair the problem. But today, things are different. Embedded software and license agreements mean that any fixes farmers perform themselves are “unauthorized.”

Get the key points from this article in 10 minutes.

For you

Find the right subscription plan for you.

For your company

We help you build a culture of continuous learning.

 or log in

Comment on this summary

More on this topic

Customers who read this summary also read

More by category