No matter whether the HW4 is based on an x86 or ARM CPU, Linux has the strace that can be used by any admins or attackers to easily capture the password entered by victim to security software, such as ssh, gpg, you name it. I always said that if info can be secure, you must use the software that can give you true zero-trusted command execution environment, true zero-trusted privilege delegation software. Without the help from the right software, all security software is very vulnerable to system tools' attacks, info can hardly be secure. If you want to solve this problem, let me know.
A teardown and description of Tesla's upcoming Hardware 4 (HW4) computer has leaked online revealing improved Exynos SoCs, added camera connectors, and references to the new Phoenix radar. A new infotainment board that includes a custom AMD CPU and AMD GPU is also seen. The HW4 sports a completely different form factor, which means it cannot be retrofitted into current Tesla cars.