Unlike software exploits that can be remotely patched, this hardware-based approach would make it more challenging for Tesla to revoke the exploit. The researchers suggest that Tesla would need physical access to the car, making it a more persistent threat.