Wow – straight from the Keg :
See the following page from O2’s servers :
(Click for larger)
The slogan “We’re better, connected” seems very appropriate just now.
From a official report in the UK into intercepts of email/SMS/phones :
Continue on to the original posting by clicking on the link to read all the fantastic comments :
Overheard at airport:
Posted on: July 30, 2009 7:21 PM, by Greg Laden
“Here,” dad to girl, “Get your ID out and have it with your ticket.”
“Excuse me, sir,” said the TSA officer, pointing to the young female, “She does not need to have her ID out, she’s a minor.”
Dad: “How do you know she’s a minor if you don’t look at her ID?”
…. (silence as everyone waits for answer)….
Dad again: “Kind of a hole in the system, isn’t it?”
TSA Officer, voice lowered … “There are a LOT of holes in the system, sir.” … walks away.
Young girl, “Good one, dad. Now tell her our name is LADEN and see what happens!”
[From Overheard at airport: : Greg Laden’s Blog]
The article pointed to here has a seriously good way of using a Arduino with Xbee’s to form a wireless service – and the software to make it all work :
Several months ago I released XBeeArduinoService. Since then I have been working on the next version. It’s now available and has a new name: Droplet.
Menu/Navigation: The first version relied on a dedicated button for each service. This worked but doesn’t scale well since you will quickly run out of buttons. Now it uses a menu to display the available services. Along with the menu are four buttons for navigation: Next, Previous, Select, and Escape.
[From rapplogic: Droplet]
Taken from our O2 ADSL router just now :
In excess of 2 Mbit/s upload speed!
Not bad at all.
Of course the 17 Mbit/s download speed is not too bad either.
This is scary – picking a lock and not leaving a electronic trace – in this case for a semi-electronic lock.
When security is based on the belief that anyone entering will leave a electronic trail I can see this leading to accusations against the users that have left a electronic trail, as quite clearly the lockpicker was “invisible”…
Bluzmanis demonstrated an attack by taking an Interactive CLIQ electro-mechanical lock made by Mul-T-Lock and inserting a mechanical-only key cut to the same keyway. After inserting the key, he does something to vibrate the key for a few seconds until the mechanical motor in the cylinder turns and lifts the locking element to release the lock. He asked Threat Level not to disclose the precise method, other than to say it involves no special tool or skill. “There’s no audit trail that the lock has been opened,” Tobias says, “because there are no electronics [involved].” If the attacker entered the room to steal documents or sabotage the facility, the last person who entered before him and who showed up in the audit log, would presumably get the blame if the thief wasn’t caught on surveillance camera or the video surveillance was also sabotaged. [From CLIQ and other “unpickable” locks pwned at DefCon]