Better Shelter is a groundbreaking example of collaboration, technical innovation and practical application. The shelter has been put to the test by some of the world's most exposed families, and their experiences and needs lie at the heart of the development process.
Sunday, March 29, 2015
Wednesday, March 25, 2015
|This is a whole PC. ~$50 retail. WiFi and Bluetooth included.|
Or if you wanted to seed an area with wi-fi coverage you could make up a bunch of them and stick them on lamp posts. Use a Pringles can antenna for extra distance coverage and the can is the biggest part of the thing.
Put two of them miles apart and communicate via laser.
Detect deer in the back yard by radar and squirt water at them.
All kinds of things you want a PC for, you can do in a matchbox run off a 9V battery. For CHEAP.
Update: Welcome Rifleman's Journal readers! Consider building a bunch of these: Pirate Box. Never know when a little bit of anonymous file sharing capability might come in handy. Make it out of an Intel Edison and then tell EVERYBODY how you did it, I don't think its been done yet.
The proof-of-concept attack requires both systems to first be compromised with malware. And currently, the attack allows for just eight bits of data to be reliably transmitted over an hour—a rate that is sufficient for an attacker to transmit brief commands or siphon a password or secret key but not large amounts of data. It also works only if the air-gapped system is within 40 centimeters (about 15 inches) from the other computer the attackers control. But the researchers, at Ben Gurion's Cyber Security Labs, note that this latter scenario is not uncommon, because air-gapped systems often sit on desktops alongside Internet-connected ones so that workers can easily access both.
Currently the hack can be defeated just by moving one of them to the other side of the desk. But the very idea that you can transfer even small amounts of data like this is amazing. Previously it didn't matter what kind of malware your computer was infested with, if you unplugged the network you were safe from intrusion. Now, not so much.
Imagine what the guys who do this for a living have come up with these last 25 years.
Personally I think the venerable typewriter is too hack prone, everything you type is recorded on the ribbon, don't forget. I'm going back to a pencil and paper for all my world domination plans. Inside a Faraday cage. In the cellar. Burn before reading.
Monday, March 16, 2015
I've posted about this thing many, many times before. Everybody knows about it, some guys even built one and stuck it in a model airplane. There's Instructables on YouTube how to make one. But this StingRay remains a super secret as far as officials are concerned.
The issue led to a public dispute three weeks ago in Silicon Valley, where a sheriff asked county officials to spend $502,000 on the technology. The Santa Clara County sheriff, Laurie Smith, said the technology allowed for locating cellphones — belonging to, say, terrorists or a missing person. But when asked for details, she offered no technical specifications and acknowledged she had not seen a product demonstration.
Buying the technology, she said, required the signing of a nondisclosure agreement.
"So, just to be clear," Joe Simitian, a county supervisor, said, "we are being asked to spend $500,000 of taxpayers' money and $42,000 a year thereafter for a product for the name brand which we are not sure of, a product we have not seen, a demonstration we don't have, and we have a nondisclosure requirement as a precondition. You want us to vote and spend money," he continued, but "you can't tell us more about it."
The technology goes by various names, including StingRay, KingFish or, generically, cell site simulator. It is a rectangular device, small enough to fit into a suitcase, that intercepts a cellphone signal by acting like a cellphone tower.
Are YOU a Climate Change Denier? Big Brother wants to know, and is more than happy to subvert your phone so he can listen to you in real-time, so as to gather evidence of your Denial.
For the third time in the last few years, Al Gore, founder and chairman of the Climate Reality Project, spoke at the festival on Friday. Naturally, his interactive discussion focused on addressing the climate crisis. The former vice president focused on the need to "punish climate-change deniers, saying politicians should pay a price for rejecting 'accepted science,'" said the Chicago Tribune.
Gore said forward-thinking investors are moving away from companies that invest in fossil fuels and towards companies investing in renewable energy. "We need to put a price on carbon to accelerate these market trends," Gore told the Chicago Tribune, referring to a proposed federal cap-and-trade system that would penalize companies that exceeded their carbon-emission limits. "And in order to do that, we need to put a price on denial in politics."
Or just to get any pics of babes in yoga pants that you may have on there. Big Brother don't pay for pr0nz.
Wednesday, March 04, 2015
Yes, simply recording every packet on the internet is not enough. Big Kahunas in the US government want a backdoor into your smart-phone and desktop PC. Like, a hardware one.
Technology companies are scrambling to fix a major security flaw that for more than a decade left users of Apple and Google devices vulnerable to hacking when they visited millions of supposedly secure Web sites, including Whitehouse.gov, NSA.gov and FBI.gov.
The flaw resulted from a former U.S. government policy that forbade the export of strong encryption and required that weaker "export-grade" products be shipped to customers in other countries, say the researchers who discovered the problem. These restrictions were lifted in the late 1990s, but the weaker encryption got baked into widely used software that proliferated around the world and back into the United States, apparently unnoticed until this year.
Researchers discovered in recent weeks that they could force browsers to use the weaker encryption, then crack it over the course of just a few hours. Once cracked, hackers could steal passwords and other personal information and potentially launch a broader attack on the Web sites themselves by taking over elements on a page, such as a Facebook "Like" button.
The problem illuminates the danger of unintended security consequences at a time when top U.S. officials, frustrated by increasingly strong forms of encryption on smartphones, have called for technology companies to provide "doors" into systems to protect the ability of law enforcement and intelligence agencies to conduct surveillance.
Tuesday, March 03, 2015
Scientists studying rats in New York found the flea that carries the plague - the Oriental rat flea - hosting on some of the city's rat population, according to the study published Monday in the Journal of Medical Entomology.
Bubonic plague is infamous as one of the most devastating pandemics in world history, known as the Black Death. During the 14th Century, the plague killed between 25 million and 50 million people in Europe.Before panic ensues, it must be noted that researchers found no trace of the plague or typhus – another disease carried by the Oriental rat flea – in any of the fleas they sampled.
Friday, February 27, 2015
|Love him or hate him, at least we were warned.|
Dallas Mavericks owner and investor Mark Cuban predicted that proposed FCC Internet regulations will end up impacting TV and "your TV as you know it is over" on Thursday's "Squawk Alley" on CNBC.Meaning that if they want to, the FCC could be applying "decency standards" to your personal shit on Apple iCloud. And sending the cops around for a chat if they feel the need.
Cuban began by predicting "the courts will rule the Internet for the next however many years." He then explained, "let's just take it all the way through its logical conclusion. All bits are bits, all bits are equal. If all bits are equal, then let's look at what a stream bit is an example. So when Henry and I do an interview, and it's streamed lived on the Internet, there's a camera, it goes through an encoder, it sends it out via server or some manner to the Internet, you click on Business Insider and you watch the stream, right? Now, let's look at CNBC on Comcast. There's cameras right in front of you, they go through a switcher, they go through an encoder, it's put through a server, it goes to Comcast, and it's streamed in a managed service environment to television. It's the exact same thing. And if it's the exact same thing technologically and all bits are equal, then why shouldn't CNBC and all TV networks that are delivered on cable, and Telco, and fiber like Verizon, why shouldn't they be part of the open Internet as well? And if they are and all bits are equal, now, let's take it one step further. It's the purview of the FCC now. The FCC, right? So, the FCC now has to apply their same standards to content, don't they, that they do to television content because that's where it is and there's going to be certain citizens who think 'well now, since all content is delivered over the Internet because all bits are bits, and it's a fair, and open, and equal Internet — decency standards.' And remember the FCC is the same agency that fought Nipplegate for eight years over a wardrobe malfunction."
He added, "your TV as you know it is over."
That most likely won't happen this week because its far too quick a change. They'll ease into it over the course of a few years, after a couple billion dollars worth of lawsuits grind their way through the courts. But, I predict that the days of carrying your smartphone around everywhere and sharing pics of your dinner on Facebook are now officially numbered.
I do believe I said this was going to happen waaaaaay back in 2008, but everybody said "Noooo, that can't happen here! This is a civilized country." Problem is, that's wrong. It can happen here. It just did.
Germany and China were civilized countries too, my friends. Look what happened to them.