On Thu, 23 Jun 2005, Tyler Durden wrote:
How do you take out a bulldozer?
Anti-tank mine?
On Thu, 31 Mar 2005, Major Variola (ret) wrote:
At 10:08 PM 3/31/05 +0200, Eugen Leitl wrote:
government plan to insert remotely readable chips in American
passports, calling the chips [2]homing devices for high-tech
muggers,
So the market for faraday-cages for your passport will
On Thu, 10 Feb 2005, Tyler Durden wrote:
Well, I didn't say it would be easy. We'd definitely need to split up into
teams...one to handle the alarm systems,
Teamwork is essential here.
Maybe attract a lightning with a rocket on a wire[1], the induced current
will do the job with the sensors
On Thu, 4 Nov 2004 [EMAIL PROTECTED] wrote:
I recently violated the network user agreement (they packet-sniffed and
got the username/password for my FTP server and didn't like what I was
sharing with myself) and was informed by the admin that I am now 'under
observation' and that they hope
On Tue, 19 Oct 2004, James A. Donald wrote:
The US government should expose and condemn these objectionable
practices, subvert moderately objectionable regimes, and
annihilate more objectionable regimes. The pentagon should
deprive moderately objectionable regimes of economic resources,
On Mon, 18 Oct 2004, James A. Donald wrote:
a. The probability ratios don't work out so that the
overwhelming majority of people you throw off planes are
innocent.
Provided the number of people you throw off planes is rather
small, I don't see the problem.
It isn't a problem for
On Mon, 18 Oct 2004, James A. Donald wrote:
Thomas Shaddack wrote:
It isn't a problem for you until it happens to you. Who knows
when being interested in anon e-cash will become a ground to
blacklist *you*.
I know when it will happen. It will happen when people
interested in anon
On Mon, 18 Oct 2004, James A. Donald wrote:
Sadre protected himself with Iraqi women and young children as
human shields, showing that he expected the Pentagon to show
more concern for Iraqi lives than he did.
Pentagon protects their people by distance - being it by bombing from high
On Sun, 17 Oct 2004, James A. Donald wrote:
--
James A. Donald:
If you really look like the shoe bomber, then you
should have to drive, or use public transport.
Thomas Shaddack
Ever tried to drive to Europe? Or to Hawaii?
Hard biscuit
Do I interpret this statement
On Sat, 16 Oct 2004, James A. Donald wrote:
If you really look like the shoe bomber, then you should have to
drive, or use public transport.
Ever tried to drive to Europe? Or to Hawaii?
Why airplanes don't count as a form of public transport?
So by that rationale, every Arab should
On Thu, 7 Oct 2004, Sunder wrote:
So the cops and RFID h4x0rZ can know your true name from a distance. and
since RFID tags, are what, $0.05 each, the terrorists and ID
counterfitters will be able to make fake ones too... Whee!
Given the power requirements for doing anything more than dumb
On Sun, 3 Oct 2004, J.A. Terranson wrote:
(1) There are also a number of non-rebar+concrete walls in place to keep
US citizens from leaving;
Please elaborate?
On Thu, 16 Sep 2004, Major Variola (ret) wrote:
At 02:17 PM 9/16/04 -0700, Joe Touch wrote:
Except that certs need to be signed by authorities that are trusted.
Name one.
You don't have to sign the certs. Use self-signed ones, then publish a GPG
signature of your certificate in a known
On Tue, 14 Sep 2004, Major Variola (ret) wrote:
How about Iran stating that they're messing with UF6, when Israel[1] is
a known pre-emptive bomber of Facilities to the East? That's pretty
much tickling the dragon.
Maybe they are playing a different game. They couldn't use the eventually
On Wed, 15 Sep 2004, Ian Grigg wrote:
The whole point of the CA model is that there is no prior
relationship and that the network is a wild wild west sort
of place - both of these assumptions seem to be reversed
in the backbone world, no? So one would think that using
opportunistic
On Sun, 12 Sep 2004, J.A. Terranson wrote:
No big deal? Who are they kidding?
A 2-mile wide cloud is WAY too big to be caused by a single explosion,
unless REALLY big. The forest fire claim sounds more plausible in this
regard. An existing cloud could be used for masking, though.
But a
On Sun, 12 Sep 2004, R. A. Hettinga wrote:
From: Adam Back [EMAIL PROTECTED]
Subject: Re: anonymous IP terminology (Re: [anonsec] Re: potential new IETF
At ZKS we had software to remail
MIME mail to provide a pseudonymous email. But one gotcha is that
mail clients include MIME boundary
On Fri, 3 Sep 2004, Major Variola (ret) wrote:
Just heard Clinton's going in the hospital to get a heart.
Clinton was a victim of an assassination attempt by junk food.
McQaeda, the cardiovascular terrorist organization endangering the
Developed World and deemed responsible for millions
On Sun, 29 Aug 2004, Thomas Shaddack wrote:
Question for the crowd: How difficult it would be to write a suitable
crypto engine as a plug-in module for FUSE itself? Then we could have
support for encrypted files on any filesystem accessible through FUSE.
---
http
On Fri, 3 Sep 2004, Adam Back wrote:
Don't know anything about EncFS, but you could also use loopback
encryption on top of gmailfs. Just make a large file in gmail fs, and
make a filesystem in it via loopback virtual block device-in-a-file.
According to the shards of knowledge about GmailFS
I hereby suggest to postpone the flamewars for the winter, when the
weather brings the need of some spare waste heat.
I thought we're above name-calling here. But perhaps it was just a quiet
period and the current situation will rectify on its own in couple days,
as it usually does.
Besides,
On Sat, 14 Aug 2004, Major Variola (ret) wrote:
Argh. You misunderstood me. I don't want to find hash collisions, to
create a false known hash - that is just too difficult. I want to make
every file in the machine recognized as unidentifiable.
No, I understood this. In a later post it was
On Fri, 13 Aug 2004, Major Variola (ret) wrote:
Even if you map a particular hash into one of a million known-benign
values, which takes work, there are multiple orthagonal hash algorithms
included on the NIST CD. (Eg good luck finding values that collide in
MD5 SHA-1 SHA-256
On Sat, 14 Aug 2004, Thomas Shaddack wrote:
polymorphic or encrypted, but then they would be in the unknown
category, along with user-created files. And programs :-) To be
manually inspected by a forensic dude.
Run a tool for signature changing preemptively, on *all* the files
Can somebody record it in MPEG or DivX, please? :) It's difficult to get
ABC News across the Atlantic without a dish.
On Thu, 12 Aug 2004, R. A. Hettinga wrote:
There's a teaser for tonight's 6:30 news about a wesite that publishes
pipeline maps and the names and addresses of government
On Fri, 13 Aug 2004, Sunder wrote:
If you're suspected of something really big, or you're middle eastern,
then you need to worry about PDA forensics. Otherwise, you're just
another geek with a case of megalomania thinking you're important enough
for the FedZ to give a shit about you.
In
On Fri, 13 Aug 2004, Tyler Durden wrote:
And it seems to me to be a difficult task getting ahold of enough photos
that would be believably worth encrypting.
Homemade porn?
On Fri, 13 Aug 2004, Major Variola (ret) wrote:
Any jpg which looks like noise will be of interest. And any stego
program will make them look at your images (etc) more closely :-)
Most of the programs they've hashed is so the forensic pigs can discount
them. But they would find
On Wed, 11 Aug 2004, Major Variola (ret) wrote:
Obvious lesson: Steganography tool authors, your programs
should use the worm/HIV trick of changing their signatures
with every invocation. Much harder for the forensic
fedz to recognize your tools. (As suspicious, of course).
It should be
On Mon, 9 Aug 2004, John Young wrote:
Excerpt below from a Baltimore Sun article of August 8, 2004.
Some of it could be true, but.
http://cryptome.org/dirnsa-shift.htm
I think the correct title would be sidesteps instead of overcomes.
It's a fundamentally different way (though the result is
On Tue, 10 Aug 2004, Pete Capelli wrote:
Being still currently undecided myself (although living in one of the
32 or so 'pre-ordained' states) I found this speech to be most
cynical, opportunistic, divisive, and un-American ones I've listend
to in awhile.
Define un-American, please?
On Wed, 4 Aug 2004, Hal Finney wrote:
As you can see, breaking 128 bit keys is certainly not a task which is
so impossible that it would fail even if every atom were a computer.
If we really needed to do it, it's not outside the realm of possibility
that it could be accomplished within 50
On Wed, 28 Jul 2004, Dave Howe wrote:
Particularly disgusted by the last paragraph
| With encryption comes the problem of either managing public/private
| keys, which must be kept secret, or the annoyance of transmitting a
| secure key to a remote party over other secure methods.
On Mon, 19 Jul 2004, James A. Donald wrote:
As I predicted, transactions are increasingly going on line.
And as Hettinga predicted, the more anonymous and irreversible the
transaction service, the cheaper and more convenient its services.
All happening as predicted.
So why don't we
On Thu, 22 Jul 2004, Major Variola (ret) wrote:
My point is only that they will be killed should they leak their
actual capabilities.
Well... I am reading a book about intelligence now. Specifically, Ernst
Volkman: Spies - the secret agents who changed the course of history.
Amusing book;
On Tue, 20 Jul 2004, Justin wrote:
HOUSTON (Reuters) - Law enforcement officials said on Monday they are
looking for a man seen taking pictures of two refineries in Texas City,
Texas.
How difficult it is to wait for a sunny day, wire a digital camera to take
two pictures per second with
Thermal imaging is a very powerful and very cool technology with many many
applications in both security and engineering. However, the main obstacle
for its wider usage in civilian sector is very high cost of the
microbolometer array sensors.
However, there are affordably cheap remote
The laser diodes used in eg. CD players have a feedback photodiode,
sensing the laser's optical output.
If the lasers used for optical fibers have similar mechanism too, and if
the diode is sensitive to the light coming to it not only from the chip
but also from the fiber itself, and can
On Fri, 16 Jul 2004, Major Variola (ret) wrote:
Um, even the small form factor PC on a board the size of your palm may
still rely on caps in the power supply that don't handle 760 to 0 mm
Hg/min so readily.
However, if you use a low-power board, you have less current to filter the
ripples
On Sat, 17 Jul 2004, Tyler Durden wrote:
Sorry to need educating once again, but I had assumed can-shaped capacitors
were gone from laptops in lieu of surface mount. Anyone know? (I don't own a
laptop.)
The can caps can be surface-mounted as well. The leads then look
different, but the
On Sat, 17 Jul 2004, Steve Schear wrote:
How about building a secure cell phone using GnuRadio as a core? That way you
have maximum control afforded by the protocols.
Several reasons valid at this moment (though I suppose (and hope) the
situation will improve in next couple years).
There is
On Sun, 18 Jul 2004, Bill Stewart wrote:
If you're trying to build a usable cellphone,
you've got much more stringent design criteria than a deskphone.
I am painfully aware of it.
You've got packaging requirements that force you into
serious industrial design if you want something
On Fri, 16 Jul 2004, Major Variola (ret) wrote:
Does anyone *know* (first or second hand, I can speculate myself) which
laptops, if any, can safely go to zero air pressure (dropping from 1 atm
to 0 in, say, 1 minute.)
Sorry so late ---but your can-shaped capacitors might not handle the
On Sat, 17 Jul 2004, Eric Murray wrote:
For a seperate project, does anyone know of a small linux-ready/able
box with ethernet?
Gumstix looks cool but I need hardwire networking.
Soekris, http://www.soekris.com/.
PXA255, http://www.hw-server.com/hw_products/sld_hws.html
Are there more,
On Tue, 13 Jul 2004, J.A. Terranson wrote:
Forwarded for amusement
http://www.cnn.com/2004/WORLD/americas/07/13/mexico.chip.reut/index.html
Mexico attorney general gets microchip implant
Politicians getting RFIDs.
Will it spur a new generation of smart roadside bombs, landmines, and
On Tue, 13 Jul 2004, Harmon Seaver wrote:
Bumazhkas? I thought I was pretty familiar with most weapons of the world,
but not Bumazhkas. What calibre are they? I've always liked those CZ Model 52
pistols and Model 32 subguns in .30Mauser. Loaded hot with a teflon coated
bullet they
On Sat, 10 Jul 2004 [EMAIL PROTECTED] wrote:
But we have a psychological mechanism here; many people tend to be
tough when not under direct threat. Then they implement the
mechanism. Then years flow by. Then the prosecutors come. But by then
it is too late to cooperate. They are doomed
On Fri, 9 Jul 2004, Steve Schear wrote:
This may best be accomplished by placing the data offshore and empowering the
db operators with some non-repudiatable right of disclosure (especially under
duress of a warrant).
This may be impractical in some cases.
Some months back I discussed a
On Thu, 8 Jul 2004, Major Variola (ret) wrote:
5. One could call terahertz hard RF in same way that hard x-rays
bleed into soft gammas. But calling anything hard implies danger,
and we mustn't scare the proles. Perhaps soft IR is better.
Technically, it's closer to soft IR. If I remember
cases. In the rest, I have to resort to telnet.
Thanks a lot. Seems I have to learn perl. Looks powerful.
On Thu, 8 Jul 2004, Justin wrote:
On 2004-07-08T17:50:57+0200, Thomas Shaddack wrote:
I cobbled up together a small bash shell script that does this. It lists
the MX records for a domain
On Fri, 9 Jul 2004, Steve Schear wrote:
Quite a few book stores (including the local Half-Priced Books) now keep no
records not required and some do not even automate and encourage their patron
to pay cash. In California book sellers to such used/remaindered stores must
identify themselves
I cobbled up together a small bash shell script that does this. It lists
the MX records for a domain, and then tries to connect to each of them,
issue an EHLO command, disconnect, then list the output of the server,
alerting if the server supports STARTTLS. It should be easy to further
query
A big database of images with metadata can be used to train a neural
network (or other suitable AI approach) to recognize unknown images.
On Thu, 8 Jul 2004, Tyler Durden wrote:
Yeah, but this is a metadata search, correct? Seems to me Our Protectors(TM)
are probably able to search a vast
On Tue, 6 Jul 2004, Major Variola (ret) wrote:
So, which is better, Schneier's books or Mitnick's? I suspect
the former, but am curious what the community opinion is?
You may like one side of the coin more than the other one, but they still
belong to the same flat, dirty, formerly shiny
Reading some news about the email wiretapping by ISPs, and getting an
idea.
There are various email forwarding services, which are nothing more than a
SMTP server with pairs of [EMAIL PROTECTED] --
[EMAIL PROTECTED]
Messages in storage have much lower judicial protection than messages in
On Tue, 6 Jul 2004, Hal Finney wrote:
There are various email forwarding services, which are nothing more than a
SMTP server with pairs of [EMAIL PROTECTED] --
[EMAIL PROTECTED]
Right, mostly for use as disposable email addresses. I've used
spamgourmet to good effect, myself.
I
Mass-sending of SMS messages in China is a popular channel of spreading
alternative, government-unsanctioned news. Used eg. by the Falun Gong
group, to spread the news about SARS, and probably in numerous other
cases. Some phones are even directly equipped with the functions to
automatically
On Sat, 3 Jul 2004, Major Variola (ret) wrote:
And digital edges are sharp, in the Ghz even when the clock is in the
Mhz.
How much do the spread spectrum clock feature on the modern motherboards
help here?
And boxes need ventilation slots.
Not necessarily. There are other ways of heat
On Sat, 3 Jul 2004, Major Variola (ret) wrote:
At 06:25 PM 7/3/04 +0200, Thomas Shaddack wrote:
automatically send SMS messages to a list of numbers. The government
already keeps statistics on number of messages sent at time period from
a single number, and alerts the officials when it's
On Sat, 26 Jun 2004, J.A. Terranson wrote:
a mikropower jammer,
Only if you are willing to forego the phone as well, in which case, just
remove the battery pack :-)
I am assuming here that the phone has a dual receiver, one of the GPS
signal and one of the cellular service itself. As both
On Sat, 26 Jun 2004, J.A. Terranson wrote:
Eventually the cellphones will be able to tell another phone approx
where they are. Remember the 911-locator fascism?
I hate to break the news to you Major, but GPS enabled phones cannot be
instructed to turn off the GPS feature for law
On Sat, 26 Jun 2004, Major Variola (ret) wrote:
I'm fully aware the pigs track you unless the battery is removed or you
have a TEMPEST case. I'm suggesting that regular citizens will have
access to that, if (in my cluelessness) they don't already.
If the phone is shielded, it can't
On Sun, 27 Jun 2004, Eugen Leitl wrote:
Triangulation by signal strength is one thing, triangulation by relativistic
ToF (time of flight) -- while still not present in consumer gadgets -- is far
more difficult to fool. Especially if it's tied into the protocol, that
you're getting position
On Sun, 27 Jun 2004, Riad S. Wahby wrote:
J.A. Terranson [EMAIL PROTECTED] wrote:
Interestingly, some [early] models had external antenna jacks built in to
them.
Many still have test jacks on them. Both my old Samsung A500 and my
current Sanyo SCP-8100 have a connector (either MC or
The best way to do this is to mount the narrow-angle dish *and* video camera on
the same mount, then use simple circuitry to superimpose white circle on the
center of the image when signal exceeds some threshold (or vary the size with
signal level.) The results could be startling.
You could
On Mon, 14 Jun 2004, R. A. Hettinga wrote:
I can't stop laughing. *This* is why the west will win.
They post their plans, in the clear.
It may be also a very cheap method of attack. Don't spend any money on
material nor people; just send out an attack documentation in the clear
and watch the
Exactly at which point does a war (any war) stop being defensive
because according to the history books the US has never fought an
aggressive war.
I prefer to think about the McDonald's paradox: No country that has a
McDonald's has attacked another. :-).
Then either the paradox is dead
On Thu, 27 May 2004, Roy M. Silvernail wrote:
It seems to me that you'd need a pretty big dish in orbit to get that kind
of resolution.
The Keyholes(?) are for microwaves, right?
Where better to put the big dish than in orbit? Clarke-belt birds are
separated by what, 10 km? So a 5 km
On Fri, 21 May 2004, Tyler Durden wrote:
Imagine I'm working for a large Fortune 100 Company. Now imagine I hear
about a sasser-like worm that will install atself and spread, BUT it has
been confirmed that the worm will proceed to vomit spam at X for a period
of 48 hours. Depend on X (eg,
On Tue, 18 May 2004, Tyler Durden wrote:
Monyk believes there will be a global market of several million users once
a workable solution has been developed. A political decision will have to
be taken as to who those users will be in order to prevent terrorists and
criminals from taking
I have a standard implementation of OpenSSL, with Diffie-Hellman prime in
the SSL certificate. The DH cipher suite is enabled.
Is it safe to keep one prime there forever, or should I rather
periodically regenerate it? Why? If yes, what's some sane period to do so:
day, week, month?
If the
RFID jamming should be very easy and a quite amusing DoS attack
on commercial targets. Easy because its not frequency hopping, low
power, and relatively low frequency. Particularly cute would be
transmitting sex-toy codes intermittently.
Considering the transmitting powers of the tags, an
the traffic flows through them): see
e.g. John Walker's analysis of the reasons that led him to abandon
SpeakFreely at http://www.fourmilab.ch/speakfree/ .
Thomas Shaddack suggested to leverage on Jabber, but:
1. Jabber uses TCP as transport, and therefore can't be efficiently used
On Wed, 28 Apr 2004, Tim Benham wrote:
I bet people would start voting after that.
If they don't, offer them two vials of crack!
It's already being done; it's called political promises. The candidates
are usually pretty high on that stuff.
What won't hurt could be making them liable for
For bright flashes of visible light, xenon flash tubes are the choice.
But when I want a really bright flash on about 800-900 nm, what approach
is the best?
One application is a security camera taking a snapshot without alerting
the adversary with a flash. (Could be a good system against
Yamamoto is also optimistic that this technique will find commercial
applications. Display of secret information on PDA and computer screens
are practical applications, he explained. Other business applications
include: securing the screen of a terminal at a bank; an operator screen
that
On Fri, 23 Apr 2004, A.Melon wrote:
Are there any publicly available documents that detail interrogation
protocols and what brainwave patterns and bloodflow look like during truth
telling and lying? Preferably something that gets into how to consciously
alter brainwave patterns and
On Sat, 24 Apr 2004, Bill Stewart wrote:
That's really overkill. Computers these days have enough
horsepower to run file system encryption in the CPU.
That's true, but it's possible to get access to the key in memory. Once
the machine is compromised, the keys are leaked.
It's true that when
Right, there are at least two workable solutions-
Hard drives with user alterable firmware. I surprised that none of the
major drive manufacturers seems to have thought about offering a version of
their controllers, for substantially more money, that offers this.
A retrofit device that
On Fri, 23 Apr 2004, John Kelsey wrote:
The obvious problem with multiple levels of passwords and data is: When
does the guy with the rubber hose stop beating passwords out of you?
After he gets one? Yeah, that's plausible, if he's convinced there's
only one. But once he's seen a second
On Fri, 23 Apr 2004, Major Variola (ret) wrote:
filesystems (etc) with layers of deniable stego.
Are there any decent implementations for Linux/BSD/NT?
I haven't looked recently. One property that such a FS or app should
have is that it is useful for something *else* besides stego duress
On Thu, 22 Apr 2004, Major Variola (ret) wrote:
At 12:09 PM 4/22/04 +0200, Eugen Leitl wrote:
Are you truly expecting a worldwide ban on encryption? How do you prove
somebody is using encryption on a steganographic channel?
Torture, of the sender, receiver, or their families, has worked
On Thu, 22 Apr 2004, Major Variola (ret) wrote:
However, it's not entirely reliable. At some point, the suspect tells
you what you want to hear, whether or not it is the truth, just so you
leave him alone. It can even happen that the suspect convinces himself
that what he really did what he
http://us.cnn.com/2004/TRAVEL/04/16/airline.behavior.ap/
http://www.usatoday.com/travel/news/2004-04-16-behaviorscan_x.htm
http://news.bostonherald.com/national/view.bg?articleid=1780
Carnival Booth, anyone?
Besides, it's matter of time until the checklists leak and the
adversaries adjust their
Thinking about something, I found an interesting problem. It is possible
to set up a reputation-based system with nyms, where every nym is an
identity with attached reputation.
The problem is, a nym that exists for a long time can get its anonymity
partially or fully compromised. Abandonment of
Adoption of anonymous e-money is to great degree hindered by the lack of
infrastructure to convert this currency to/from meatspace money.
However, there is possible a method, using offshore gambling companies.
There may be a special kind of gamble, that looks from the outside
like regular
On Mon, 12 Apr 2004, Major Variola (ret) wrote:
against Men with Guns...in the end Men With Guns will probably try to
shoot away bits, but it's not going to work too well.
You forget that there are no bits which are not physical. Physical
things reside on land leased from the State (try
Dug this from my old archives, after finding out it vanished from the Net.
Decade-old, but more truthful than before.
May it provide some inspiration.
--
Title: The Criminal
Lyrics by: Steve Brinich
Tune: The Idiot (Stan Rogers)
Date:
On Sun, 28 Mar 2004, Tyler Durden wrote:
Another thing that seems to bind us (and again bind is probably a poor
choice of words) is an extreme tolerance to opinions very different from
that of any one subscriber.
U... like ...and in a flame war bind them?
/me hides
On Sat, 13 Mar 2004, Eugen Leitl wrote:
- Forwarded message from Enzo Michelangeli [EMAIL PROTECTED] -
- Directories for location and presence. Nothing fancy here, already done
before for P2P chat systems.
I think I suggested it already somewhere. Use Jabber. Use Jabber ID
instead of
On Tue, 2 Mar 2004, Justin wrote:
From: Claudia Schmeing [EMAIL PROTECTED]
Subject: [Users] Announce: FreeS/WAN Project Ending
Dear FreeS/WAN community,
After more than five years of active development, the FreeS/WAN
project will be coming to an end.
Is anyone disappointed?
Yes.
good news snipped
:)
And sure, you use FreeS/WAN, and a company I used to work for used it
too. There are employees of many other companies who post to the
FreeS/WAN lists. But that's hardly representative of the majority of
companies.
Majority as in number of employees, or as in count?
Or if I sprayed the seats in the airports lounge or restaurant, the
bomb-sniffing dogs would become butt-sniffing dogs, to the major
embarrassment of security. This last, while humorous, would go a long
way toward discrediting the security force.
Chemicals that aren't detected themselves
Wondering a little.
FCC recently mandated fees for Internet radio broadcasters, based on the
number of listeners. However, there are emergent technologies for P2P
broadcasting, where some of the clients act as broadcasters themselves,
retranslating the stream. This way it may not be technically
There is a problem here how to killfile (or spamfilter) the more repeated
nothing-saying posts without losing also his good stuff as the collateral
damage.
The good ruleset could be (translate to the syntax of whatever you use):
Sender: [EMAIL PROTECTED]
Body contains: smoke
Body contains:
http://www.hw-server.com/test/sld_hws.html
Take a look at the DIMM modules.
Looks like a good candidate for a battery-powered portable VoIP/GSM
encrypted cellphone. Add a GPRS modem or a cellphone (or, for landline
version, a modem), a small display/keyboard, and eg. SpeakFreely with
suitable
want to get fancy, throw in a small form factor CF bluetooth card
(the 860 has a CF slot) and you could bond to a Bluetooth cellphone
Speakfreely without wires :)
Moe
Thomas Shaddack wrote:
http://www.hw-server.com/test/sld_hws.html
Take a look at the DIMM modules.
Looks like a good
I can't be considered an expert on this technology, so probably there is
another, much simpler solution.
The first idea (and so far the only one) I got is to use a pair of
wireless access points, eg, DWL-900AP+ ones (the only ones I have
experience with so far); if I'd have a pair of these, I'd
On Thu, 1 Jan 2004, Tim May wrote:
A few moments of thought will show the connection between replicators
and general assemblers. A general assembler can make another general
assembler, hence all general assemblers are replicators. And in fact
this is necessary to make mechanosynthesis
TEMPEST shielding is fairly esoteric (at least for non-EM-specialists)
field. But potentially could be made easier by simplifying the problem.
If we won't want to shield the user interface (eg. we want just a
cryptographic processor), we may put the device into a solid metal case
without holes,
1 - 100 of 216 matches
Mail list logo