-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi Lorenzo,
I'm curious what threat models or other situations you are specifically
trying to solve? What do you expect your adversary to do when they
realize your device has specific features disabled or inoperative? Are
you looking to create
Hey guys,
A colleague and I are exploring the world of physical hacks to protect
privacy and freedom. For example, this is what we mean:
IR LEDs Overwhelm Surveillance cameras
*http://makezine.com/2008/02/24/led-security-camera-disruptor/*
Using makeup and hairstyles to overcome facial
On 07/01/2013 11:21 AM, Lorenzo Franceschi Bicchierai wrote:
Any other cool examples you can think of? I'd like to get as many examples
as possible, so I thought I'd ask here since you guys must know many more.
One idea that I am working on in a *very* rough form, is making
smartphones that are
On 07/01/2013 11:30 AM, Nathan of Guardian wrote:
Like I said, this idea is early, and perhaps a futile exercise, but I
think it is empowering to explore how easy it is for a person to modify
the hardware of a smartphone in a privacy-enhancing way.
Sorry, I forgot to add that this is inspired
Any hacks to make a privacy modification of cellphone where a microphone can
be physically disconnected?
Something like this http://www.stahlke.org/dan/phonemute/, but for recent
phones.
Pavol
On Mon, Jul 01, 2013 at 11:30:24AM -0400, Nathan of Guardian wrote:
On 07/01/2013 11:21 AM, Lorenzo