Skip to main content

Home/ Indie Nation/ Group items tagged signal

Rss Feed Group items tagged

John Lemke

'Smartware' clothing could signal impending epileptic seizures - 0 views

  • They are currently working on 'smartware', fabrics that treat chronic wounds that result from diabetes and leg ulcers. Their 'senseware' technology, which is motion sensors found inside textiles, can give medical professionals the tools they need to detect the onset of epileptic seizures. The centre's 'bioware' technology is embedded materials and surfaces found in the home and on the body.
  •  
    "They are currently working on 'smartware', fabrics that treat chronic wounds that result from diabetes and leg ulcers. Their 'senseware' technology, which is motion sensors found inside textiles, can give medical professionals the tools they need to detect the onset of epileptic seizures. The centre's 'bioware' technology is embedded materials and surfaces found in the home and on the body."
John Lemke

Stealing Encryption Keys Just by Touching a Laptop - 0 views

  • A team of computer security experts at Tel Aviv University (Israel) has come up with a new potentially much simpler method that lets you steal data from computers — Just Touch it — literally.
  • In order to victimize any computer, all you need to do is wear a special digitizer wristband and touch the exposed part of the system. The wristband will measure all the tiny changes in the ground electrical potential that can reveal even stronger encryption keys, such as a 4,096-bit RSA key.
  • in some cases, you don't even have to touch the system directly with your bare hands. You can intercept encryption keys from attached network and video cables as well. Researchers called it a side-channel attack.
  • ...1 more annotation...
  • The actual attack can be performed quickly. According to the research, "despite the GHz-scale clock rate of the laptops and numerous noise sources, the full attacks require a few seconds of measurements using medium frequency signals (around 2 MHz), or one hour using low frequency signals (up to 40 kHz)."
John Lemke

Robert Duncan Begins Prison Sentence For Working In Legal Medical Pot Shop - 0 views

  • Duncan does not have a background in the marijuana industry, and only began working for the dispensary after being laid off from a more traditional sales job as the economy soured. After the raid, he returned to mainstream employment and up until recently was a sales manager at a Bay Area merchandising company; Duncan told The Huffington Post that he wouldn't have taken the pot job if the feds hadn't signaled that they'd steer clear of medical marijuana businesses that were in compliance with state laws."It was shortly after the federal government said it would not intervene if people followed state law," Duncan said. "We wanted to abide by the rules. None of us had criminal backgrounds. We’re all regular guys. The only reason we got into this was because the federal government said they wouldn’t intervene."
John Lemke

NSA reportedly intercepting laptops purchased online to install spy malware | The Verge - 0 views

  • According to a new report from Der Spiegel based on internal NSA documents, the signals intelligence agency's elite hacking unit (TAO) is able to conduct sophisticated wiretaps in ways that make Hollywood fantasy look more like reality. The report indicates that the NSA, in collaboration with the CIA and FBI, routinely and secretly intercepts shipping deliveries for laptops or other computer accessories in order to implant bugs before they reach their destinations. According to Der Spiegel, the NSA's TAO group is able to divert shipping deliveries to its own "secret workshops" in a method called interdiction, where agents load malware onto the electronics or install malicious hardware that can give US intelligence agencies remote access. While the report does not indicate the scope of the program, or who the NSA is targeting with such wiretaps, it's a unique look at the agency's collaborative efforts with the broader intelligence community to gain hard access to communications equipment. One of the products the NSA appears to use to compromise target electronics is codenamed COTTONMOUTH, and has been available since 2009; it's a USB "hardware implant" that secretly provides the NSA with remote access to the compromised machine.
  • The Der Spiegel report, which gives a broad look at TAO operations, also highlights the NSA's cooperation with other intelligence agencies to conduct Hollywood-style raids. Unlike most of the NSA's operations which allow for remote access to targets, Der Spiegel notes that the TAO's programs often require physical access to targets. To gain physical access, the NSA reportedly works with the CIA and FBI on sensitive missions that sometimes include flying NSA agents on FBI jets to plant wiretaps. "This gets them to their destination at the right time and can help them to disappear again undetected after even as little as a half hour's work," the report notes.
  •  
    While the scope or the targets are reportedly not known, the article also does not mention anything about a search warrant. This is what happens when the government feels they are above the law.
John Lemke

This Internet of Things radio is the size of an ant | Ars Technica - 0 views

  • The radios are fitted onto tiny silicon chips, and cost only pennies to make thanks to their diminutive size. They are designed to compute, execute, and relay demands, and they are very energy efficient to the point of being self-sufficient. This is due to the fact that they can harvest power from the incoming electromagnetic signal so they do not require batteries, meaning there is no particular lifetime associated with the devices.
1 - 5 of 5
Showing 20 items per page