cyborgechoes.blogspot.com
cyborg echoes: November 2005
http://cyborgechoes.blogspot.com/2005_11_01_archive.html
Monday, November 14, 2005. Understanding Affective Computing and the Future of Sousveillance Architecture. Article to Understand the Cybernetics. Of how RFID chips could interface with the Human-Computer interface. There is much wisdom in this book. That can help computer scientists and laypersons understand the human brain. Posted by stefanos pantagis at 9:01 AM. Links to this post. Swedish TV on Sousveillance:scroll down to Jill Magid, it is in English. Scroll down to Jill's interview. This trend will ...
wi-foo.com
Wi-Foo - The Secrets of Wireless Hacking
http://www.wi-foo.com/ViewPage80aa.html?siteNodeId=57&languageId=1&contentId=-1
Here is the list of tools and papers that can be used to test the security of RFID technology. If you think we have missed on something that should be included in that list please e-mail authors at wifoo@arhont.com. Or use Wi-Foo forum to upload relevant information. Tools relating to RFID technology. RFID security and related links. This section contains links to the projects/papers relating to security and hacking of RFID devices. Analysis of TI DTS RFID. IEEE published paper on RFID technology.
nonannystate.blogspot.com
No Nanny State - Molon Labe!
http://nonannystate.blogspot.com/2005_04_01_archive.html
No Nanny State - Molon Labe! Freedom is the will to be responsible to ourselves. - Friedrich Nietzsche. Monday, April 18, 2005. Government Insecurity. Again. Oh, this is rich. For this application. Count and catalogue products as they enter and exit a warehouse. Not something you want to use for a high security application. My last rant on this subject concerned our government's desire to use RFID for passports ( Passport Security System Hacked. As EPIC (Electronic Privacy Information Center) reports.
pointprotect.de
ePass Reisepass - RFID Schutzhüllen PointProtect - RFID Shielding Solutions
http://www.pointprotect.de/rfid-links.htm
Reisepass ePass - Schutzhüllen für RFID - RFID Shielding Information. Der Datenschutz für den ePass, Firmenausweis, Studentenausweis, Bibliotheksausweis, bei. Eintrittskarten für die Fußballweltmeisterschaft, Büchern, Bahncard und Fahrkarten, etc. Datenklau per Funk - Lauschangriff auf neue Kreditkarten (WAZ-Online 05.06.2012). Unsichtbares Kleingeld verrät seinen Besitzer (Spiegel-Online 19.05.2012). Hannover - Im Supermarkt 7,43 Euro für ein paar Artikel bezahlen? Die Sparkassen wollen in den nächsten ...
avirubin.com
Avi Rubin’s Vita
http://www.avirubin.com/Avi_Rubins_home_page/Vita.html
1994, Ph.D., Computer Science and Engineering, University of Michigan. 1991, M.S.E., Computer Science and Engineering, University of Michigan. 1989, B.S., Computer Science (Honors), University of Michigan. April, 2004 - present. August, 2010 - July, 2011. Fulbright Scholar, Tel Aviv University. January, 2003 - April, 2004. January, 2003 - present. Johns Hopkins University Information Security Institute. Director and Principal Investigator (PI). National Science Foundation's ACCURATE Center. Patrick McDan...
regiopinie.blogspot.com
RegiOpinie: augustus 2006
http://regiopinie.blogspot.com/2006_08_01_archive.html
Maandag, augustus 28, 2006. Nieuw paspoort handig hulpmiddel voor moderne terrorist! Vanochtend werd op RTL Nieuws bericht over het nieuwe paspoort met (rfid) chip. Waar oppervlakkig even aan gerefereerd werd is dat de digitale informatie op deze chip simpel uit te lezen was en dat dit nu iets verbeterd is. Bomaanslag opeens heel persoonlijk! Wilt u dit liever niet weten dan raad ik u aan het filmpje op onderstaande link niet te bekijken (vanaf 2min40): paspop met Amerikaans paspoort. Stel u heeft uw eer...
kryptonian-x.blogspot.com
Best Hacking Tools and Tutorials - -= Krypt0ni4n =-
http://kryptonian-x.blogspot.com/2005/04/best-hacking-tools-and-tutorials.html
Tiger vs. Longhorn. Sneak Peak: MAC OS X 10.4 Tiger. High Voltage Sparks and Arcs. The Real UFO found in NY. HYDROGEN CAR IN ARMY TEST. Friday, April 01, 2005. Best Hacking Tools and Tutorials. Here are some of the best hacking tutorials/tools and security tips that I have found including Hardware, Software, web, and other related stuff. Also to protect yourself from Hackers. How to Bypass BIOS Passwords. Find-A-Human - IVR Phone S. - by Type. Password Portal - Password Recovery, Password Cracking. Hacki...
rzzz.blogspot.com
rzzz
http://rzzz.blogspot.com/2005_09_01_archive.html
Saturday, September 24, 2005. The Media is the Military. Protest up a 150 ft mast at a US military fuel base at Padworth Common, Berkshire. Iraq: The Mother of All Colonial Disasters. Dalkeith Country Park are holding a fun run. The Effects of Fluoride on the Thyroid Gland. All EU telephone and Internet traffic to be logged and stored for up to a year. It's A Whole New Web. London rooms to rent gmap. Beneath Seattleâ s streets. Anarchist cookbokk slagged off again. Friday, September 23, 2005. Href="http:...
ninjarobotmonkey.blogspot.com
Ninja Robot Monkey: January 2006
http://ninjarobotmonkey.blogspot.com/2006_01_01_archive.html
Thursday, January 26, 2006. It’s coming. Despite roadblocks put up by the Silver Users Association, the Securities and Exchange Commission (SEC) in conjunction with the American Stock Exchange, has proposed new rules that will guide the trading of the upcoming silver exchange traded fund (ETF). Posted by NinjaRobotMonkey at 1:43 AM. Tuesday, January 10, 2006. Shortfall of metals risks China's rise. HOLD tight, it's going to be another belter of a year for metals. Posted by NinjaRobotMonkey at 4:13 AM.
carthiefstoppers.com
Why crack the code - Car Thief Stoppers
http://www.carthiefstoppers.com/Why-crack-the-code.html
Cost of Auto Theft. Interview with a Mastermind. How to Circumvent a Towing. Saved From A Carjacking. Car security chips cracked. JH Researches Crack Code. Why crack the code. About RFIDs and the TI DST. Key Cracking: Transponder DST. Get an Exact Price Quote. How to beat car thieves? Attack on a Cryptographic RFID Device. Why crack the code? Because greater openness means greater security. Feb 28, 2005 A team of researchers at Johns Hopkins University Information Security Institute. Having reverse-engin...