Last weekend wound up a bit in the air due to an emergency at the last minute - one of Lyssa's relatives died unexpectedly and the family was hastily reconvened for her funeral, which was held on Saturday. because I'd been on the road the weekend before, I didn't have to make the trek back to Pennsylvania, much to my relief. Grant picked up Lyssa sometime on Friday while I was at work and returned to their homestead, which left me with some time on my hands. The first thing I did was move my car maintenance appointment back to Saturday …
Last week, a group of information security researchers released a whitepaper detailing a practical data extraction attack on DRAM after the power's been cut. Unfortunately, Applebaum et al didn't release the source code for the utilities they used in the lab. One Wesley McGrew read the paper and decided to apply the scientific method by reproducing their experiments. This required developing utilities to extract data from powered-down DRAM from scratch which he's done and released the source code for. The source is mostly in C with some in-line assembly. It's dense and you really have to understand what's going on …
The Liberation Tigers of Tamil Eelam, also known as the Tamil Tigers, is a group of rebels active in the country of Sri Lanka who demand the formation of a separate state for the Tamil majority in the northern and eastern regions of Sri Lanka, or a terrorist group, depending on who you talk to about them. They're pretty nasty customers as sepratist movements go, even having separate strike and black ops teams. They also have an unusual degree of technological sophistication - they have their own television station, a bank, a customs service, and it's been discovered that they can …
He might not be Mr. Universe but Ken Jones, a volunteer at UHF television station 45 South in New Zealand is just as determined to make sure that an uplink signal hits the airwaves. Because the station either wasn't able to purchase a $20kus microwave uplink to get their signal to a full-sized broadcast station, Jones constructed a parabolic antenna to broadcast their signal using a $10us wok from a housewares store.
That's right, a wok. As it turns out, if you work the math behind parabolic reflectors, the particular kind of wok he bought works just as well as …
Brad Willman, known to the underground as Omni-Potent, has stepped forward after three years of secretly stalking online pedophiles and tipping off law enforcement. His primary tool was a trojan horse that appeared to be an image file but was actually a remote access tool that he posted to child porn-related newsgroups on Usenet. People would download and double-click them, which silently installed the utility. He would monitor feeds from multiple installations of this utility for up to 16 hours every day, gathering evidence that he indexed, filed, and passed along to police, even against their orders. Time and again …
The encryption algorithms for Blu-Ray and HD-DVD content have been cracked!
The processing key is one of the keys used in the process of generating the media key, the unique key that encrypts the contents of a particular DVD. Due to the encryption algorithm used in Blu-Ray and HD-DVD technologies, they keys seem to work in a hierarchial manner: If you compromise a key lower in the hierarchy, you crack media. Compromise a key higher up in the hierarchy, and you crack all of the media encrypted underneath it.. meaning that all of the new generation DVDs may be freely …
Wireless net.access is not yet ubiquitous, but it's pretty common and becoming moreso every day for a variety of reasons. Net.access is definitely in enough demand that a lot of places sell wireless access to whomever is willing to pay for it. If you're lucky, you'll get a good price on an hourly rate or a daypass, but if you're not you'll get reamed on the price of daily access (I remember one hotel I stayed at in Florida that demanded $30us per day for 802.11b access). This has angered some people to the point at which …
Just when you thought attacks couldn't get any more oblique, along come Sebastian Krahmer and George Ou, who figured out how to use Vista's audio playback and voice recognition systems to compromise a box. It started off with Krahmer musing on the Dailydave list about whether or not it would be possible to craft a recording of someone reciting voice commands that could be picked up by Vista Speech Command running on the same box through a plugged in microphone. George Ou took the idea and ran with it, and came up with a couple of .wav files that do …
Technically, Microsoft Windows Vista hasn't even been released yet and the DRM system has been cracked. DRM, the so-called Digital Rights Management system that the MPAA and RIAA are blackmailing hardware and software vendors into supporting so that they can control what you watch or listen to, how, when, and for how long uses strong crypto to encrypt media files and control who and what can access them. In Vista, it's called PMP, the Protected Media Path, and reaches all the way down to the level of the hardware drivers. In theory, if all of the drivers on the system …
This morning, after arriving at the Metro station closest to my office and climbing the escalator (I need exercise, what can I say?) to the platform closest the street, I noticed something that you don't hear very often in downtown DC: Swimming through the air thanks to the odd accoustics of the Metro station above the sound of the traffic was music. Live music, replete with the little vibratos and imperfections that come with playing the same particular instrument for many years for hours on end. Pan pipes, a wooden flute, bass, and a drum machine.