Pffft. Kids have been "hacking" signs for years. I remember when I was a kid, there was a place called Fairy Falls Creek. A couple of my university friends went and made a professional quality sign, in the same colour, and font as the existing sign, and renamed the area to Hairy Balls Creek. The fact that there were round rocks covered in hairy moss made the sign very plausible. So plausible, that after a few years, even the local tourism guides quoted Hairy Balls Creek.
Epic! I salute the miscreants who pulled that off.
All of my calculators used to be HP
Mine still are. I use an HP48gx, and run HP48gx emulators on my Mac and my iThings when my real 48gx isn't within easy reach.
My comment was in response to LCD screens, not network connections.
Sorry, my IOT-rant mode engages pretty easily.
So you wouldn't like to know that the temperature inside your freezer went too high and your food defrosted because your flatmate left the door open while you were away for the weekend?
I don't need my freezer to have a network connection for that. An old water bottle and a little bit of water will do the trick just fine. I can't think of any reason that I'd want my refrigerator, thermostat, laundry machines, etc. to have network connectivity. The real winners in the "Internet Of Things" game are the makers of networking hardware.
eBay and PayPal used to offer security tokens to provide one-time PINs to be used at login. They were offered as either physical tokens or as smartphone apps. I just tried to look for them on the eBay and PayPal sites, but I no longer see any mention of them. Have they stopped supporting the tokens?
PayPal now just appears to offer something called PayPal Security Key in which they send OTPs via SMS, and I don't see anything like that on the eBay site.
And in this case, the fake key has zero signatures whatsoever. If it had any, they would either be a blob of also-fake unconnected keys, or someone proving his guilt this way.
Just to be pedantic, a fake key may also be signed by a real, correctly-identified individual who had no intention of subterfuge, but who isn't careful about whose keys he or she signs. Of course, once discovered, that person should from then on be distrusted to validate other keys just as much as somebody who deliberately tried to deceive others.
A scarier but less likely possibility would be a malicious actor who creates a forged key for some other person, and then attends key-signing parties where they present forged identification in order to receive legitimate signings of their forged key. It'd be hard to get away with this if the target is an individual with a well-known appearance, like a Schneier or a Wozniak. But if the target is somebody who is just known online by name and not by their physical appearance, then it might not be hard to get legitimate signatures on the forged key by real, well-trusted individuals who simply had no prior knowledge of the target's real appearance. I wouldn't know "the" Gavin Andresen who maintains Bitcoin code from "a" random person named Gavin Andresen, or even an impostor with a good forgery of a government-issued ID card. I've never seen a picture of Gavin that I can recall, so I have no idea of what he looks like.