Forgot your password?

Comment: Re:Let me know when you win that war on drugs? (Score 1) 319

by drpimp (#47051863) Attached to: FBI Need Potheads To Fight Cybercrime
If a hacker smoke pots in the woods and no one is around, does that mean it didn't happen? I am sure if you dug deep enough many of your neighbors are doing it at least occasionally; you just don't know about it. The mere fact that it's illegal most people don't go around with a blunt lit up promoting their usage.

Comment: Or another obvious one ... (Score 1) 140

by drpimp (#46767287) Attached to: Bill Gates Patents Detecting, Responding To "Glassholes"
Like trying to use your laptop in a public area (airport perhaps) that has cameras virtually everywhere. Which then would cause the user to either override the blur to cancel or not use their machine. What we need is a glasshole app that works with a blurring technology to decode the blurred screen. That way only the user with the glasses can read their screen. This could be allow customization to the user with some sort of private key shared with the glasses or also another type of public key shared among anyone who has that key can see the picture.

Researchers Build Covert Acoustical Mesh Networks In Air 107

Posted by samzenpus
from the protect-ya-neck dept.
An anonymous reader writes "Researchers at Fraunhofer FKIE, Germany have presented a paper on covert acoustical communications between laptop computers. In their paper 'On Covert Acoustical Mesh Networks in Air', they describe how acoustical communication can be used to secretly bridge air gaps between computers and connect computers and networks that are thought to be completely isolated from each other. By using ad-hoc routing protocols, they are able to build up a complete mesh network of infected computers that leaks data over multiple hops. A multi-hop acoustical keylogger is also presented where keystrokes are forwarded to an attacker over multiple hops between different office rooms. The fundamental part of the communication system is a piece of software that has originally been developed for acoustic underwater communications. The researchers also provide different countermeasures against malicious participation in a covert acoustical network. The limitations of air gaps have been discussed recently in the context of a highly advanced malware, although reports on this so-called badBIOS malware could not yet be confirmed."

Say "twenty-three-skiddoo" to logout.