Jesterace writes: Recently a new patent by a SONY employee was published on the patent site at faqs.org. It seems it is SONY's answer for Geohot's progress. Take a look here:
"A method, system, and computer-usable medium are disclosed for controlling unauthorized access to encrypted application program code. Predetermined program code is encrypted with a first key. The hash value of an application verification certificate associated with a second key is calculated by performing a one-way hash function. Binding operations are then performed with the first key and the calculated hash value to generate a third key, which is a binding key. The binding key is encrypted with a fourth key to generate an encrypted binding key, which is then embedded in the application. The application is digitally signed with a fifth key to generate an encrypted and signed program code image. To decrypt the encrypted program code, the application verification key certificate is verified and in turn is used to verify the authenticity of the encrypted and signed program code image. The encrypted binding key is then decrypted with a sixth key to extract the binding key. The hash value of the application verification certificate associated with the second key is then calculated and used with the extracted binding key to extract the first key. The extracted first key is then used to decrypt the encrypted application code."
Jesterace writes: "As of this week, callers can now text their requests for fire, police, or ambulance, to the emergency call center in Black Hawk County, Iowa — both a nationwide first and a definite improvement for deaf and hard-of-hearing residents who have thus far had to rely on TDD devices. Unlike voice calls, however, the 911 operator can't get your location from a text message, meaning that the caller must first respond to a request for their city or zip code before the call gets routed. Currently, only i wireless subscribers (a local carrier affiliated with T-Mobile) can use the service, but plans are afoot to bring other carriers on board as well. Other future upgrades include the ability to accept video and picture messages. All the operators ask is that you refrain from sending them those silly chain text messages — that sort of thing can be really distracting when you're busy saving lives."
Jesterace writes: It appears that the leaked release Candidate of Windows 7 RC that was downloaded from torrents had a trojan and it was able to build a botnet of up to 27000 machines.
"The rogue OS, which is rigged with a Trojan downloader, at one point had around 27,000 bots in its control as of May 10, when researchers took over the command and control server that communicated with the bots and served them additonal malware. At the height of the botnet buildup, the botmaster was recruiting over 200 machines an hour, says Tripp Cox, vice president of engineering for Damballa. The victims initially downloaded the pirated OS via popular bootlegged software sites and online forums."