I am the ghost of groovymother.com. Woooooo!

This is an old page from Rod Begbie's blog.

It only exists in an attempt to prevent linkrot. No new content will be added to this site, and links and images are liable to be broken. Check out begbie.com to find where I'm posting stuff these days.

Filed under 'security'

June 5, 2012

The Four Critical Security Flaws that Resulted in Last Friday's Hack - CloudFlare blog

Outstandingly detailed postmortem (with timeline infographic!) from Cloudflare on how their systems were compromised despite having perfectly reasonable security in place for their Google Apps accounts.

Filed under : : :

April 17, 2012

zxcvbn: realistic password strength estimation

Thoughtful article explaining Dropbox’s new open-source password-strength-estimator. Good stuff.

Filed under : : : :

March 9, 2011

Just Fancy That

We believe it is not in the best interest of the consumers, merchants and overall payment industry to publish the details of product designs describing potential attacks however remote those might be. Even if these attacks are difficult to be accomplished it gives the bad guys a leg up on research they would not have to do and encourages bad behavior.

Verifone in 2007 in response to security research showing their UK “Chip & PIN” credit card readers were insecure.

In less than an hour, any reasonably skilled programmer can write an application that will “skim” – or steal – a consumer’s financial and personal information right off the card utilizing an easily obtained Square card reader. How do we know? We did it. Tested on sample Square card readers with our own personal credit cards, we wrote an application in less than an hour that did exactly this.

[…]

Don’t take our word for it. See for yourself by downloading the sample skimming application and viewing a video of this type of fraud in action.

Verifone in 2011, after Square reduced their fees for credit card processing to well below Verifone’s rates.

February 15, 2011

Anonymous speaks: the inside story of the HBGary hack

SQL injection, ssh password authentication and re-used weak passwords. *headdesk*

Filed under : : : :
via |

January 27, 2011

venomous porridge - Yesterday, Facebook announced some new measures...

Facebook’s “security” feature circumvented by Facebook’s blatant sharing of default-by-public data. What’s the opposite of “security by obscurity”? (Insecurity by publicity?)

Filed under : : :
via |

December 18, 2010

Research: Remarkable 2nd order XSS @ Amazon or How to hack Amazon with a book

A pretty long game. Publish a book demonstrating XSS, and Amazon will serve it up!

Filed under : : :
via |

November 18, 2010

Are airport X-ray scanners harmful?

“While the risk of getting a fatal cancer from the screening is minuscule, it’s about equal to the probability that an airplane will get blown up by a terrorist, he added.”

Filed under : : : :
via |

October 24, 2010

Firesheep

This is A Big Deal. Makes stealing session cookies from other computers on your local network as easy as clicking a button. Will be interesting to see how big sites respond. Are we finally going to see HTTPS deployed on all pages?

Filed under : : : :
via |

September 27, 2010

CloudFlare

Crazy smart security and caching system for websites. You repoint your domain’s DNS to their servers, and everything gets cached and filtered automagically. Comment spam has almost entirely disappeared since I installed it on my blog.

Filed under : : :

March 3, 2010

2010 CWE/SANS Top 25 Most Dangerous Programming Errors

Every programmer should read this list now. If you don’t have a high-level understanding of all of these (and a deep understanding of the ones that affect the platform you build on), you’re dangerous.

July 23, 2009

ClickToFlash

OS X Safari users: Install this! Blocks Flash until you click on the object in Safari (and other WebKit-based applications). A way to mitigate the risk of the Flash exploit without completely nuking Flash Player from your machine.

Filed under : : : : : :

US-CERT: Adobe Flash vulnerability

All current versions of Flash Player are remotely exploitable on all platforms. “This vulnerability is being actively exploited.” Only workaround is to uninstall Flash Player.

Filed under : : :
via |

May 18, 2009

The Usability of Passwords

“It is 10 times more secure to use “this is fun” as your password, than “J4fS<2”.” True dat. Of course, password complexity isn’t really an issue. Easiest way to crack a user’s password? Hack a website (or social engineer someone that works for a website) that stores passwords in cleartext.

Filed under : :
via |

January 27, 2009

XSS (Cross Site Scripting) Prevention Cheat Sheet - OWASP

Essential reading if you write webapps.

Filed under : :
via |

January 6, 2009

Weak Password Brings 'Happiness' to Twitter Hacker

Full details on yesterday’s Twitter hack. Twitter’s admin interface was available offsite to all their admin users, one of whom has a weak password, plus their monitoring didn’t notice a dictionary attack going on. Oops.

Filed under : :
via |

January 5, 2009

Obama Phished?

Obama Phished?

Looks like the president-elect's Twitter credentials have been compromised.

Filed under : : : :

January 4, 2009

Sen:te - GPGMail

The plugin for OS X’s Mail app which makes cryptography easily manageable.

Filed under : : : : : : : :

Quick cryptogeek note

I’m stopping using my old PGP key (0×8C80C35F). It’s been active for 12 years, and I had set it to expire later this year, so I’m retiring it now.

In its place is 0×1A5FFE23 which I will use for personal purposes for the next five years. It has been signed by 0×8C80C35F (as well as the CACert root key), so should be considered trustworthy. Almost all personal mail from me shall be signed with this key.

PS. I am not being rubber-hosed as I type this.

Filed under : : : :

December 30, 2008

MD5 considered harmful today

MD5 collisions can be used to make SSL certificates that modern browsers will trust for any domain. This is a: Bad Thing.

Filed under : : :
via |

Carrying Gunpowder through Airport Security

Because if they’re in small containers in a plastic baggie, they *can’t* be dangerous…

Filed under : : : :
via |

October 18, 2008

The Things He Carried

Great piece on the “security theatre” at airports that inconvenience travellers, but do nothing to improve security. Particularly enjoy the author going through screening wearing a “beer belly”, but having his bottle of water confiscated.

October 12, 2008

a912rtag9?

Since breaking the search box on groovymother a couple of weeks ago, I’ve spotted a lot of XSS attempts in my logs. The phrase “a912rtag9” in particular seems to appear a lot, and it looks like it’s a bot spidering search boxes across the internet. Anyone know its origin? UPDATED TO ADD: Looks like it’s Yahoo’s Slurp Bot making these requests! Also, the Googlebot is searching for “a912rtag6”. (And yes, I’ve verified the IP addresses) How odd!

Filed under : : :

October 8, 2008

TSA calls Newark screener a one-person crime wave

Stealing a $48k professional video camera and trying to sell it on eBay? Not smart.

Filed under : : :
via |

October 2, 2008

A Look at the Clickjacking Web Attack and Why You Should Worry - Webmonkey

Good explanation of the newly publicised “clickjacking” browser exploit. Your clicks may not be going where you think they’re going.

August 11, 2008

Anatomy of a Subway Hack

The presentation on hacking the MBTA which was pulled from Defcon due to a court order… but not before the slide deck had been distributed.

Filed under : : : : : :
via |

August 5, 2008

"Clear" Air-Travel Pass Data Stolen From SFO

I’ve always hated “Clear”, the pay-$100-to-skip-to-the-front-of-the-security-line card. Firstly, because it’s private enterprise falsely dressed as security, and secondly because it creates a class system at the airport line. So my socialist side is smug to see the bourgeoisie get its comeuppance. Have fun changing your biometrics, folks.

Filed under : : : :
via |

July 21, 2008

Ophcrack

Windows password cracker. Has an interesting open-source business model: The cracker is GPL, and there are free (but limited) Rainbow tables. To get the full tables, you need to pay $99.

Filed under : : : :

July 15, 2008

Adeona: A Free, Open Source System for Helping Track and Recover Lost and Stolen Laptops

Open-source app which logs your laptop’s network location (and optionally a snapshot from the webcam) to a DHT distributed database at irregular intervals.

Filed under : : : :
via |

June 1, 2008

DenyHosts

Excellent Unix tool which watches for attacks on ssh and blocks malicious hosts from connecting. I’ve only just found that it has a “synchronization” mode which shares the knowledge of evil hosts. Installed on all my servers.

Filed under : : :

May 15, 2008

Debian OpenSSL Predictable PRNG Toys

More details on the Debian openssl patch farrago. Important point: Every sysadmin needs to scan their boxes (not just Debian users) to find any compromisable .authorized_keys

Filed under : : :
via |

May 14, 2008

The Debian SSL fubar farrago - some light perspective

If you have a Debian or Ubuntu box and used it to generate an SSH key in the last couple of years, due to a rather heinous bug, there’s a high chance you have one of roughly 260,000 keys.

To put this in perspective, if your account was protected by a 4 lower-case-character password, it would be harder to brute-force access (264 = 456,976).

For the sake of the internet, follow the instructions to update the keys on your servers forthwith.

March 8, 2008

A Question of Programming Ethics

Pretty much inevitable — An app that asked for your GMail username & password was harvesting them. One point to the “Why we need OAuth” party.

Filed under : : : : :
via |

February 6, 2008

TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software

The excellent TrueCrypt now runs on OS X, as well as Windows and Linux. I’ll definitely be shunting some of my files onto an encrypted thumbdrive later.

November 15, 2007

apophenia: algorithms for dumb security questions

A consistent tactic for answering those stupid “What color was your first favourite pet?” type questions.

Filed under : : :

October 8, 2007

Gathering 'Storm' Superworm Poses Grave Threat to PC Nets

Analysis of the “Storm” worm. Cunningly designed to be as undetectable as possible, it’s a frightening vision of what modern malware can be.

August 19, 2007

VeriSign's OpenID SeatBelt Plugin

Firefox extension to bring OpenID into the browser’s chrome. (Also, Verisign’s OpenID provider now support using their PayPal Security Keys as a second-factor for authentication)

Filed under : : : : :
via |

August 14, 2007

Two Social System Design Trends That Should Really, Really Stop. Like now.

“Yes, I know you’d love to have access to my address books and IM lists. But stop asking me for my login & password. Like to poke around my bank account while you’re at it? Take my wife out for naked tequila shots? How about just kicking me in the nuts a few times to show me who’s boss?”

August 8, 2007

Welcome to America | Guardian Unlimited

“When writer Elena Lappin flew to LA, she dreamed of a sunkissed, laid-back city. But that was before airport officials decided to detain her as a threat to security”

August 2, 2007

Your browser is a tcp/ip relay

Attackers could theoretically use DNS rebinding to use your computer to connect to anywhere — Even internal sites. I’m skeptical that this is a “big” problem — the hurdles that an attacker would have to leap are numerous — but it’s an interesting approach.

Filed under : : :

July 23, 2007

Exploiting the iPhone

The inevitable first iPhone security flaw announcement. Notable for how frankly *non* sensationalist it is.

Filed under : :
via |

July 11, 2007

Fake bomb eludes airport test -- Times Union - Albany NY

Hooray for the TSA and their water-divining machinery.

Filed under : : :
via |

May 7, 2007

TechBlog: "Free Public WiFi"? Not!

Spotted this SSID appear as an ad-hoc wifi network here at [RhymesWithNose]. Guessed it was some nasty malware — turns out to be “viral”, but not in that way!

Filed under : : : : :

May 6, 2007

How Credit-Card Data Went Out Wireless Door - WSJ.com

The TJX credit-card hack originated from a poorly set-up wireless network at a Marshall’s store in Minnesota.

Filed under : : : : :
via |

April 24, 2007

PayPal Security Key

For $5, PayPal will give you a SecurID-type keyfob to make it much harder for anyone to penetrate your account. I’ve been carrying mine for a couple of months now.

April 12, 2007

slight paranoia: A Deceit-Augmented Man In The Middle Attack Against Bank of America's SiteKey Service

Those anti-phishing “pick a photo and a phrase that must be displayed when you login to your bank” systems? Work-aroundable by smart-enough phishers. Wonder where the arms race goes next?

Filed under : : :
via |

April 10, 2007

O'Reilly Radar > PHP Becoming Mainstream

“PHP and MySQL For Dummies” is currently the top-selling PHP book. Attention malicious types: There will soon be even more half-assed easily-attackable PHP sites on the internet for your delectation.

April 7, 2007

Time stands still for Hempfield teen in lockup - Tribune-Review

Kid phones a school hotline an hour before someone phones in a bomb threat. Unfortunately, the school hadn’t adjusted for the new DST switch, so he got hauled into juvenile detention for twelve days. “County juvenile detention officials wanted to keep Webb in custody, Andrews said. “They wanted him to have a mental health evaluation because he wouldn’t admit to making the call.” ” Frightening.

Filed under : :
via |

March 26, 2007

Beginner's guide to OpenID phishing

Good overview of the phishing risks inherit in OpenID — Is it essentially doomed by providers limiting authentication to easily stealable usernames & passwords?

Filed under : : :
via |

March 19, 2007

EURion constellation - Wikipedia, the free encyclopedia

I knew of the security feature that prevents scanning/photocopying modern paper currency, but I hadn’t heard this name for it.

Filed under : : :
via |

March 8, 2007

February 22, 2007

Schneier on Security: CYA Security

I U+2665 Bruce Schneier. “Much of our country’s counterterrorism security spending is not designed to protect us from the terrorists, but instead to protect our public officials from criticism when another attack occurs.”

Filed under : : :
via |

February 21, 2007

Audit: Anti-terror case data flawed - Yahoo! News

“Federal prosecutors counted immigration violations, marriage fraud and drug trafficking among anti-terror cases in the four years after 9/11 even though no evidence linked them to terror activity, a Justice Department audit said Tuesday.”

Filed under : : : :
via |

February 6, 2007

Apple - Thoughts on Music

Steve Jobs publicly calls for the record companies to drop their requirement for DRM on online music sales: “Imagine a world where every online store sells DRM-free music encoded in open licensable formats. […] This is clearly the best alternative for consumers, and Apple would embrace it in a heartbeat.”

Filed under : : : : : :
via |

February 5, 2007

Study Finds Web Antifraud Measure Ineffective - New York Times

I’ve always suspected that these “Select your image and don’t enter your password if you don’t see it” systems were broken — Asking users to behave differently when something is *missing*, which they’re liable to forget even *existed*, is not security by any stretch.

Filed under : : :
via |

January 24, 2007

crazybob.org: Install PwdHash, now.

Firefox extension for generating marginally-more-secure passwords. Use your same password everywhere, but hash it against the website’s domain name.

Filed under : : : :
via |

January 18, 2007

Don Park's Daily Habit - Visual Security: 9-block IP Identification

Attractive approach to giving plausible deniability when someone fakes your name posting comments, without having your IP address posted publicly.

Filed under : : :
via |

January 11, 2007

Schneier on Security: Choosing Secure Passwords

Choose better passwords through understanding how brute-crackers work these days.

Filed under : : :

December 28, 2006

BackupHDDVD, a tool to decrypt AACS protected movies - Doom9's Forum

It appears that someone has found a way to extract the encryption keys for HD-DVD discs, then rip them. This doesn’t render the whole of AACS broken (it was designed to work around broken software), but until the movie industry makes its move, all HD-DVD discs out there today can be ripped.

Filed under : : : : : :
via |

December 20, 2006

Locationbar² | Firefox Add-ons | Mozilla Corporation

Nice plugin for Firefox which simplifies the URL field and emphasizes the hostname of the URL. Could help users avoid phishing attacks. Should this be the standard URL display in Firefox?

Filed under : : :
via |

December 18, 2006

Blowing Chunks: Marketing Before Security

Because logging you out of your banking website is clearly less important than trying to sell you another credit card.

Filed under : :

December 14, 2006

Schneier on Security: Real-World Passwords

Bruce Schneier breaks down the password data gathered by a MySpace phishing attack. Notable fact: When the site insists upon including letters and numbers in the password, folks just append “1” to their usual password. (And, in my experience, when forced to change their password every few months, just cycle the number)

Filed under : : :
via |

December 13, 2006

macosxhints.com - Take iSight snapshots during invalid login attempts

Nice security hack to find anyone trying to get into your laptop.

Filed under : : :
via |

November 30, 2006

Nmap Online

Run NMap from a remote host. Useful for testing your local firewall.

Filed under : : :
via |

November 22, 2006

Ask the pilot | Salon Technology

Patrick Smith’s mother causes confusion at the airline security counter: Is it OK to take marinara sauce (which is a liquid) onto a plane if it’s frozen (which makes it a solid)? Ah, I feel safer already.

Filed under : : :
via |

November 16, 2006

Cracked it! | Special reports | Guardian Unlimited

FFS. Detailed explanation of the how’s and why’s of reading/cloning a UK RFID-chipped passport — which don’t even have the tinfoil protective cover that US passports will. “‘This doesn’t matter,’ says a Home Office spokesman.”

Filed under : : : : :
via |

October 28, 2006

[Full-disclosure] RFID enabled e-passport skimming proof of concept code released (RFIDIOt)

“This program will exchange crypto keys with the [RFID-chipped] passport and read and display the contents therein, including the facial image and the personal data printed in the passport.”

Filed under : : :
via |

October 5, 2006

Unlikely Terrorists On No-Fly List, Steve Kroft Reports List Includes President Of Bolivia, Dead 9/11 Hijackers - CBS News

CBS News has got their hands on the TSA’s “No-Fly List”. Sucks to be a Gary Smith or a Robert Johnson.

Filed under : : :
via |

Google Code Search

Google search for open-source code. Is there a use for this beyond doing mass-searches for vulnerabilities?

Filed under : : :
via |

October 1, 2006

New Air-Travel Guidelines | The Onion - America's Finest News Source

“The ban was a necessary precaution. We have to be willing to make these kinds of sacrifices if we’re going to prevent scientifically impossible terrorist attacks.”

Filed under : : : :
via |

September 26, 2006

Something I Learned Today Going Through Security at Logan Airport

When they say that, due to relaxed heightened security measures, you can only take “travel sized toothpaste” through the security checkpoint when flying, offering to squeeze out the excess toothpaste from your regular sized tube until it weighs less than 3oz won’t cut it.

But the unamused reaction to my offer from the TSA agent was fun, so I think I’m going to purchase another full sized tube and offer again on my flight back.

Filed under : : :

August 18, 2006

Faces, Too, Are Searched at U.S. Airports - New York Times

Good move by the TSA: Investing in training screeners with the ability to pick out suspicious characters at the airport; skills that can be used regardless of whether a “bad guy” is planning on using liquids, boxcutters, or dental floss as part of their “plot”.

Filed under : :
via |

August 15, 2006

How To Break Web Software - A look at security vulnerabilities in web software - Google Video

Google TechTalk from one of the authors of “How to Break Web Software”.

Filed under : : :
via |

August 14, 2006

Nikto

Vulnerability scanner purely aimed at web servers.

Filed under : : :
via |

August 13, 2006

US to launch RFID passports on Monday

Joy’s new passport arrived yesterday (Yes, for our international travel on Friday. We Begbies are noted for our inability to have our passports ready far in advance of travel). Luckily, this means she’s avoiding the RFID nightmare for ten years.

Filed under : : :

Schneier on Security: Last Week's Terrorism Arrests

Bruce Schneier on the futility of banning liquids from carry-on luggage in the long-term. I imagine that that’s not going to stop the TSA, though.

Filed under : :

August 6, 2006

YouTube - Bump keying

Practically every lock out there can be opened with a filed-down key and a hammer. Methinks home insurance premiums are about to go up.

Filed under : :
via |

July 21, 2006

The Editorial Cartoons of Clay Bennett: Security vs. Privacy

Excellent cartoon. From October 2001, but still as true today, sadly.

Filed under : : : :
via |

July 10, 2006

on crypto systems from CTO PGP

Rebuttal of the theory that the government are mass-cracking encrypted data. “If you want to brute-force a key, it literally takes a planet-ful of computers… Now of course, there are other ways to break the system.”

Filed under : : :
via |

May 14, 2006

"Lock The Vault? What Kind Of Maniac Would Steal Money From A Bank?"

Diebold voting machines are found to be easily re-flashable by anyone wanting to invisibly rig an election. Diebold spokesman: “I don’t believe these evil elections people exist.” I have not the words.

Filed under : : :
via |

April 12, 2006

mozdev.org - tamperdata: index

A Firefox extension that allows you to tweak your HTTP (and HTTPS) requests and responses in real-time. I used to use the Achilles proxy for this, back in the day.

Filed under : : : : :
via |

April 7, 2006

Network Magic

Simplified home-network manager for Windows. A common interface for all the things you want to manage — routers, software firewalls, file/printer sharing, etc.

Filed under : : : :
via |

April 6, 2006

Advanced Access Content System

An overview of how the AACS encryption system that’ll be baked into Bluray and HD-DVD works. It’s very well-crafted, but ultimately doomed-to-fail — either through cracking, or through speedy product-obsolescence.

Filed under : : : : :
via |

SiteAdvisor blog: Taking SiteAdvisor to the Next Level

Local excellent security startup SiteAdvisor has been snapped up by McAfee. They were pretty clearly built-to-flip — My money had been on Google to buy them, though.

Filed under : : : :

March 23, 2006

Schneier on Security: Airport Passenger Screening

Another good Bruce Schneier article. Worth it for the sentence “Although we should all be glad that Richard Reid wasn’t the ‘underwear bomber.’”

Filed under : : :

March 21, 2006

Silver Needle in the Skype

Reverse-engineering the heavily obfuscated Skype binary and protocol.

Filed under : :
via |

March 12, 2006

DAG: Tunneling SSH over HTTP(S)

Neat hack for the upcoming (I’m sure) day when I’m behind a firewall that blocks port 22.

Filed under : : : : : : :
via |

February 22, 2006

SANS - Internet Storm Center - Phollow the Phlopping Phish

All the info on a remarkably well-done phishing scam. Even users trained not to fall for scams could fall for this.

Filed under : : :
via |

February 7, 2006

Malcolm Gladwell: What pit bulls can teach us about profiling.

Excellent, fascinating Malcolm Gladwell article about the uselessness of “profiling” as a tool to attack crime.

January 18, 2006

Orbicule | Undercover

Mac laptop “anti-theft” app. Interesting feature set, although I’m cynical about how many times the “thief” turns on the laptop and connects to the internet, rather than the poor sap who buys it from them on Craigslist.

Filed under : : : :
via |

January 3, 2006

Hamachi

To be tried-out: Cross-platform app that creates VPNs between computers — even if they’re behind firewalls. Downside: Requires connecting to a centrally-run server to initiate connection, which will soon be charging $$$.

Filed under : : : : : : : :
via |

January 2, 2006

Hex blog: Windows WMF Metafile Vulnerability HotFix

INSTALL THIS! INSTALL THIS! INSTALL THIS! If you’re running Windows? INSTALL THIS!

Filed under : : : : : :
via |

F-Secure : News from the Lab - It's not a bug, it's a feature

The currently-circulating Windows WMF exploit “probably affects more computers than any other security vulnerability, ever.” Every PC running any version of Windows since 1990 — even if fully patched — is vulnerable!

Filed under : : : : :

December 28, 2005

TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows XP/2000 and Linux

Open-source whole-disk encryption package for Windows. Perfect for keeping your USB keychain drive safe from prying eyes.

Filed under : : : : :
via |

December 22, 2005

OpenSSH cutting edge

Interesting interview about OpenSSH. The new VPN-style tunnelling stuff sounds awesome.

Filed under : : : :
via |

December 19, 2005

Deciding Who To Trust

Really interesting sounding approach to warning users of untrustworthy sites — armies of webcrawlers looking for the places which load you up with spyware and spam.

Filed under : : : : : :

December 15, 2005

Google Safe Browsing for Firefox

Extremely well-designed anti-phishing extension from Google.

Filed under : : : : :

December 5, 2005

New Scientist: UK case for holding terror suspects 'misleading'

Politicians’ claims that police need to hold terror suspects for 90 days because of the time taken to decrypt files. Ross Anderson refutes it, saying “You find the key lying around, or you give up.” Tsk, those pesky experts ruining Tony Blair’s day.

Filed under : : : :
via |

December 2, 2005

Wired News: Airline Security a Waste of Cash

Excellent article by Bruce Schneier on the futility of current airport “security”.

Filed under : : :
via |

Bill of Rights - Security Edition

Fun! The Bill of Rights, printed on bits of metal that you’ll need to remove from your pocket next time you’re going through “security”.

Filed under : : :

November 18, 2005

Boing Boing: iTunes creates a security hole?

*Jawdroppingly* idiotic rant from Cory, trying to draw anti-DRM points from a completely non-DRM-related security flaw in iTunes. Is it my imagination, or is his signal to ranting-clueless-fuckwit ratio dropping of late?

October 31, 2005

Mark's Sysinternals Blog: Sony, Rootkits and Digital Rights Management Gone Too Far

Sony are now using Windows vulnerabilities to hide DRM software on Windows PCs so that users can’t uninstall them. Fuckers.

Filed under : : : : :
via |

September 22, 2005

Guardian Unlimited | Suspicious behaviour on the tube

Tube station shut down because of man “acting suspicously” (wearing an overcoat and sending text messages, apparently). Police arrest him and confiscate lots of computer/electronics equipment from his house. They eventually drop charges (although they don’t return his property). Unfortunately for them, said man has the skill and contacts to get his story told on the front page of The Guardian. Feeling safer, Britain?

Filed under : : : : : :
via |

September 13, 2005

Privacy Enhanced Computer Display

“It is also possible to use the system to “underlay” a private message on a public display system.” Anyone else reminded of “They Live”?

Filed under : : :
via |

About This Site

This is an archive of groovmother.com, the old blog run by Rod Begbie — A Scottish geek who lives in San Francisco, CA.

I'm the co-founder of Sōsh, your handy-dandy guide for things to do in San Francisco this weekend.