- Threat Watch
- Warrior Tools
- Body Armor
- Long Guns
- Accuracy International
- Desert Tactical Arms
- Kel-Tec Long Guns
- Mosin Nagant
- Rock River Arms
- Ruger Long Guns
- Sabre Defense
- SIG Sauer
- Smith & Wesson Long Guns
- Wilson Combat
Posts Tagged comms
Where do your antennas belong? Outside of course! But what if the time comes when your visible antennas make you a target? If that day comes you will have to go covert. With all of the HOA restrictions removing your rights, some of you may already be doing this.
October 12, 2012
Attention smartphone users: be on guard for various types of malware attacking Android operating systems.
This ultra compact solar charger will charge cell phones, GPS devices and cameras.
Technology Review reports that an attacker my be able to pick up encryption keys from cellphones with a TV antenna:
The antenna was detecting radio signals “leaking” from the transistors on the chip inside the phone performing the encryption calculations. Transistors leak those signals when they are active, so the pattern of signals from a chip provides an eavesdropper a representation of the work the chip is doing. When Kenworthy tuned his equipment to look in the right place, a clear, regular pattern of peaks and troughs appeared on his computer screen. They could be seen to come in two varieties, large and small, directly corresponding to the string of digital 1s and 0s that make up the encryption key.
Technology Review reports that the NSA has devised a system in which phones with the Android software are able to make encrypted phone calls.
Let’s hope that this tech trickles down to the consumer market.
Technology Review reports that if you have a smartphone that runs a version of Android, be careful about the links you click:
A chilling demonstration to a small, packed room at the RSA security conference today showed how clicking a single bad Web link while using a phone running Google’s Android operating system could give an attacker full remote control of your phone.