- Comms
- Law
- Medic
- News
- Opinion
- Threat Watch
- Training
- Warrior Tools
- Accessories
- Ammo
- Body Armor
- Books
- Clothing
- Commo
- Gear
- Handguns
- Holsters
- Knives
- Long Guns
- ACC
- Accuracy International
- Barrett
- Benelli
- Beretta
- Blaser
- Bushmaster
- Custom
- CZ
- Desert Tactical Arms
- DPMS
- FN
- Forums
- HK
- IWI
- Kel-Tec Long Guns
- LaRue
- LWRC
- McMillan
- Mosin Nagant
- Mossberg
- Para
- Remington
- Rock River Arms
- Ruger Long Guns
- Sabre Defense
- Sako
- SIG Sauer
- SKS
- Smith & Wesson Long Guns
- Springfield
- Styer
- Weatherby
- Wilson Combat
- Winchester
- Magazines
- Maintenance
- Navigation
- Optics
- Sights
- Tech
- Warriors
Posts Tagged comms
Communicating In The Shadows
From DialtoneBlog:
Where do your antennas belong? Outside of course! But what if the time comes when your visible antennas make you a target? If that day comes you will have to go covert. With all of the HOA restrictions removing your rights, some of you may already be doing this.
Communications Go Bag
From KF7ETX:
FBI: Malware Attacking Andriod
Posted by Brian in Comms, Threat Watch on 17/Oct/2012 02:12
Malware Targets Android Smartphones
October 12, 2012
Attention smartphone users: be on guard for various types of malware attacking Android operating systems.
FBI Computer Scam Alert
Posted by Brian in News, Threat Watch on 22/Sep/2012 01:51
Goal Zero Nomad 7 Solar Panel
This ultra compact solar charger will charge cell phones, GPS devices and cameras.
Reviews
Video
Smartphones Leak Encryption
Posted by Brian in Gear, News, Threat Watch on 7/Mar/2012 19:26
Technology Review reports that an attacker my be able to pick up encryption keys from cellphones with a TV antenna:
The antenna was detecting radio signals “leaking” from the transistors on the chip inside the phone performing the encryption calculations. Transistors leak those signals when they are active, so the pattern of signals from a chip provides an eavesdropper a representation of the work the chip is doing. When Kenworthy tuned his equipment to look in the right place, a clear, regular pattern of peaks and troughs appeared on his computer screen. They could be seen to come in two varieties, large and small, directly corresponding to the string of digital 1s and 0s that make up the encryption key.
NSA Creates Secure Call System
Technology Review reports that the NSA has devised a system in which phones with the Android software are able to make encrypted phone calls.
Let’s hope that this tech trickles down to the consumer market.
Web Links Could Compromise Your Smartphone
Technology Review reports that if you have a smartphone that runs a version of Android, be careful about the links you click:
A chilling demonstration to a small, packed room at the RSA security conference today showed how clicking a single bad Web link while using a phone running Google’s Android operating system could give an attacker full remote control of your phone.