Posts Tagged comms

Communicating In The Shadows

From DialtoneBlog:

Where do your antennas belong? Outside of course! But what if the time comes when your visible antennas make you a target? If that day comes you will have to go covert. With all of the HOA restrictions removing your rights, some of you may already be doing this.

, , , , , ,

No Comments

Communications Go Bag

From KF7ETX:

, , , , , , ,

No Comments

FBI: Malware Attacking Andriod

Malware Targets Android Smartphones

October 12, 2012
Attention smartphone users: be on guard for various types of malware attacking Android operating systems.

, , , , , ,

No Comments

FBI Computer Scam Alert

IC3 Scam Alerts

, ,

No Comments

New Military GPS

From Defense Industry Daily:

The DAGR system provides a Precise Positioning System, using a hand-held, dual-frequency, lightweight receiver of less than one pound that incorporates the next generation, tamper-resistant Global Positioning Satellite (GPS) “SAASM” (Selective Availability Anti-Spoofing Module) security module.

, , , , ,

No Comments

Goal Zero Nomad 7 Solar Panel

Nomad 7 Solar Panel

This ultra compact solar charger will charge cell phones, GPS devices and cameras.

Reviews

Outdoor Gear Lab

Goal Zero Review

Backpack Gear Test

Backpacker Magazine

Video

, , , , ,

No Comments

Oppose HR 3523, the Cyber Intelligence Sharing and Protection Act of 2011

From the Electronic Frontier Foundation:

Congress is considering legislation that would give companies a free pass to monitor and collect communications, including huge amounts of personal data like your text messages and emails, and share that data with the government and anyone else. All a company has to do is claim its privacy violations were for “cybersecurity purposes.” Tell Congress that they can’t use vaguely-defined “cybersecurity threats” as a shortcut to bypassing the law.

, , , , , , ,

No Comments

Smartphones Leak Encryption

Technology Review reports that an attacker my be able to pick up encryption keys from cellphones with a TV antenna:

The antenna was detecting radio signals “leaking” from the transistors on the chip inside the phone performing the encryption calculations. Transistors leak those signals when they are active, so the pattern of signals from a chip provides an eavesdropper a representation of the work the chip is doing. When Kenworthy tuned his equipment to look in the right place, a clear, regular pattern of peaks and troughs appeared on his computer screen. They could be seen to come in two varieties, large and small, directly corresponding to the string of digital 1s and 0s that make up the encryption key.

, , , , ,

No Comments

NSA Creates Secure Call System

Technology Review reports that the NSA has devised a system in which phones with the Android software are able to make encrypted phone calls.

Let’s hope that this tech trickles down to the consumer market.

, , , , ,

No Comments

Web Links Could Compromise Your Smartphone

Technology Review reports that if you have a smartphone that runs a version of Android, be careful about the links you click:

A chilling demonstration to a small, packed room at the RSA security conference today showed how clicking a single bad Web link while using a phone running Google’s Android operating system could give an attacker full remote control of your phone.

, , , , ,

No Comments