Category Archives: Sufficiently Advanced Technology

The New York Times Thinks It Can Beat You at Rock-Paper-Scissors

The NYT has an online game of rock-paper-scissors where you play a computer. The computer can be at “novice” or “expert” mode. Supposedly players fall into patterns that the computer can detect, and “expert” mode is based on those patterns while “novice” starts from scratch. I played 20 rounds at expert mode, often deciding what to play then changing my mind at the last minute to the opposite.

My final score was 7-6-7, that is seven wins, six ties, seven losses, which I assume is very consistent with what one would expect from a random outcome. Is there anything to this?

Posted in Sufficiently Advanced Technology | 4 Comments

What Could Possibly Go Wrong?

Intel’s Sandy Bridge Processor Has a Kill Switch – Slashdot.  It’s remotely activated over a 3G network — no Internet connection required.   It’s advertised as a way to turn off the machine if it is stolen.

DDOS anyone?

Posted in Sufficiently Advanced Technology | 1 Comment

RFID Chips In People?

RFID

Image © by midnightcomm. Some rights reserved.

Slashdot reports,

CNET has reported that Japanese schoolchildren in the city of Osaka will be tagged with RFID tags. Apparently this is in addition to the trial program in Tabe that The Register reported earlier, where parents can track their children on their way to school.

See also, Politech, Mexican officials get selves chipped with implants in arms.

[Original draft 7/14/2004. In preparation for my blog redesign, I found draft blog posts that somehow never made it to publication. This is one of them.]

2010: Still weird, I hope. Of course RFID in pets and livestock is becoming commonplace, so maybe people are not far behind.

Posted in Sufficiently Advanced Technology | 4 Comments

Oh Yes

xkcd: Tech Support nails it.

Posted in Sufficiently Advanced Technology | Comments Off on Oh Yes

Sign You Live in a Wealthy Society

Sony makes Tweeting device for cats.

Posted in Sufficiently Advanced Technology | Comments Off on Sign You Live in a Wealthy Society

Is Your Aftermarket Cellphone Charger Phoning Home?

Risks of USB chargers for cell phones from Paul Pomes writing in The Risks Digest Volume 25, Issue 90:

My wife recently purchased a no-name third-party USB charger for her Droid cell phone. When the included cable is connected to the USB port of her laptop, the phone charges normally albeit somewhat slowly. Connecting the cable to the included voltage-sensing wall transformer starts a menagerie of interesting effects: opening applications, creating garbled text messages, changing settings, etc. No doubt this is due to floating signal lines with induced voltages that is triggering this storm of activity.

It takes little imagination, however, to visualize more sinister applications. A very small amount of logic, specific for each cell phone model the charger is marketed for, could be embedded inside the plastic transformer block. After a few minutes delay the phone could be probed for sensitive information and the results sent to an electronic dead-drop. The risk is a classic trade-off of security vs convenience. Having a single charger for our Kindles, cell phones, PDAs simplifies the number of ancillary chargers we need to tote around. Mixing the mission of power supply and data conduit opens a covert channel.

Paul Pomes, DVM (formerly a network and computer security engineer until I got tired of meetings)

I suspect phone hacks of one sort or another could be the tech privacy story of the next two years. Phones are getting more powerful; they're minicomputers now and used for drafting email and short documents and even spreadsheets. Plus, there's just a lot less anti-virus tech available and in use than for PCs. Most importantly, people don't yet think of their phones as soft targets.

Posted in Sufficiently Advanced Technology | Comments Off on Is Your Aftermarket Cellphone Charger Phoning Home?