With a little work, a disposable camera can be turned into a low-cost device for disabling the tracking bugs in many products and ID cards. Radio Frequency ID tags (RFIDs) are tiny bugs that can be embedded in products and ID cards, enabling them to be read at a distance. US passports and London's tube-cards are beginning to incorporate these. Nominally, they can only be read at a few centimeters' distance, but security researchers have demonstrated that they can be read by attackers at 15 or more meters away. With goods, it's hard to tell if you've got an RFID embedded in them and hard to kill them (though you can put them in the microwave and kill them).
Modding a disposable camera's flash to deliver an RFID-killing energy-shock is a pretty cool project if you want a portable way to disinfect your stuff. The London Underground's "Oyster cards" are used as stored-value cards for boarding the tube. They track your movements when you touch in and touch out at the turnstiles. You can avoid the worst of the data-collection if you frequently change Oyster cards, but the Underground has promised to start charging £3 for new cards; however, they promise to replace defective cards for free. With one of these, you could zap your card when it runs out of stored money and trade it for a new one that will have a different serial number and consequently not be associatable with your previous card.
Many times, intrusions into privacy like this are excused on the basis that they offer discounts in exchange for your personal information. This is true with the Oyster card, too: a single ride on the tube costs £3 now if you use a paper ticket, but with an Oyster card the journey is as little as £1.30. The thing is, before they ramped up Oyster card use on January 1, the cost of a paper single was also as little as £1.10 -- in other words, they nearly tripled the cost of an anonymous journey and then told everyone that you got a great discount if you used the privacy-surrendering means.
It generates a strong electromagnetic field with a coil, which should be placed as near to the target RFID-Tag as possible. The RFID-Tag then will receive a strong shock of energy comparable with an EMP and some part of it will blow, thus deactivating the chip forever.
To keep the costs of the RFID-Zapper as low as possible, we decided to modify the electric component of a singe-use-camera with flash, as can be found almost everywhere.
(via Red Ferret
Where are our petabyte drives? Brian Hayes takes us through the reasons storage is “stuck” in the low terabytes. The tl;dr is that we got such exceptional capacity growth in the late 90s and early 00s we don’t need much more right now, so the focus since then has been on SSDs, networking, interfaces, etc, […]
Amélie Lamont, a former staffer at website-hosting startup Squarespace, writes that she often found herself disregarded and disrespected by her colleagues. One comment in particular, though, set her reeling — and came to exemplify her experiences there.
In this episode of the Flash Forward podcast we travel to a future where humans have decided to eradicate the most dangerous animal on the planet: mosquitos. How would we do it? Is it even possible? And what are the consequences? Flash Forward: RSS | iTunes | Twitter | Facebook | Web | Patreon We […]
If you’ve got a killer app idea, but don’t have the technical expertise to pull it off, get a crash course in all things app development with the Comprehensive Android Development Bundle, now over 90% off in the Boing Boing Store. Across 83 hours of training, you’ll learn to develop for the world’s most popular mobile OS, mastering […]
Jared Sinclair developed the RSS reader app Unread, which made $10,000 in its first 24 hours on the iOS market. And we’ve all heard the story of Flappy Bird developer Dong Nguyen, whose creation was reportedly earning $50,000 a day at the height of its 2013 explosion. While those are rare examples, they’re also testament to the […]
If you or your company’s IT system are besieged by black hat cyber attacks, an ethical hacker might be all that stands between crippling damage and a company’s long-term prosperity. It’s no wonder that the market for IT security specialists is exploding. Certification is the key – so learn the tenets of ethical hacking and get […]