In this video, Flickr user Chriswoebken dissolves one of the London Underground's RFID-based Oyster cards with nail-polish remover, leaving behind nothing but the chip and its antenna -- and then gets on and off the tube using nothing but a flimsy bit of electronics, sometimes in his hand, sometimes taped to a sheet of paper.
I've been trying to come up with a good Oyster killing method since Transport for London made Oysters near-mandatory (you can't get a week-long pass without any Oyster anymore, and the buses are incredibly expensive if you don't pay by Oyster). In my ideal world, I'd pay cash for an Oyster card, use it for a couple weeks, trash it, and get a new one, so that there would be no long-term ride history for me on file.
Unfortunately, the ticket-agents have started to charge £3 for replacement Oyster cards, which I'm sure they'd waive if the card was malfunctioning. Microwaving the card leaves behind some unfortunate burn-marks.
The nice thing about this video is that it hints at the location of the RFID chip in the Oyster, which appears to be one of the corners. Anyone know which?
(via Beyond the Beyond)
M. David Weisman, a magistrate judge in Illinois’s Eastern Division, denied a federal warrant application that would have allowed law enforcement officers to force suspects to unlock their mobile devices with a fingerprint, ruling that the suspects’ Fourth Amendment (undue search and seizure) and Fifth Amendment (self-incrimination) rights protected them from being forced to unlock […]
Elenco’s Night ‘n Day Mechanical Globe uses a system of translucent, exposed gears to rotate an internally illuminated globe that displays the seasonally adjusted, real-time night/day terminator as it spins.
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]