An anonymous reader of Dave Farber's Interesting People list has discovered a glaring flaw in the TSA's protocol for secondary screening:
today at newark airport i used a paperless electronic boarding pass on my cell phone (as i usually do). i got through the id check, stripped down to my skivvies (almost), and as i was about to walk through the magnetometer (they still have those at united newark), they were yelling out that they were checking boarding passes, take them along through the mag.
i said, it's on my phone, you really want i should take my phone through the mag?
they said "no, only take your paper boarding passes".
huh? sure enough, if you said you used a mobile boarding pass, they believed you (anddidn't even look at it (of course, only another scanner could really verify its authenticity.)
so after a bit of conversation, i found out that they were checking the paper boardingpasses to check for the dreaded four esses, meaning "secondary screening". if you are randomly selected for secondary screening at checkin, they currently won't issue you an electronic boarding pass, you have to do a manual check-in.
so now they have created a situation where someone selected for secondary screening can get through the id check with their paper boarding pass showing the SSSS, and then, when they reach the mag where the screening would occur, simply lie, saying they are using an electronic boarding pass to avoid secondary screening.
the latest in TSA improved stupidity equips people to avoid a secondary search
(Image: ssss.JPG, a Creative Commons Attribution (2.0) image from jcortell's photostream)
Randal Munroe nails it again in an XKCD installment that expresses the likelihood that your houseguests will be able to connect to your wifi (I confess to having been the “firmware” guide — but also, having been reminded to do something about my own firmware when other difficult houseguests came to stay).
Facebook spokespeople and cryptographers say that Facebook’s decision to implement Open Whisper Systems’ end-to-end cryptographic messaging protocol in such a way as to allow Facebook to decrypt them later without the user’s knowledge reflects a “limitation” — a compromise that allows users to continue conversations as they move from device to device — and not […]
A new phishing attack hops from one Gmail account to the next by searching through compromised users’ previous emails for messages with attachments, then replies them from the compromised account, replacing the link to the attachment with a lookalike that sends you to a fake Google login page (they use some trickery to hide the […]
One of the best ways to progress a career in project management is through earning recognized certifications. These certifications carry significant clout and don’t require expensive tuition or student loans. This Ultimate Project Management Certification Bundle is a great example of an affordable way to get ahead. It includes training for 9 certifications including PMP, […]
There’s nothing quite like the rush of playing against a real human opponent. But from a developer standpoint, creating fun multiplayer experiences is incredibly complex. Fortunately, the Unity3D game engine has made all aspects of game creation, including multiplayer functionality, as accessible as ever.This Unity Course Bundle introduces all of the necessary elements of creating […]
The 2016 World Series game 7 will undoubtedly go down in history as one of the greatest baseball games of all time. With endless suspense, a nefariously-timed rain delay, and extra innings, it reminded over 40 million viewers why they love America’s pastime – and why all bets were truly off in 2016. Savor the […]