Invisible Things

Invisible things is the website of Joanna Rutkowska, who is very interested in stealth malware insertion into kernels. She came up with the ‘blue pill’, which is a stealth VM in the kernel running side by side with the normal kernel and is pretty much undetectable. A whole load of different attack vectors are explored in the site, as well as a taxonomy for stealth malware – a sector virtually ignored by the anti-virus community.

More mouseless stuff

I sometimes spend 14 hours a day working behind a PC. Any action that requires me to push the rodent around annoys the crap out of me.

So I’ve ditched the mouse and gone with a Wacom pen for the times that I can’t avoid it.

I also use Ratpoison as a window manager, so I can perform basic UI operations without resorting to the rodent. Also, Ratpoison doesn’t clutter up my interface with useless crap like “window decorations”, “window buttons” or “interface themes”. I don’t like them, I don’t use them and I really have a better use for my screen real-estate.

Because I do a lot of web development stuff, I use the Firefox plugin Conkeror most of the time.

I email with mutt, read feeds with snownews, edit anything non-binary with VIM, edit binaries with BIEW, read Usenet with tin, watch movies (on a remotely controlled display) with mplayer, I play music with mp3blaster and manage my ipod with gnupod.

For experiments with alternative inputs that do require pointing devices, I’m interesting in Dasher, which you really should check out if this is your kind of thing.

RFID Credit Cards

Yes, after having proven time and again that RFID is not safe (it’s easily readable and copyable) those twits at the credit card companies have helped enable fraud on a massive scale by deploying RFID on credit cards. Naturally none of your data is protected at all (like, for example encryption) and (almost) all the necessary data to make a credit card purchase is on the chip. Of course that didn’t take too long to make a workable hack of and over 20 credit cards (which is every one the researchers tried) were vulnerable. Easily. You could just tatoo you credit card on your forehead, but that would be too difficult for criminals – they’d have to copy the data using writing or pictures.

The liquid plot

Here’s a chemist’s take on the plausibility of the London liquid bomb plot, followed by commentary on what he calls Potemkin security. He references Schneier, and goes on about the practicality of security against these kind of plots (as almost everything can be impregnated with nitrates, such as clothing) and the practicality of guarding against these specific threats. Yup, we all need cavity searches and x-rays before we board the planes naked.

Verichip implanted RIFD hacked

Verichip implants a tiny RFID chip in you which contains a unique ID which will identify you at hospitals, allowing doctors to find you in the database and find your file for you.
At HOPE they demonstrated that the Verichip has no encryption and no question / response mechanism, meaning that using an RFID reader and a laptop you can clone someone’s identity no problem as writing this data to an RFID chip is no problem either.