Picking up the Register’s story, it seems Linksys has done a really neat PR coup – they have launched their own WiFi phone, and called it iPhone. As you know, there has been a lot of hubbub in the Macosphere the last few weeks about a supposed mobile phone to be launched by Apple, even with rumors of large orders to Taiwanese OEMs. It looks like Linksys beat them to the punch!
Casio PB-1000 unearthed from the vault
Today I was throwing old stuff away from my parents-in-law’s house, when I came across a Casio PB-1000 personal computer, which belonged to my wife. She told me ‘oh, that’s just a calculator I used at school, it used to be good for trig’. In fact, it is a very capable machine (in its time, now your TV’s remote has more processing power than this thing!), it has 8kB of RAM, an RS-232 and floppy drive port, graphic touch screen, and runs for 55 to 100 hours on 3 AA batteries. What really strikes me opening the device is that the keyboard is very similar to the ZX81’s, with all the most used BASIC commands overlaid on each key, and accessible using the shift key. Here is a picture of this ancient device, which brings back many fond memories, such as getting Pong to work.
GMail to handle other providers – Google to mine even more data
So, the great news over at TechCrunch today were that Google has added a feature called Mail Fetcher to GMail, which basically allows you to grab email from other services, such as Yahoo.
This sounds great, and it probably is for GMail users, but it is also great for Google. Someone with legal wits should point a browser towards GMail’s terms & services, and check whether there are any provisions to exclude or include, explicitly or not, the scanning of all incoming and outgoing email from these other services. Maybe Google will also scan the contents of the additional email services you add to your GMail account to send you targeted ads. Maybe Google will have even better demographics by tying the IP addresses found in the headers of all the additional emails with their own database of registered users. There is a saying that nobody sells dimes for 9 cents, it’s a rather good saying to move your wallet by.
Any lawyers in the audience?
Will you fly smoking, non-smoking, or radioactive?
Airport security is doomed to fail in preventing terrorist attacks. Unless they want us to fly naked and possibly even then get an X-ray and proctologist exam before boarding, there is no way they can prevent nasty things happening.
We are currently forced into placing our toiletries (gels, perfume, shaving cream) into a small clear plastic bag, presumably because the small clear plastic bag will contain the brutal force of a liquid explosive going off inside it. Actually, the explosion would not be that spectacular, as The Register explained.
I happened to travel to London from Barcelona on the 20th, but on flight BA477, the early morning one – had I picked the later flight at 11 AM, BA478, I would have been on one of the aircraft contaminated with Polonium-210. On the way back that afternoon, we flew out of Gatwick, as the Heathrow flight was full…which happened to be BA479, also a contaminated flight. Near-miss on both trips.
Polonium-210 is a highly radioactive substance, but which emits alpha particles, which travel slow and cannot even penetrate the human skin. This makes it very difficult to detect, and since a dose of 1 milligram can kill a human, it is very easy to conceal and transport many lethal doses, for example, inside a pen. Delivery to a victim can be through water or food, inhalation, or an open wound. It’s unlikely a terrorist would start placing little pellets of Polonium in the food trays delivered during a flight, but he could empty one of the sub-100cc bottles he conveniently carried onboard in the clear plastic bag in the lavatory, a place likely visited by most passengers during a long flight.
The next obvious question is – how easy is it to obtain Polonium-210? Very easy, actually. Although it is a byproduct of nuclear reactors, United Nuclear sells license-exempt quantities to the general public. How easy is it to obtain Polonium-210 in toxic quantities? Not that easy – a lot of hype has been passed around the media regarding United Nuclear, but as their special note states, you would need to spend $1 million and order 15.000 samples to have a toxic amount of the stuff. Samples ordered are produced on demand at a reactor in Oak Ridge, Tennessee.
We should not worry too much about getting a whiff of Polonium-210 on our next flight, but we should raise against the draconian “security” measures imposed by panels of would-be experts. We are not realizing that the terrorists are winning one battle, which is to make us live in fear and paranoia, when the actual chances of dying in a terrorist attack are smaller than tripping over on the sidewalk and fatally hitting your head on the concrete. Maybe we should outlaw sidewalks…
Vodafone HSDPA with the Huawei E220 USB modem
Went to my local Vodafone store to pick up the new Huawei E220 HSDPA USB modem, which with a 49 Euro monthly contract gives you 1GB of transfer at 1Mbps maximum, and free mobile to fixed landline calls – pretty good deal if you ask me. For 59 Euro you get 5GB of transfer, at the full 3.8Mbps that HSDPA offers. These are theoretical rates, as they will depend on a number of factors, such as how many people are also using the same cell, your coverage and the quality of the link.
We can argue all we want about how convenient WiFi is, being omnipresent et al, but in reality, it’s rather hard to get connected while on the road. Let’s examine the following scenarios, and you tell me the chances of getting connected over WiFi:
- Riding the train or bus home.
- Getting a lift from a friend in his/her car.
- Opening your laptop at a random location (cafeteria, bar, etc. that you haven’t before scouted for open WiFi).
- On a plane, waiting for the next free takeoff slot that you hope the pilot won’t miss because he was checking the fatness of his wallet.
Let’s be honest – free open WiFi is great once you have identified the locations where you can get connected, such as a friend’s house or the local coffee shop. Other solid commercial alternatives make it easier to find WiFi, as they tend to be present at well-known locations. Walk into any Starbucks or hotel, and you’re bound to find at least for-pay wireless.
For me, on the 30 minutes to 1 hour it takes to get home on the train or bus, being able to get connected is great. The convenience of simply opening the Mac and getting online beats the guesswork of WiFi. I tried getting the Mac working with my Nokia N93 over Bluetooth, but it was just too unstable – one day it worked, the next simply refused to even connect. A more in-depth review of the device is coming, once I get a chance to roam about with it for a while.
So far, installation on the Mac was pretty straightforward, download the setup package from Vodafone’s site (they don’t tell you this in the manual), which then enables the modem as a networking device. If you don’t follow this step, it can get recognized as a storage device, which is not particularly useful for a modem. The one thing I don’t understand is why it comes with a miniUSB cable that ends in two USB connectors, my guess is it’s power-related (some USB ports don’t provide the full 500mA they are supposed to provide).
FON fixes maps vulnerability, and why Martin should apologize
You probably remember the post I made regarding FON’s figures, and how much I thought they differed from reality. It got quite a lot of attention, particularly from detractors, and from Martin Varsavsky himself. Many comments were posted on my blog and some others, which pointed towards the fact that I am involved in a startup which supposedly is a clone of FON, and thus I was biased and in no position to comment on FON. To cut a long story short, Martin posted a rather vicious personal attack on his blog, which I answered, he counter-commented, to which I again answered, but he never conceded a bit.
During my investigations that led to the statistics post, I also discovered a serious flaw in the maps management system, which would allow anyone to re-position any FON hotspot and change its address without first logging into the user area.
All that was required was the node’s ID and the hotspot owner’s user ID, both easily obtainable from the public queries that maps.fon.com launches against the database where hotspot data is held, and which I used to gather the statistics. For a determined attacker, it would have been very easy to place every single FON hotspot right in the middle of 1600 Pennsylvania Avenue, Washington DC.
I could have very easily posted about this, but I refrained from doing so for a reason – while I do not work full-time in the IT security industry, I have done quite a bit of consultancy work in the past, related to IT security, particularly in the wireless field. This means that I am fully aware of the industry-approved vulnerability disclosure procedure, which can be explained simply as:
- Document the vulnerability, and inform the company about the fact that you have found it.
- Wait for an initial response, establish contact points, and work a schedule for fixing the issue.
- Work with the company to help them solve the issue.
- Once the issue has been fixed, make a public disclosure on both sides about the vulnerability, giving credit to the person or company that discovered it.
You can find more references to this policy at Microsoft’s Security Response Center, here and here. A PDF from oisafety.org also describes this process in detail. A perfect example on how not to do things is the recent disclosure of a code injection vulnerability, which allowed manipulation of FON’s routers without even having to open them – even though their points are valid, they should have given FON the chance to fix the problem before going public.
In this case, I contacted FON’s support email first September 27th, and received a response on the 29th. This was really generic, only wanting to know about the details, and not acknowledging the normal procedure as I have explained above. On October 2nd, I emailed them again, asking to confirm that they understood the procedure, and on the 3rd they replied that they agreed on following the procedure.
I started compiling the information I had into a working document, but after becoming so frustrated at the attacks received as a result on my post about the statistics, the decision was to simply let the issue go, forget about FON, and concentrate on my own project. A couple of days ago, browsing around for stuff to clean up on the laptop, I came across the half-written report, and decided to finish it and send it to FON support, with CC to Martin, just to close the case. I received a reply today that they have in fact fixed the vulnerability, with a short ‘thanks’ (actually, quoting his email in full: “thanks Mike, i understand its been fixed”) from Martin.
The public acknowledgement of the discovery posted by FON is found in this forum post. Only in the English forums, by a user created apparently for this particular purpose, as this is his first post ever, where it is not likely to draw much attention. This would be fine by me, had not there been the precedent of Martin’s fierce replies to my statistics post, followed by countless attacks by FON’s followers, including an unfortunate incident better left forgotten. What I really cannot understand is that, when I criticize FON, I get such a huge public lashing, whereas when I help them out, I get a three-line remark in a forum where it will go mostly unnoticed. The end result may well be that other vulnerabilities, and it is likely they exist, go unreported.
Whatever the case, this should show those who accused me of unfair, biased attacks on FON that I really just call the shots as I see them, when I smell bullshit, I will point to it, when I see a hole, I will help them fix it – again, IMHO, blogging is not about being or not biased, it is about being ethical and maintaining a set of standards. In my view, it should also prompt Martin to write an apology, but I am not holding my breath. Not that I care much either, what is most important is my work; this is my blog, where I spend part of my spare time, which is not actually that much.