Reverse Geocache

January 30th, 2011 § 1 comment § permalink

Arduino forum member RickP made this “reverse geocache” from a French army medical box. I love the nixie tube display and the fact that it looks like something from a spy movie. The box only opens at the right GPS coordinates, and is trackable on geocaching.com.

He uses an Arduino, a GPS sensor, and a trio of nixie tubes, which indicate the box’s distance from that special spot. When the button is pressed in that spot, a servo motor unlatches the lid.

The large amount of power drawn by the nixie tubes had to be taken into careful consideration. With four D-cell batteries, Rick estimates that the box can do 600 GPS fixes before they run out. Connected to the power button is a latching relay, which allows the Arduino to shut the power off after the GPS fix has been attained.

Nixie tube reverse geocache box via Gizmodo

Subscribe: RSS | Twitter | Email

Tarzan, Cameras and Gunfights [Link Roundup]

January 29th, 2011 § 1 comment § permalink

Subscribe: RSS | Twitter | Email

How to Communicate if Your Government Shuts Down the Internet

January 29th, 2011 § 0 comments § permalink

With Egypt shutting down the internet to control the recent protests and talk of an internet “kill switch” in the US, it might be a good idea to take a look at this Wired How-to Wiki article.

Scenario: Your government is displeased with the communication going on in your location and pulls the plug on your internet access, most likely by telling the major ISPs to turn off service.

This is what happened in Egypt January 25 prompted by citizen protests, with sources estimating that the Egyptian government has cut off approximately 88 percent of the country’s internet access. What do you do without Internet? Step 1: Stop crying in the corner. Then start taking steps to reconnect with your network. Here’s a list of things you can do to keep the communication flowing.

Communicate if Your Government Shuts Off Your Internet

Subscribe: RSS | Twitter | Email

The Deadliest Weapon [Watch]

January 27th, 2011 § 0 comments § permalink

via BoingBoing

Subscribe: RSS | Twitter | Email

A Cryptography Short Film [Watch]

January 26th, 2011 § 1 comment § permalink

The Thomas Beale Cipher from Andrew S Allen on Vimeo.

Subscribe: RSS | Twitter | Email

Protect Yourself Against Warrantless Mobile Phone Searches

January 26th, 2011 § 2 comments § permalink

As a result of recent court cases, it is now legal in California and some other areas of the United States for law enforcement officers to search your cell phone upon arrest without a warrant. An article on Ars Technica provides an explanation of the law and instructions and tips for securing your phone and protecting yourself. Even if you live in an area where these laws do not affect you, it’s still a good idea to ensure the data on your phone is secure, should it fall into the wrong hands.

Last week, California’s Supreme Court reached a controversial 5-2 decision in People v. Diaz (PDF), holding that police officers may lawfully search mobile phones found on arrested individuals’ persons without first obtaining a search warrant. The court reasoned that mobile phones, like cigarette packs and wallets, fall under the search incident to arrest exception to the Fourth Amendment to the Constitution.

[…]

On the other hand, if you are arrested with a mobile phone in your possession but not immediately associated with your person, police may not search your phone without a warrant once you’ve been taken into custody and your phone is under police control.

The takeaway from Diaz, therefore, is that you should store your mobile phone in your luggage, footlocker, or in some other closed container that’s not on your person, particularly when driving an automobile

[…]

Therefore, if you care about your privacy, password-protecting your smartphone should be a no-brainer. Better yet, you should ensure your smartphone supports a secure implementation of full-disk encryption. With this method of encryption, all user information is encrypted while the phone is at rest. While it isn’t absolutely foolproof, full-disk encryption is the most reliable and practical method for safeguarding your smartphone data from the prying eyes of law enforcement officers (and from wrongdoers, like the guy who walks off with your phone after you accidentally leave it in a bar.)

Why you should always encrypt you smart phone via Lifehacker

Subscribe: RSS | Twitter | Email

Wikileaks, Garages and Prisons [Link Roundup]

January 25th, 2011 § 1 comment § permalink

Subscribe: RSS | Twitter | Email

The Latest Issue of WIRED.

January 23rd, 2011 § 1 comment § permalink

If you love Lone Iguana, go download/purchase the latest issue of WIRED. It’s their special “dark side” issue, with articles on deception, crime and everything else that you’d want on Lone Iguana. Here are just a few highlights:

Subscribe: RSS | Twitter | Email

You Can Buy Jason Bourne’s Pencil, But You Can’t Kill Anyone With It

January 22nd, 2011 § 0 comments § permalink

By far, the most popular post on Lone Iguana is the guide to becoming Jason Bourne, a complete analysis of the films. And the most popular item folks click on is the pencil Bourne uses in The Bourne Supremacy.

It’s the rOtring 600 Mechanical Pencil, 0.5 mm. Perfect for crossing names off your list.

bournemonoscope

 

 

How to Crack a Credit Card Number

January 21st, 2011 § 0 comments § permalink

Budget Planner Software – Mint.com

Subscribe: RSS | Twitter | Email