Here’s an interesting bit of research to come out of Microsoft and UCSD. The Somniloquy project is a new type of network interface. It’s a USB device that allows a computer to continue network communications after being put to sleep. By offloading these tasks, machines that would normally stay awake for RDP and file transfers are only powered up when absolutely necessary. The device uses a Gumstix board like the one used in the Tor hardware adapter. The device pictured above has two USB interfaces, but the second is just for debugging and not needed for proper operation. The board runs BSD and creates a USBNet bridge to the Vista host. When the host daemon detects the computer going to sleep, it hands off active communication to the gumstix. They developed “stub” applications to handle the various types of communication. For downloads, they used wget to download only the portion of the data that was still left. For bittorrent, they customized the command line client ctorrent to manage the download. Both programs wake up the PC upon completion and transfer the file off of the SD card.
Is your popped collar so epic it emulates horse blinders? Are punk teens always skitching your coattails? Are you constantly moonwalking into power poles, trash cans, and the elderly? [Paul Coudamy]’s Hard-Wear Jacket solves all of these problems. It has a micro-camera embedded in the back of the neck and streams live video to a sleeve mounted monitor. The goal is to expand the perception of the wearer and how they interact with the environment. We know this is just a small step and doubt many people will be scrambling to never turn their neck again. It’s something interesting to contemplate though: how will people behave when brain taps allow their peripheral vision to have the same clarity as normal vision?
Imagine how surprised we were to discover that by accidentally bricking our router we were executing a brand new attack: Phlashing Denial Of Service (PDOS). This week at EUSecWest, researcher [Rich Smith] will present the theoretical PDOS attack. Instead of taking over control of an embedded system, the attacker turns it into a nonfunctioning brick by flashing it with a broken firmware. Anyone who has flashed a device knows the danger of interrupting the procedure.
Continue reading “Phlashing denial of service attack, the new hype”