Bypassing The IPhone Passcode Lock In Live Webcast

[Jonathan Zdziarski], a data forensics expert and iPhone hacker, will demonstrate in a live O’Reilly webcast on September 11, 2008, how to bypass the iPhone passcode lock security. Although the presentation is targeted towards law enforcement, it will probably viewed by a lot of hackers and geeks, who could use the information for good or evil. It also doesn’t strike us as very good security if the iPhone passcode is easily bypassed. Then what’s the point of having one?

[via Gizmodo]

The Phone Phreaking Files

[Jason Scott] curated a nice collection of links related to [Phil Lapsley]’s work on phone phreaking. [Lapsley]’s book, The History of Phone Phreaking, will be released in 2009. Meanwhile phone phreak enthusiasts can peruse his site and bone up on some interesting material, including documents that revealed the inner workings of the telephone switchboard(PDF), and the Youth International Party Line (YIPL)/Technological American Party (TAP) FBI files(PDF), which is really intriguing for the various doodles and conversations that were documented. If you have some spare time, we definitely recommend sifting through it.

[via Waxy]

Welcome To The Petacentre

[Cory Doctorow] obtained access to a few data centers that deal in petabyte storage. The demand for data storage and processing doesn’t show any sign of stopping. It’s especially relevant when people need the resources to manage not only things like Google searches, but also email, customer transactions, and in the case of CERN, physics calculations. [Doctorow] drew an interesting conclusion from his experiences with the data centers; any innovation that the petabyte centers work on will eventually drift on down to the ordinary user, in laptop or desktop innovation. The petabyte center is easily duplicated with materials that are available for purchase to the average computer user; the only obstacles are price and space.

[via Boing Boing]

MySpace Cofounder Tom Anderson Former Hacker

MySpace users are very familiar with the visage of their first “friend” and MySpace cofounder [Tom Anderson], but did you ever wonder what he used to do before he became everyone’s friend? TechCrunch’s investigative reporting revealed that [Tom] was a hacker in the eighties who hacked into the Chase Manhattan Bank computer system, which attracted the attention of the FBI. Under the handle “Lord Flathead”, he became the leader of a black hat hacker group by the time he was fourteen. His activities (along with those of other hackers) led to one of the largest FBI raids in California history. Because he was a minor at the time, he was not arrested, but put on probation in exchange for an agreement to stop committing computer crimes. This definitely makes having [Tom Anderson] on your friends list just a bit more interesting, doesn’t it?

[via Digg]

Tiny Cubic PC


We’ve been watching the progress of the Space Cube since 2004, but PC Pro managed to get their hands on it first. Developed by the Shimafuji Corporation, it comes with 16 megabytes of flash memory and a version of Red Hat is run off a 1 gigabyte CompactFlash card. The design of the Space Cube is pretty minimal, but it’s got the basics down, from a USB port to a VGA output and a D-SUB RS232 input, and even an Ethernet port. The most interesting thing about it is the Space Wire port, which is a proprietary interface use by NASA, the ESA, and JAXA for outer space. Unfortunately for working hackers, this ingenious micro-computer will set you back about £1,500.

[via NOTCOT]

Create Your Own Playlist Hosting Service With Opentape


While Muxtape takes a breather to resolve an issue with the RIAA, Lifehacker has a step by step guide on installing and running Opentape, an open source PHP web application that’s similar to Muxtape. Take matters into your own hands and create your own version of playlist hosting heaven. Since Opentape is open source, you can adapt it and make it an even better application. Maybe your creation will be even more popular than Muxtape… and will lead to the same problems with the RIAA.

Testing IR Camera Blocking

[youtube=http://www.youtube.com/watch?v=0u5hAfnq2-4&hl=en&fs=1&rel=0][randy] from F.A.T. tested the theory that infrared LEDs can actually hide you from the prying eyes of surveillance cameras. We’ve previously covered camouflage, IR, and other suggestions for eluding the cameras, but haven’t taken to sewing stuff onto our clothes yet. [randy] lined his hoodie with high-intensity infrared LEDs, hoping to create a halo effect that would hide his head, and tested his results. Unfortunately, his efforts were unsuccessful. He tested many many different combinations and we’re confident in his conclusion that it would be very hard to make this work.