Have you heard about this One? At least three United States senators have, and they want to know what Amazon plans to do with all the biometric data collected by the Amazon One program. It’s their new contactless payment method that uses your unique palm print instead of cards or phones to make purchases, gain access to venues of work and play, and enter or pay in whatever other spaces Amazon can invade down the line. The idea is that one day, we’ll all be able to leave our homes without any form of money or ID of any kind, because we’ll all be stored away in Bezos’ big biometric file cabinet.
We tossed this one around in the writer’s room back when the Amazon One concept was nothing but a pile of buzzwords and a render or two, but these kiosks are now active in 50+ Whole Foods and Amazon 4-Star locations across the US. Here’s the deal: you can only sign up at a participating store that has a kiosk, because they have to scan your palms into the system. We were worried that the signup kiosk could easily take fingerprint scans at the same time, but according to the gifs in Morning Brew’s review, it just uses another of their point-of-sale palm scanners along with a touch screen and a card reader. But you still have to hover your entire hand over it, so who’s to say that the scan ends where the fingers begin?
Continue reading “Ask Hackaday: What Is Amazon Thinking By Entering The Palm-Reading Business?”
In case you needed more confirmation that we’re living in the future, a flight on approach to Los Angeles International Airport on Sunday night reported “a guy in a jet pack” flying within about 300 yards of them. A second pilot confirmed the sighting. It’s worth watching the video after the break just to hear the recordings of the conversation between air traffic control and the pilots.
The sighting was reported at about 3,000 feet which is an incredible height for any of the jet packs powerful enough to carry humans we’ve seen. The current state of the art limits jet pack tech to very short flight times and it’s hard to image doing anything more than getting to that altitude and back to the ground safely. Without further evidence it’s impossible to say, which has been an ongoing problem with sightings of unidentified flying objects near airports.
While superheros (or idiots pretending to be superheros) flying at altitude over the skies of LA sounds far fetched, the RC super hero hack we saw nine years ago now comes to mind. At 300 yards, that human-shaped drone might pass for an actual person rather than a dummy. This is of course pure speculation and we don’t want to give the responsible members for the RC aircraft community a bad name. It could have just as easily been trash, balloons, aliens, or Mothra. Or perhaps the pilot was correct and it was “some guy” flying past at 3,000 feet. That’s not impossible.
We anxiously await the results of the FAA’s investigation on this one.
Continue reading ““A Guy In A Jet Pack” Reported Flying Next To Aircraft Near LAX”
Taking a break from his book, “How to Gain Enemies and Encourage Hostility,” [FPS Weapons] shows us how to build our own handheld EMP generator which can be used to generate immediate dislike from anyone working on something electronic at the hackerspace.
The device is pretty simple. A DC source, in this case an 18650 lithium battery cell, sends power to an “Ultra High Voltage 1000kV Ignition Coil” (as the eBay listing calls it), when a button is pressed. A spark gap is used to dump a large amount of magic pixies into the coil all at once, which generates a strong enough magnetic pulse to induce an unexpected voltage inside of a piece of digital electronics. This usually manages to fire a reset pin or something equivalent, disrupting the device’s normal operation.
While you’re not likely to actually damage anything in a dramatic way with this little EMP, it can still interrupt an important memory write or radio signal and damage it that way. It’s a great way to get the absolute shock of your life if you’re not careful. Either from the HVDC converter or the FCC fines. Video after the break.
Continue reading “Become Very Unpopular Very Fast With This DIY EMP Generator”
This “security” is so outrageous we had to look for hidden cameras to make sure we’re not being pranked. We don’t want to ruin the face-palming realization for you, so before clicking past the break look closely at the image above and see if you can spot the exploit. It’s plain as day but might take a second to dawn on you.
The exploit was published on [Mark C.’s] Twitter feed after waiting a couple of weeks to hear back from TP-LINK about the discovery. They didn’t respond so he went public with the info.
Continue reading “TP-LINK’s WiFi Defaults To Worst Unique Passwords Ever”