SplinterNet is an Android app designed to create an unblockable Twitter like network that uses no cellular or Internet communications. All messages are transmitted over Bluetooth between users, creating a true peer-to-peer messaging system. All messages are anonymous to prevent retaliation by government authorities.
1. Sucker the internet into doing free work or performance for a chance at fame or money.
2. Monetize the audience and own their content.
Unduress is a service to close one of the last remaining security vectors in your data storage scheme: rubber-hose cryptanalysis. It creates a password scheme that irreversibly locks encrypted files when particular passwords are used.
How does it work? Is there an API?
We only keep one thing on the server: matched pairs of random keys and random codes for each key, like so:
(key1, code1) : (key2, code2)
All keys and codes are 32-character strings over the alphabet (A-Za-z0-9-_).
key1is accessed (i.e., when you decrypt your data),
code2is reset to a random value. When
key2is accessed (when you type in your duress password),
code1is randomised, and subsequent decryptions relying on it fail.
…somebody write this into a cypherpunk novel already.
Now, the only problem I can see is that…
This site is hosted on Google App Engine. Google’s legal, logging and backup policies may differ from my own.
… and that’s kind of a dealbreaker. So you might want to grab their code and roll your own.
In this life, it’s important to balance your own resourcefulness with asking for help when you need it. More often than not, though, technology makes us lazy. Then, we need a kick in the pride.
Enough kicks and we might even learn how to be resourceful about being resourceful.
This is just 101 stuff.
“The word hack doesn’t really have 69 different meanings”, according to MIT hacker Phil Agre. “In fact, hack has only one meaning, an extremely subtle and profound one which defies articulation. Which connotation is implied by a given use of the word depends in similarly profound ways on the context. Similar remarks apply to a couple of other hacker words, most notably random.”
I looking for suggestions on how to get a can of dr pepper down to the temperature where it just starts to get slushy but not freeze and then stay there. My current approach is to stick it in a bucket filled with ice and salt wAter, stick that in the freezer for 20 mins, then enjoy.
A lesson on the history of philosophy may seem out of place in a position paper by a computer scientist about a pragmatic problem. But Kierkegaard, who lived a century before the electronic computer, gave us the most profound understanding of what a hacker is. A hacker is an aesthete.
Brian Harvey, Computer Hacking and Ethics
Circa 2013 cr03.org | Theme by Eleven Themes