maave-old
Maave
maave-old

I want details on the hack. I don't care about the porn, I wanna know how they hijacked an internet TV stream.

@CaptainJack: I don't know about that, I've never seen Apple respond to a vulnerability. Their vulns don't get big media like other software.

@madog: What? How is Google even relevant?

KILLER. That's the coolest fucking thing I've ever seen for the iPhone. Somebody finally has a cool RCE exploit. This is wicked, I want more information. If you click around the source links you've find this page

The "no-hassle setup" sounds like a weak point. Does anybody know what kind of security is on Logitech IP cameras? The camera might make the area secure, but the camera itself doesn't seem too well protected.

@RadRique: oh crap, spoilers. I better leave this topic.

The bear on the box is creepy.

That looks incredibly badass, but slightly too large for general day-to-day work. They should make a simpler design but still have the hand-like form, it would be great for normal users.

@CSX321: it's most likely both, seeing as all new Macs are 64-bit.

@headc4se: that would be fantastic, especially in packages like this.

@cyberXwarrior: Jeez, it's huge. Maybe dual monitors would be better ...

MIT can do freaking anything.

Isn't there a monitor that's just double-widescreen? Having large gaps in the viewing area looks like it'd suck during game play.

I would prefer a hidden pocket on the inside of my pants. Then carry a slim wallet with important stuff in the secret pocket and a decoy wallet in your back pocket. Transfer money from one to the other when the decoy gets low.

Chan imageboards are the new Usenet. Get hip, go channing.

@takkun1946: oh, duh, it just hit me: 3G and CDMA probably lack the (idiotic) "no-encryption" switch that can be sent with GSM

@Maave: also, what prevents the spoofing of other types of towers, such as 3G and CDMA?

@AHSSouhleris: you just need the receiving equipment for cracking GSM, no emitters or tower spoofing needed.