Interesting to see the BBC’s summary of the current iPhone update story: “Apple issues an update which damages iPhones that have been hacked by users”. I’m not sure that’s quite how Apple’s PR people would have put it, but it’s interesting to see that whoever […]
All posts filed under “Reverse engineering”
The Hacker’s Amendment
Congress shall pass no law limiting the rights of persons to manipulate, operate, or otherwise utilize as they see fit any of their possessions or effects, nor the sale or trade of tools to be used for such purposes. From Artraze commenting on this Slashdot […]
Instructable: One-Touch Keypad Masher
It’s been a long time since I last wrote an Instructable, but as I’ve resolved that 2009’s going to be a year where I start making things again (2008 involved a lot of sitting, reading and annotating, and in 2007 most of what I made […]
Changing norms
Via Steve Portigal’s All this ChittahChattah, a short but succinct article by John King, from the San Francisco Chronicle noting just how quietly certain features have started to become embedded in our environment, most notably (from this blog’s point of view), anti-skateboarding measures, traffic calming […]
Some links: miscellaneous, pertinent to architectures of control
Ulises Mejias on ‘Confinement, Education and the Control Society’ – fascinating commentary on Deleuze’s societies of control and how the instant communication and ‘life-long learning’ potential (and, I guess, everyware) of the internet age may facilitate control and repression: “This is the paradox of social […]
Ed Felten: DRM Wars, and ‘Property Rights Management’
At Freedom to Tinker, Ed Felten has posted a summary of a talk he gave at the Usenix Security Symposium, called “DRM Wars: The Next Generation”. The two installments so far (Part 1, Part 2) trace a possible trend in the (stated) intentions of DRM’s […]
Friend or foe: Battery-authentication ICs?
Via MAKE, an article from Electrical Design News looking at lithium battery authentication chips in products such as phones and laptops, designed to prevent users fitting ‘non-genuine’ batteries. Now, the immediate response of most of us is probably “razor blade model!” or even “stifling democratic […]
Freedom to Tinker – The Freedom to Tinker with Freedom?
At Freedom to Tinker, David Robinson asks whether, in a world where DRM is presented to so many customers as a benefit (e.g. Microsoft’s Zune service), the public as a whole will be quite happy to trade away its freedom to tinker, whether the law […]
BoingBoing podcast – direct link
Here’s the direct link for that new BoingBoing podcast – www.archive.org/download/…/boingboingboing_1_64kb.mp3 . BB were almost the last people I’d expect to wrap up their audio in a Flash interface! Still, ‘View Source’ is a lot easier than having to use a Flash decompiler to extract […]
‘Fair use, Xbox hacking, and how far will Linux users go to get a cheap PC?’
Adrian Kingsley-Hughes, in ZDNet’s Hardware 2.0 blog, asks whether it is ‘ethical’ for users to install GNU/Linux on an Xbox, or in general, to use hardware they have bought in whatever way they wish. “First, is it ethical to hack an Xbox or any other […]