Monday, November 30, 2009
Monday, July 13, 2009
When your yogurt pots start talking to you: Europe prepares for the internet revolution
Tuesday, June 09, 2009
Thursday, May 21, 2009
Wednesday, May 20, 2009
TEI dates 2010
TEI'10 is the fourth international conference dedicated to presenting
the latest results in tangible, embedded, and embodied interaction.
Papers submissions due: 3 August 2009
Studios submissions due: 3 August 2009
Explorations submissions due: 2 October 2009
GSC submissions due: 2 October 2009
is that D-I-Y overuse(d)
showcase-of-methods-communities-and-values-for-reuse-and-
customization/6612273
http://www.tate.org.uk/modern/thelongweekend2009/thelongweekend2009.htm
Wednesday, April 22, 2009
Thursday, March 19, 2009
MIFARE Classic vulnerabilities
the confidentiality of its cryptographic algorithm.
If the algorithm were to be known, it can be exploited in an attack
with the respective expertise. Researchers of the Radboud University
have used knowledge of the algorithm to develop attacks to retrieve
the keys and the data that is stored on the MIFARE Classic card. As
attack software is now publicly accessible on the internet, we expect
that attack equipment will become available soon in order to
facilitate a variety of attacks on MIFARE Classic infrastructures.
These attacks would allow that:
* Through overhearing successful communications between the
reader of an existing infrastructure and a valid card, the data and/
or the keys involved in that transaction could be read
* While overhearing failed communications between the reader of
an existing infrastructure and any card, the key used by the reader
during that transaction could be retrieved
* These attacks could be carried out in minutes or less and with
means involving a laptop and equipment which can be built with
limited material cost (100 Euros)
* Card only attacks are possible in lab environments and at
considerable precalculation time. This is expected to further evolve
into an attack that does not need lab conditions and may require less
precalculation time.*
* One particular card only attack can, with a certain
prerequisite on knowledge about the card, retrieve all keys and data
from the card in about a second per key using a laptop and limited
value equipment. Interaction with the card can be limited to two
times less than a second: first to get material for key recovery and
then once the keys are retrieved an interaction to retrieve the data.*
Although a residual risk remains, there are techniques and
countermeasures to detect cards and data which have been tampered
with, some of which are described in the confidential application
notes published by NXP. We are happy to provide such application
notes to the interested parties (such as system integrators and
service operators) under a Non-Disclosure Agreement.
* (The recent vulnerabilities are courtesy to Radboud University
Nijmegen, who have given early warning to NXP in order to allow
timely communication such that system integrators can take measures).
Thursday, January 15, 2009
SPIMES OPEN UP
According to the restricted definition adopted by OpenSpime, an object is a spime if it has:
- a GPS unit, or other location-aware technologies to know where it is, and when it is
- communcation capabilities with the Internet, directly, or through gateways
- memory for storing its data until it can communicate
- a sensor, to measure a value about the world around it.
Social Hardware
We eagerly participate in online activities, investing our time, and resources to enrich the knowledge that the Internet holds on us. Isn't it time that we started to use the machines to better serve us, instead of the other way around? With the development of ubiquitous sensor networks it won't be necessary anymore that humans serve as eyes, and ears of machines.
These networks will start to collect information about the world in an autonomous fashion, and develop a more active role in the online conversations. Machine to machine communications will be at the basis of these conversations, with the network nodes becoming part of what we call the new social hardware!
In about a month and a half, there will be in San Francisco the third conference dedicated to Web 2.0 – a favorable location for a discussion about the existence (or not) of a "Bubble 2.0".
With the definitive affirmation of blogs, podcasts, wikis, video and photo sharing, social bookmarking and all the other instruments that value the single user as an 'active' part of the web, the continual creation-sharing-reuse of contents ride with an rhythm high as the growth of the number of services that support it. As in 'new economy' era, infact, every weeks born tens of startups (more of 300 in the last two years, as Go Web 2.0 and Categoriz confirm) ready to call for the attention of users about a service, and magazine cover's successes e billionaires acquisitions had the power to expand the capacity of this boom: this time, further, hardware and software costs are decidedly lower, and the offered service is something of 'tangible'.
The success of a new service, if really demonstrated itself different from all the others, however could decree the end: where there's a lack of Venture Capitals and/or the ads are to cover the band costs, naturally proportional to the traffic, the only reason of survival remains the sell to a big company. A favorable choice from the beginning, and it's for this reason that many startup born only to be acquired, creating sometimes a software compatible with other ones of a big group already existent.
Massimo Moruzzi from DTCM, in a post published some weeks ago, said:
Badges are the key element of this kind of design, being the first to flash user eyes, and so extremely important for the right communication of a message with fundamental importance.
Below you'll find some example badges, arranged in four incremental levels, each one related to a different business model.
Level 1