Friday 31 December 2010

Coming soon...

Illustration: 'exiledsurfer'
Loading 2011 ███████████████]99%

Counting down...

 
Welcome to the 7th annual X-Mix, an end of the year mixtape celebration. As always, these aren’t necessarily songs released this year, but just a collection of things I’ve listened to in 2010. Thanks to Bobby and Fred for the non-rap influences. The ghosts of X-Mix past (2004-2009) can be downloaded here
Who Is The Ginger In Charge Over Here
X-Mix 2010, by DJ Freckled Ninja

57:17
watch (vimeo) | download (89mb)
Track list:
1) East Bound And Down, S02E04
2) Die Antwoord, Enter The Ninja
3) Grimes, Gambang
4) Waka Flocka Flame, Same Shit
5) Toots & the Maytals, Take Me Home Country Road
6) Gucci Mane, Georgia’s Most Wanted
7) Beach House, Walk In The Park
8) Bobby Creekwater, Pursuit Of Greatness
9) DJ Rupture, Reef: Baby Kites and Nokea
10) Tim Maia, Imunização Racional
11) Twin Sister, Lady Daydream
12) Big Boi, Follow Us
13) Waka Flocka Flame, Walmart Money
14) Kanye West, Blame Game
15) The Notorious B.I.G., Come On
16) Die Antwoord, Rich Bitch
17) Girl Talk, That’s Right
18) Das Racist, Return To Innocence
19) Curren$y, King Kong
20) Freddit Gibbs, National Anthem
21) Nacey, Bulletproof
22) Big Boi, Fo Yo Sorrows
23) Rick Ross, B.M.F. (Blowin’ Money Fast)
24) Toots & the Maytals, 54-46 Was My Number
25) Balam Acab, Big Boy
@'F.A.T.'

Hackers crack open mobile network

Karsten Nohl and Sylvain Munaut demonstrated their eavesdropping toolkit at the Chaos Computer Club Congress (CCC) in Berlin.
The work builds on earlier research that has found holes in many parts of the most widely used mobile technology.
The pair spent a year putting together the parts of the eavesdropping toolkit.
"Now there's a path from your telephone number to me finding you and listening to your calls," Mr Nohl told BBC News. "The whole way."
He said many of the pieces in the eavesdropping toolkit already existed thanks to work by other security researchers but there was one part the pair had to create themselves.
"The one piece that completed the chain was the ability to record data off the air," he said.
In a demonstration at the CCC, the pair took attendees through all the steps that led from locating a particular phone to seizing its unique ID, then leap-frogging from that to getting hold of data swapped between a handset and a base station as calls are made and texts sent.
Key to grabbing the data from the air were cheap Motorola phones which can have their onboard software swapped for an open source alternative.
"We used the cheap Motorola telephones because a description of their firmware leaked to the internet," he said.
This led to the creation of open source alternative firmware that, he said, has its "filters" removed so it could see all the data being broadcast by a base station.
Bunch of keys, BBC  
The eavesdropping work builds on earlier work to list GSM encryption keys
This allows attackers to home in on the data they need to eavesdrop, said Mr Nohl. The encryption system that scrambles this data can be defeated using a huge list of encryption keys, called a rainbow table, that Mr Nohl generated in a separate research project.
"Any GSM call is fair game," he said.
GSM is the name of the technology used on the vast majority of mobile phone networks around the world. The GSMA, which represents operators and phone makers, estimates that there are more than five billion GSM mobiles in use around the world.
The GSMA has not responded to requests for comment about the research.
Playing around Simeon Coney, a spokesman for mobile security firm Adaptive Mobile, said the work looked fairly thorough.
"Especially interesting is how the attack is aimed at a specific target phone, which could lead to malicious interest of high value targets," he added.
"This isn't an attack that is today readily repeatable yet by the anyone unfamiliar with the underlying technology," he said. "However, it does illustrate the manners in which the mobile phone system could be compromised in a focussed attack in less protected markets."
Mr Nohl said that before now commercial equipment that could spy on calls cost upwards of £35,000. The kit demonstrated at the Berlin event cost far less than that, he said. For instance, the Motorola phones used to grab data cost only 10 euros (£9) each.
Despite showing off the entire eavesdropping kit, there were no plans to release all of it for others to use, said Mr Nohl.
However, recreating the missing parts would not be difficult for a tech savvy amateur, he added.
"I expect people to do it for the fun of doing it."
Mr Nohl said the motivation for carrying out the research was to create awareness around the problem and perhaps prompt operators to improve security.
A few simple steps could make it much harder for eavesdroppers, he said.
"Raising their awareness is the most likely outcome, but the technical changes would be better."
@'BBC' 

PRESENTATION SLIDES

Another Way of Seeing

The WikiLeaks War on America

Fresh eyes needed on WikiLeaks’ treasure trove of secrets

Wikileaks Rest in Peace

Wikileaks 'should lead to greater transparency'

The Verdict Is In

America & The Middle East

Great sacrifices, small rewards

Like Father Like Son

Daniel Assange somnidea That is to say: "Naon Tiotami".chars.each_with_index.map {|ch, i| ch.ord-"Jack Scanlan"[i].ord }.inject(:+) == 42 @jessovenden

How to confuse an idiot

Not quite Kelvin Hall

RE:post - Exile's Weird story of the year: Oral conception. Impregnation via the proximal gastrointestinal tract in a patient with an aplastic distal vagina. Case report.

mary
[Ed. note: There is no abstract, so we're including most of the original article below. It's a bit long, but trust us--it's worth the read!]
“Case report:
The patient was a 15-year-old girl employed in a local bar. She was admitted to hospital after a knife fight involving her, a former lover and a new boyfriend. Who stabbed whom was not quite clear but all three participants in the small war were admitted with knife injuries.
The girl had some minor lacerations of the left hand and a single stab-wound in the upper abdomen. Under general anaesthesia, laparotomy was performed through an upper midline abdominal incision to reveal two holes in the stomach. These two wounds had resulted from the single stab-wound through the abdominal wall. The two defects were repaired in two layers. The stomach was noted empty at the time of surgery and no gastric contents were seen in the abdomen. Nevertheless, the abdominal cavity was lavaged with normal saline before closure. The condition of the patient improved rapidly following routine postoperative care and she was discharged home after 10 days.
Precisely 278 days later the patient was admitted again to hospital with acute, intermittent abdominal pain. Abdominal examination revealed a term pregnancy with a cephalic fetal presentation. The uterus was contracting regularly and the fetal heart was heard. Inspection of the vulva showed no vagina, only a shallow skin dimple was present below the external urethral meatus and between the labia minora. An emergency lower segment caesarean section was performed under spinal anaesthesia and a live male infant weighing 2800 g was born…
…While closing the abdominal wall, curiosity could not be contained any longer and the patient was interviewed with the help of a sympathetic nursing sister. The whole story did not become completely clear during that day but, with some subsequent inquiries, the whole saga emerged.
The patient was well aware of the fact that she had no vagina and she had started oral experiments after disappointing attempts at conventional intercourse. Just before she was stabbed in the abdomen she had practised fellatio with her new boyfriend and was caught in the act by her former lover. The fight with knives ensued. She had never had a period and there was no trace of lochia after the caesarean section. She had been worried about the increase in her abdominal size but could not believe she was pregnant although it had crossed her mind more often as her girth increased and as people around her suggested that she was pregnant. She did recall several episodes of lower abdominal pain during the previous year. The young mother, her family, and the likely father adapted themselves rapidly to the new situation and some cattle changed hands to prove that there were no hard feelings.
Comments
A plausible explanation for this pregnancy is that spermatozoa gained access to the reproductive organs via the injured gastrointestinal tract. It is known that spermatozoa do not survive long in an environment with a low pH (Jeffcoate1975), but it is also known that saliva has a high pH and that a starved person does not produce acid under normal circumstances (Bernards & Bouman 1976). It is likely that the patient became pregnant with her first or nearly first ovulation otherwise one would expect that inspissated blood in the uterus and salpinges would have made fertilization difficult. The fact that the son resembled the father excludes an even more miraculous conception.”
@'Discover'

♪♫ Hans Unstern - Ein Coversong

♪♫ Gisbert zu Knyphausen - Hurra hurra so nicht !