Categories
Web

Ze Frank – Emotion on The Web

Ze Frank explains some of his awesome online ideas and projects in this brilliant TED talk.
And if you don’t know Ze Frank, Sportsracer, it’s about time you did!

Categories
Computing Technology

Put it in your pipe and store it – thoughts on data storage

Roelof Temmingh introduced a fascinating idea in his talk on tea at Zacon II yesterday, and I woke up this morning with some free time and an iPad handy, so I decided to explore the concept of using a “series of tubes” as a storage medium a little closer. At this stage it’s just a gathering of thoughts but hopefully I’ll take the time at a later stage to throw some code behind the idea too.

So all around us we have this connectivity between digital devices. These “pipes” take a number of different forms – the interwebs uses mainly copper and fiber, cell phones using allocated GSM spectrum, WiFi and WiMax similarly using “air” as their means of transport, satellite, fibre-attached storage, USB cables, IP over power lines, the list goes on. The important thing here is that when data enters one of these transport mediums it is effectively stored within that medium during transit. It no longer needs to exist at the source or destination, but out of tradition and habit it usually does. A great example of this transitory data storage is cellular voice traffic – it is effectively split into packets which are sent over the “air” as fast as possible, never remaining stationary until they reach the destination where they are effectively “deleted” when they are consumed.

But what if the data being transferred is never allowed to reach a termination point? It could be looped and for as long as the signal stays alive in the medium that data will be stored there. Could it be possible to send a file into GSM spectrum – the air – and keep it there? And what exactly are the data storage limitations of “air”?

Considering this idea was pitched at a security conference, we need to examine how the security and integrity of the data can be maintained in a rather intangible medium. Presumably encryption of the data before transmission solves part of the problem, with hash sums helping out too. But do we need to firewall this? After all, data in transit is ripe for interception – Bug #0 in IT security is the fact that only immovable data can be 100% secure, but data is useless until it is moved. And how do you firewall a copper cable? A GSM signal? Something to think about…

Another good analogy is to think of treating data more like electricity than we traditionally have. Electricity doesn’t get syn/acked to your plug when you switch it on – it’s stored in the medium.

The simplest implementation I can think of is a peer to peer setup, where Alice drops her file onto the wire, with Bob as the “destination” (sorry I’m pissing all over the crypto guys here). But all Bob has is a reflector running which bounces that data straight back at Alice, who in turn has a reflector which pushes it back to Bob again. Introduce more reflector peers as you desire. A lot of Worms succeed by working in similar fashion. Of course Alice needs a way to pull her file back. Some sort of signal can be pushed onto the wire, chasing the file and telling the reflectors to pass it through Alice’s node for a read/write transaction. Each node, whether it be a router or reflector, of course introduces a security risk that needs to be mitigated. (insert previous paragraph on security here)

The problem with the scenario above is that it becomes very easy to saturate a link. Ask any bittorrent user about their experience in destroying someones network. We still need the links to be links – we’re not trying to build copper hard drives here… Contrary to everything previously thought about bandwidth and speed, we could actually have the data moving relatively slowly between nodes, which should reduce the aspect of link saturation.

The principle of data stored in the pipe can also be pretty robust. It aligns itself well with the original premise of a “nuclear-event proof” Internet.

This is also a pretty good covert channel. If I store nothing sensitive on my local machine, but rather push it onto the grid, I can effectively detach myself and a sound infrastructure would guarantee my ability to retrieve that data anywhere in the net. No data would be retrievable even from forensic analysis of my machine (assuming secure practices on my side).

There’s loads more of this concept to explore, but the summary I have so far is:
1. It can be done – it’s actually kind of happening right now.
2. There is a very large, though not infinite, capacity.
3. It can be secured.
4. It can be robust.
5. It’s way more fun than hard drives.

I hope to explore this idea much further. Even if just for shits and giggles.

Your thoughts?

Categories
Entertainment Music

Evil Boy – Die Antwoord

Zef rap rave heroes Die Antwoord have just launched their latest music video “Evil Boy” on Pitchfork.com.
Very very cool effects, awesome editing, and incisive social commentary on the perils of the traditional circumcision/coming of age rituals which South African youth struggle with make this one to watch.

Well done to Die Antwoord.

Categories
Freedom Hacking Technology

The Idiots Guide to Jailbreaking the iPad

Yes I know there are loads of other better guides out there, this post is to help point out where all the useful info is.

So because I’m so filthy rich I decided to buy an iPad for myself. Yes I’ve wanted some sort of ebook device for a while, and you can’t really beat Apple when it comes to quality and hack-satisfaction-level. I’ve been impatient with the Apple/Core Group/Vodacom festering ringworm and their inability to get the iPad imported officially, and so decided to just jump the gun and get one through the usual covert channels. Looking at take2.co.za and wantitall.co.za was all good and well, but I’d made the impulsive decision and wanted the device on the same day, no wait, I wanted it in under an hour, not in 15 days time. Enter simplicity.co.za. They had the stock (it was on special), they were willing to take my money, and I could get it from them within an hour or two.

Pay, drive, collect. 1 times iPad be mine!

So what the hell does one do to make the iPad(or any iOS device) truly worthwhile? You jailbreak it! Now? Yes, before you start loading crap and then then something fucks out that you have to restore the default settings and reconfigure all your apps again. Well firstly DO NOT UPDATE to the latest official firmware – that stops theĀ  jailbreak option dead. Instead head on over to jailbreakme.com with Safari on your device (preferably on a stable WiFi connection) and slide your finger to run the jailbreak. Then wait. Be patient. It will work. Just wait.

Ta-da.

So what does jailbreak mean? It installs an app called Cydia which allows you to install other unofficial applications on your device.Those that aren’t in the Apple store. And Cydia also allows those extra features like multitasking and shortcuts to settings.

And if you add Installous into Cydia you can get legitimate apps (to try before you buy, of course).

But more on those tweaks later.

Let’s get your Gmail working properly on the iPad. (More here, and here’s what I mean by “properly”) iOS 4 actually fixes this crap, but the iPad is still iOS3.

Then sync your Google Calendar(s) with your iPad.

Install Firefox Home to get your bookmarks and open tabs syncing for later reading from the iPad.

Install VLC from the Apple store cos its the best media player in the business.

Back to Cydia. Here’s a list of Cydia jailbreak apps that work with the iPad. Ignore most of them for now.

Apps you do want from Cydia: (Install them in this order or you may have to restart from scratch)

iFile, Openssh, Installous, SBSettings, Backgrounder.

iFile allows you to browse files and directories on the device (windows explorer like). You need this app to edit a file to correct a bug with the openssh install, which disables the location tool.

Openssh lets you ssh into the iPad over the wireless interface. When you install this your device now runs an SSH server. Once the install is completed go change the default ‘root’ and ‘mobile’ passwords. The default password is ‘alpine’. Make it your own. (Details here.)

Installing OpenSSH will probably break location based services, but here’s how to fix that:
using iFile, go to
/System/Library/LaunchDeamons/com.apple.locationd.plist
and change the false under OnDemand to true.
Save and reboot the iPad (Hold home key and lock key for a while). (Info here)

Next you can add SBSettings and Backgrounder. For these two there is a package called MobileSubstrate which gets installed and this tends to cause the iPad to hang with a spinning wheel of death. This gives you two options:

1) Uninstall the packages over WiFi and SSH

2) Hard reset (Hold home button and lock button)

I first tried installing Backgrounder and the iPad hung, so I uninstalled manually from the command line. Those Backgrounder unbricking instructions are here.

Later I decided I still wanted Backgrounder so I first installed SBSettings (which installed the MobileSubstrate). This sort of hung so I waited a while before performing a hard reset. After a slowish boot everything was back to normal and all was well with SBSettings installed and working. I then installed Backgrounder and it behaved nicely. Yay!

Remember your mileage may vary – I can’t guarantee any of this will work on your iPad, but this is the success I have achieved with just the smallest amount of research and a bit of confidence.Just remember to read what it says on the screen and you’ll be fine.

From here on in you can continue to load more apps, games and books and just get more from your iPad experience.
Enjoy.