As subtle as a flying brick.

Latest

A Visit with Hello Lucky – CRAFT Video Podcast

From Craft:

I got a chance to visit Eunice and Shauna of Hello Lucky,
a letter press studio in San Francisco. Hello Lucky is known for their
beautiful letter pressed cards that also have a whimsical sense of
humor. The ladies took me on a tour of the studio where I learned the
letter press printing process as well has how they create their
designs. The Hello Lucky studio is peppered with vintage furniture and
decor. See the rest of my visit in my Flickr photos.

Stop by the Hello Lucky blog for lots of design inspiration!


If you are in the San Francisco/Bay Area, visit the Hello Lucky studio shop!

http://blip.tv/play/gZIvxc8q5wQ

Hello Lucky
977 Howard Street
San Francisco, CA 94103
phone: (888) 552-3724
hellolucky.com

Essential Bluetooth hacking tools

Bluetooth technology
is great. No doubt. It provides an easy way for a wide range of mobile
devices to communicate with each other without the need for cables or
wires. However, despite its obvious benefits, it can also be a
potential threat for the privacy and security of Bluetooth users.
Bluetooth_Logo.gif
If you are planning to gain a deeper understanding of Bluetooth
security, you will need a good set of tools with which to work. By
familiarizing yourself with the following tools, you will not only gain
a knowledge of the vulnerabilities inherent in Bluetooth-enabled
devices, but you will also get a glimpse at how an attacker might
exploit them.


This hack highlights the essential tools, mostly for the Linux
platform, that can be used to search out and hack Bluetooth-enabled
devices.

Discovering Bluetooth Devices

BlueScanner – BlueScanner searches out for
Bluetooth-enabled devices. It will try to extract as much information
as possible for each newly discovered device. Download BlueScan.

BlueSniff – BlueSniff is a GUI-based utility for finding discoverable and hidden Bluetooth-enabled devices. Download BlueSniff.

BTBrowser – Bluetooth Browser is a J2ME application that
can browse and explore the technical specification of surrounding
Bluetooth-enabled devices. You can browse device information and all
supported profiles and service records of each device. BTBrowser works
on phones that supports JSR-82 – the Java Bluetooth specification. Download BTBrowser.

BTCrawler -BTCrawler is a scanner for Windows
Mobile based devices. It scans for other devices in range and performs
service query. It implements the BlueJacking and BlueSnarfing attacks. Download BTCrawler.

Hacking Bluetooth Devices

BlueBugger -BlueBugger exploits the BlueBug vulnerability.
BlueBug is the name of a set of Bluetooth security holes found in some
Bluetooth-enabled mobile phones. By exploiting those vulnerabilities,
one can gain an unauthorized access to the phone-book, calls lists and
other private information. Download BlueBugger.

CIHWB – Can I Hack With Bluetooth (CIHWB) is a Bluetooth
security auditing framework for Windows Mobile 2005. Currently it only
support some Bluetooth exploits and tools like BlueSnarf, BlueJack, and
some DoS attacks. Should work on any PocketPC with the Microsoft
Bluetooth stack. Download CIHWB.

Bluediving – Bluediving is a Bluetooth penetration testing
suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++,
BlueSmack, has features such as Bluetooth address spoofing, an AT and a
RFCOMM socket shell and implements tools like carwhisperer, bss, L2CAP
packetgenerator, L2CAP connection resetter, RFCOMM scanner and
greenplaque scanning mode. Download Bluediving.

Transient Bluetooth Environment Auditor – T-BEAR is a
security-auditing platform for Bluetooth-enabled devices. The platform
consists of Bluetooth discovery tools, sniffing tools and various
cracking tools. Download T-BEAR.

Bluesnarfer – Bluesnarfer will download the phone-book of any mobile device vulnerable to Bluesnarfing.
Bluesnarfing is a serious security flow discovered in several
Bluetooth-enabled mobile phones. If a mobile phone is vulnerable, it is
possible to connect to the phone without alerting the owner, and gain
access to restricted portions of the stored data. Download Bluesnarfer.

BTcrack – BTCrack is a Bluetooth Pass phrase (PIN) cracking
tool. BTCrack aims to reconstruct the Passkey and the Link key from
captured Pairing exchanges. Download BTcrack.

Blooover II – Blooover II is a J2ME-based auditing tool. It
is intended to serve as an auditing tool to check whether a mobile
phone is vulnerable. Download Blooover II.

BlueTest – BlueTest is a Perl script designed to do data extraction from vulnerable Bluetooth-enabled devices. Download BlueTest.

BTAudit – BTAudit is a set of programs and scripts for auditing Bluetooth-enabled devices. Download BTAuding.

What’s next? Let everyone know to disable Bluetooth until they
really need it. Additionally, make sure to update your phone software
on a regular basis.

Total solar eclipse tomorrow

2006_ECLIPSE.jpg

This image (three combined frames) shows the last total solar eclipse, March 29, 2006. The next one takes place tomorrow. The Exploratorium will Webcast the event live from China. From Science News:

This particular eclipse will sweep across the planet in a
slim path that begins in Nunavut, a northern province of Canada, and
ends in northern China. So people in parts of Canada, northern
Greenland, the Arctic, central Russia, Mongolia and China will be able
to witness the seconds-long blackout.

When the moon totally obscures the sun — the moment of
totality — the sun’s outer atmosphere, called the solar corona, becomes
visible. The solar corona reaches temperatures higher than a million
degrees Celsius and extends farther than 620,000 miles from the star’s
surface. Because the sun’s surface is brighter than its corona, a solar
eclipse is the only opportunity to see the corona with the naked eye.

Total solar eclipse (Science News), Total Solar Eclipse 200 Live from China (Exploratorium)

Hilltop speaker lets you project your voice from your cell phone throughout the land

The “Telemegaphone Dale” by Magnus Torstensson and Erik Sandelin is a
loudspeaker post on top of Bergkletten in Dale, Norway. To use the
project, just call it with your cell phone and your voice is amplified
and played out the hilltop speaker. The project officially opens on
August 2nd and is part of a larger project called “Parafunctional
Payphones” that addresses public, telephonic art installations.

Fast Food Apartheid

Fast Food Apartheid:
The Los Angeles City Council has placed a one-year moratorium on the
opening of fast-food restaurants in sections of the city with
low-income residents. The council says it’s meant to encourage healthy
fare in locations that lack ready access to supermarkets and healthy
restaurant. This columnist calls it “fast food apartheid.” We’re
not talking anymore about preaching diet and exercise, disclosing
calorie counts, or restricting sodas in schools. We’re talking about
banning the sale of food to adults. Treating French fries like
cigarettes or liquor.

I’m Batman.

In the Dark Knight Returns,
Batman had to go toe to toe with Superman. Because of his intimacy with
the role from the new Batman Film, Christian Bale gives a unique
perspective on that epic fight.

Bale on Batman vs Superman

Will It Blend? tests the iPhone 3G

The Will It Blend? host, [Tom Dickson], is at it again. This time, he blends the new Apple iPhone 3G.
We’re completely in awe of how efficient the blender is at the
destruction of electronics, and this time, it’s no different. Watch in
fascination (or horror) as [Dickson] turns the latest iPhone into ashes.