At 07:04 AM 6/27/04 +0200, Thomas Shaddack wrote: >On Sat, 26 Jun 2004, J.A. Terranson wrote: > >> Yes, I suppose that the more technical amongst us could selctively jam >> only the one signal, however, cellular phones are mighty low power >> devices, and I would not hazard a guess as to whether it would be possible >> not to overpower the wanted signals on something like this. >
You still deal with triangulation and phone-tracking sats as a threat model. >> Even if this is doable, it is out of reach of Jane Citizen. > >If a J. Random Hacker with the necessary capabilities is within her reach, >the countermeasure is available to her regardless of her own tech skills. Yes, the internet effect, as described by Schneir amongst others. Cracks spreak instantly. >With continuing outsourcing, there should be enough out of work engineers >available who are sufficiently hungry to risk working for the underground >market. Their *employers* need a viable biz model. Many of us (quasi academics or engineers) forget this. The rest is just earning a living as an engineer building something, ideally something cool and challenging under a reasonable schedule for decent pay. ----------- "Il dulce far niente" The sweetness of doing nothing My unemployment motto -S Schear