But InTether's most intriguing features are those intended to rebuff
hackers. To begin with, Friedman says, the system incorporates 11 layers of
security defenses. “All have to be successfully navigated” in order to
hack the system. “But one piece does nothing but check continually the
integrity of the other pieces,” he says. “If you could disable a certain
piece, within milliseconds our system would know.”
Via my dog
wants to be on the radio,
Can `Military' Technology Beat Digital Piracy?'
Nice and all, but what if the operating system in question (and in this case
it's Microsoft Windows obviously) is running on a virtual machine? Like
under, say, VMWare?
Obligatory Contact Info
You have my permission to link freely to any entry here. Go
ahead, I won't bite. I promise.
The dates are the permanent links to that day's entries (or
entry, if there is only one entry). The titles are the permanent
links to that entry only. The format for the links are
simple: Start with the base link for this site: http://boston.conman.org/, then add the date you are
interested in, say 2000/08/01,
so that would make the final URL:
You can also specify the entire month by leaving off the day
portion. You can even select an arbitrary portion of time.
You may also note subtle shading of the links and that's
intentional: the “closer” the link is (relative to the
page) the “brighter” it appears. It's an experiment in
using color shading to denote the distance a link is from here. If
you don't notice it, don't worry; it's not all that
It is assumed that every brand name, slogan, corporate name,
symbol, design element, et cetera mentioned in these pages is a
protected and/or trademarked entity, the sole property of its
owner(s), and acknowledgement of this status is implied.