Concealed USB disk Stealth flash drives for data smuggling |
|
GPS for distributed power generator synchronization Using GPS as a timebase to keep power generators across an area in-phase during outages, symplifying outage recovery. |
|
Standby Power Saver Power saving approach for standby devices |
|
Autolinks for revealing PR campaigns How to combine a database of front groups and astroturfing organizations with mass media information in near-real time, revealing possible disinformation sources. |
|
DTMF Challenge-Response over telephone Acoustically coupled device for challenge-response authentication over phone line |
|
IrDA-to-remote converter A device converting IrDA commands to infrared remote ones |
|
Universal Chip Programmer How to solve problems with support of various chips by various programmers. |
|
Cheap multispectral imaging Low-cost thermal/multispectral imaging via mechanical slow-scan TV |
|
Thunderstorm Gun Lightning-powered electromagnetic pulse gun |
|
EU solder drawbacks Another of the long chain of Euroidiocies |
|
Micropower RFID jammer Very-low power passive/active jammer of passive RFID tags |
|
Evading detectors of radar detectors Speculative design proposal of an undetectable radar detector |
|
Distributed UPC/EAN Database How to design a system for querying all kinds of information from a product using its UPC/EAN code and a set of public databases |
|
Secure One-Time-Pad Storage Device Storage device for one-time pad data. A chunk of data, after being written in, can then be read only once. |
|
Shipping Encryption Keys How to ship one time pads and encryption keys by mail in a strongly tamper-resistant way |
|
Defeating keyword scanners with WebFonts How to use simple substitution cipher together with downloadable WebFonts to work around automatic communication scanners |
|
Denaturated alcohol purifying How to make denaturated alcohol suitable for human consumption |
|
Ultracheap IR spectrometer Very cheap infrared spectrometer without monochromator nor expensive optics (speculative proposal) Update: Won't work as proposed. |
|
The real danger of role-playing games When RPG model becomes realistic enough, it turns into tactical simulation and gaming becomes training. |
|
Broadcast technology convergence The inevitable convergence of Internet and terrestrial broadcasting technologies, and the consequences. |
|
Filesystem-independent file storage How to store critical files in the way they can be read back from the disk even if all filesystem metadata are gone |
|
GPG signatures in HTML GPG signing of parts of HTML documents, and of included images and binary files |
|
Meta-filesystem Filesystem containing its own driver in bytecode |
|
Small-volume concealed data storage Little, easy to hide wireless storage and retrieve of an encryption key, based on AT24RF08 |
|
Homemade Passive Radar System (GNU/Radar) Community-based passive radar, deployable by private personnel without links to military |
|
Physical security tricks Paranoia add-ons for an alarm system when the threat model includes high-profile adversaries like police or "Agencies". |
|
Dedicated Event Logger Small, battery-operated concealable event logger for post-breach security audit applications (aka detecting black-bag jobs) Excerpted from Physical Security Tricks |
|
Ultimate CD auditing Low-level access to data stored on a CD, on the level of pits and lands |
|
Securing data transfers by securing a small shipment against tampering Shipping data sequentially as two parts - random key and data XORed with random key, sending the other part only when the first one arrived untampered with |
|
Cooking Temperature Sensor Rugged, wireless small-distance passive temperature sensor |
|
Rogue DNS resolvers Smaller-scale temporary countermeasure against domains being shut down |
|
Snort/Tripwire for RF spectrum Permanent scanning of electromagnetic spectrum, detecting bugs and other transmitters |
|
Infrared broadcasting Local broadcasting using infrared transmitters, sidestepping low-power broadcast regulations |
|
DNA evidence countermeasures? Possible jamming of DNA tests on biological traces; speculative proposal |
|
Closed-circuit teletext Inserting teletext to standard video signal, allowing using a common TV as a monitor with text overlaid over live video |
|
Surveillance cameras detectors Detecting surveillance cameras by characteristical frequencies in their EM spectrum; speculative design proposal |
|
Transparent encrypting email server POP3/SMTP proxy for securing the transport layer between the sender and the recipient. Now already implemented by eg. GPGrelay. |
|
RAM/ROM drive - tamperproof secure disk encryption boot IDE-compatible solid-state tamperproof encrypted unit, PIN-protected, limiting number of bruteforcing attempts to get stored key, suitable to boot from. Possibly obsoleted now by more modern designs. |
|
Transporting larger amounts of money Cash is too bulky to transport bigger amounts of it comfortably. Other media are necessary. |