“Tarnovsky needed six months to figure out his attack, which requires skill in modifying the tiny parts of the chip without destroying it.
Using off-the-shelf chemicals, Tarnovsky soaked chips in acid to dissolve their hard outer shells. Then he applied rust remover to help take off layers of mesh wiring, to expose the chips' cores. From there, he had to find the right communication channels to tap into using a very small needle.
The needle allowed him to set up a wiretap and eavesdrop on all the programming instructions as they are sent back and forth between the chip and the computer's memory”
iOS 8.1
SMS/MMS relay
pay
- Drug dealer banks supported
iCloud Drive
iPad Air 2 specs
iPad mini 3 is the same as the mini 2
1Q84
Kafka on the Shore
FileVault
OS X 10.10.0 Bugs
Vibrancy vs Aero
iPhone 6 Plus weak spot metal reinforcement
Civilization: Beyond Earth - Mac and Linux late 2014
Civ 5 talk
Blizzard/Activision disaster
Project Cars
Star Citizen funded $54 million
The Piratebay
OpenVPN on iOS
Wolfenstein
3D realms
Bluetooth-tracking in LA and Chicago
Date: 2014-10-23
Time: 01:05:23
Download - torrent - magnet