patterns, processes, procedures (urls)

brian carroll electromagnetize at gmail.com
Sat Nov 9 14:03:27 PST 2013


// language, linguistics, typography, signs & symbols,
// patterns, techniques perhaps of crypt-relevance...

Typography Book Explores What It Feels Like To Have Dyslexia
http://www.huffingtonpost.com/2013/11/06/dyslexia-typography_n_4220353.html

What happens when you swap the colors of famous logos?
http://sploid.gizmodo.com/what-happens-when-you-swap-the-colors-of-famous-logos-1460616784


// regarding Strange Read-Reply Function (SRF), i read this news
// and misintepreted the following quote...

Hacker behind 'Loverspy' Trojan added to FBI's most wanted cybercriminal list
http://www.theverge.com/2013/11/7/5077762/hacker-behind-loverspy-added-to-fbi-most-wanted-cybercriminal-list

      "Back in 2005, a hacker named Carlos Enrique Perez-Melara
released a piece of malware called "Loverspy" into the world. The $89
software purported to be a way to catch a cheating lover — it sent the
suspected cheater an electronic greeting card that, when opened, would
install a particularly malicious Trojan that could capture keystrokes,
email addresses, instant messages, and even record video from a
webcam. Once it was installed, the infected computer was essentially
at the attacker's mercy."

(...thought for certain it involved a paper-based 'electronic' card,
which set my imagination going as far as potential platforms
for delivery of sound-based triggering of computer events...
thus: regarding the issue of covert, audio-based data transmission
the idea of a silent dog whistle greeting card, modified to send
data in inaudible frequencies was imagined, likewise: most any
triggered, playback device: x-mas ornaments, singing fish, etc.
potentially influencing nearby computers, hotspots, phones...

(note also: PIR-motion detecting or light sensors for activation
of larger artifacts, e.g. garden gnome, lawn ball, flood lights)


ex. Musical Greeting Cards, Talking Personalized Envelopes
http://www.soundexpressiongreetings.com/

ex. Invite By Voice greeting card sound modules
http://www.invitebyvoice.com/

ex. Talking Products - Record-a-Card 10 seconds
http://www.talkingproducts.com/recordable-cards-gifts/recordable-greetings-cards-gifts/talking-cards.html

(note: tone pattern as key, unlocking hidden parameters)


// first, cyborg the pests, next, e-shock dog collars for children...

Critics denounce RoboRoach device, which uses a smartphone app the
control cockroaches
http://www.sciencenewsdaily.org/consumer-gadgets-news/cluster464134548/


// somehow i ended up on this google images array and
// it captures a shared trait of both electrical infrastructure
// and architecture regarding nautical correspondance, with
// buildings as ships, though the connection between boat
// rigging and sails and the the distribution and transmission
// systems, guywires, masts, including on vessels themselves

overlapping structural patterns
https://www.google.com/search?client=firefox-a&hs=Rhx&sa=X&rls=org.mozilla:en-US:official&q=david+hawkins&tbm=isch&tbs=simg:CAQSaRpnCxCo1NgEGgYIAAgXCD0MCxCwjKcIGjwKOggBEhSdA-gG4QaiA5YGsQOtBawFlwaVBhog4NZ7iyxrigTVeHrmfNOnMLtFsCXHqGP0sUmM74Vkno0MCxCOrv4IGgoKCAgBEgRg2h0KDA&ei=IF5xUty4EKbMsQS11oDQCA&ved=0CCgQ2A4oAQ&biw=1072&bih=849


// this article introduced what is to me an interesting idea
// to consider:  banks as model for secure crypto exchange...

Over $1 million stolen from Bitcoin digital wallet service, claims site owner
http://www.theverge.com/2013/11/8/5082350/over-1-million-stolen-from-bitcoin-digital-wallet-service-claims-site

       " It's far safer to keep Bitcoins in "cold storage" by keeping
your wallet key offline, possibly even in a safe deposit box. The key
used for withdrawals is different than the public one needed for
deposits, making cold storage appealing for keeping a reserve of
Bitcoin safe from hackers. "

question: what if 'the banking system' itself were a model for
cryptography in terms of how keys and transactions occur, instead of
layer within banking transactions. in other words, what if 'securing
data' actually involved taking it offline, removing it into physical
media (such as pressed CDs in secure storage, out of circulation) or
other approaches.  my naive sense is that anything more complicated
than can be worked out with paper, envelopes, and social transactions
may not be secure by design of incomprehensibility, and who better
than banks for these kinds of advanced transactions of exchanging
valued information en masse.


Franks, Tabasco, Sriracha




More information about the cypherpunks mailing list