Authenticity
Description:

People and objects are genuine and have not been forged, tampered with, or fabricated.

How dangerous is image file metadata?

Unless your digital camera or camera equipped cellphone is more than fifteen (15) years old, the chances are good that any pictures taken with that device contain metadata; which describes the (who, what, where, when and how) conditions under which the picture was taken. The metadata is stored with the picture in an image file, and goes everywhere the file is copied, uploaded or downloaded. But as Catherine (Cat) Schwartz learned in 2003, certain kinds of image file metadata can be rather embarrassing. At the completion of a three (3) month qualitative risk assessment, The Assurer answers the question, “How dangerous is image file metadata?” Some of the more interesting results are that high risk probability for the iPhone 4 decreased 11.5% from the 3gs, while the amount of metadata created by the Droid 2 increased by 16% over the original Motorola Droid…

The so-called Twitter follower “bug”

On May 5, 2010, on an obscure website in Turkey, someone described a method that allows you to make any Twitter user, of your choosing and without their consent, into one of your followers. This is no “bug” folks — It is a backdoor…

Caveat on Verizon Droid 2.1-update1 OTA update lock pattern fix

My Motorola Droid finally received the much anticipated Over The Air (OTA) software update (version 2.1-update1) from Verizon Wireless. So, is the Verizon Droid pattern lock bypass fixed? Yes. But there is one little caveat…

The dark side of mobile Augmented Reality

As smartphones become more popular, the use of mobile Augmented Reality (AR) applications has increased. But there lurks a “dark side” to Augmented Reality. One that is not being publicly discussed, that affects us on many personal, civil, criminal, and national security levels.

A (temporary) countermeasure for the Verizon Droid pattern lock bypass

It has been observed that, as long as a Bluetooth device is paired, AND CONNECTED, to the Droid; the pattern lock bypass vulnerability does not occur.

Verizon Droid pattern lock bypass

One of the interesting features of Android smart-phones is the pattern lock screen. Instead of a four digit PIN, the phone is secured with a “pattern” of four to nine dots, arranged in a 3 by 3 square. This results in a possible 3,024 to 362,880 different combinations. Sounds pretty secure, right?

Text messages — Is it them… or someone else?

How can you be certain the person you are exchanging texts with, is who you think it is? The caller ID and that cute little contact picture, only tell you whose phone sent the message! Unlike phone calls there is no heuristic method by which you can be sure of who is on the other side of the keypad.

Bad dog!

They say that “On the Internet, nobody knows you’re a dog.” But what happens if your ex-boyfriend is a dog, who is hounding you, in an effort to sully your online reputation?

Police dispatchers believe what they see on TV

As reported in the Los Angeles Times, residents in the 90210 ZIP code that contain portions of Los Angeles, complained the LAPD sometimes ignored calls for assistance because…