untitled 725981133602455552

Blockchain for tracking cobalt from mines to uses
For months I had joked to my family that I was probably on a watch list for my excessive use of Tor and cash withdrawals […] the things I had to do to evade marketing detection looked suspiciously like illicit activities. All I was trying to do was to fight for the right for a transaction to be just a transaction, not an excuse for a thousand little trackers to follow me around. But avoiding the big-data dragnet meant that I not only looked like a rude family member or an inconsiderate friend, but I also looked like a bad citizen.,
Once MH370 had cleared the volatile airspaces and was safe from being detected by military radar sites in India, Pakistan, and Afghanistan it would have been free to break off from the shadow of SIA68 and could have then flown a path to it’s final landing site. There are several locations along the flight path of SIA68 where it could have easily broken contact and flown and landed in Xingjian province, Kyrgyzstan, or Turkmenistan. Each of these final locations would match up almost perfectly with the 7.5 hours of total flight time and trailing SIA68. In addition, these locations are all possibilities that are on the “ARC” and fit with the data provided by Inmarsat from the SATCOM’s last known ping at 00:11UTC.
http://keithledgerwood.tumblr.com/post/79838944823/did-malaysian-airlines–370-disappear-using-sia68
Learning point: I didn’t need non-public access to systems in order to interpret and disseminate useful information. Learning point: I did need to understand how the subject matter works in order to interpret and disseminate useful information.
What’s still unclear is whether the NSA is directly hacking Google or using some other way to track these cookies. But while the company is officially keeping quiet, the simple math of cookie tracking makes it likely that the NSA didn’t need any help from Google. Tracking cookies offers the NSA the perfect system for following suspects across the web: it’s pervasive, persistent, and for the most part, it’s still unencrypted. “It solves a bunch of tricky problems for bulk web surveillance that would otherwise be quite difficult,” says Jonathan Mayer, a fellow at Stanford’s Center for Internet and Society who worked with the Washington Post on the report. The right cookie will follow you as your phone moves from 3G to a coffee shop’s Wi-Fi network, and in many cases it’ll broadcast your unique ID in plain text.
http://www.theverge.com/2013/12/12/5204196/how-advertisers-became-the-nsa-best-friend
In this article, I’ll demonstrate a method for modifying a naval telecommunications dish to track moving targets in the sky, such as those in Low Earth Orbit. My dish happily sits in Tennessee, while I direct it using my laptop or cellphone here in Europe. It can also run unattended, tracking moving targets and looking for downlink channels.
http://travisgoodspeed.blogspot.be/2013/07/hillbilly-tracking-of-low-earth-orbit.html
The team reared six colonies of carpenter ants (Camponotus fellah) in the lab and tagged each worker with paper containing a unique barcode-like symbol. The colonies — each comprising more than 100 ants — lived in flat enclosures filmed by overhead cameras. A computer automatically recognized the tags and recorded each individual’s position twice per second (see video below). Over 41 days, the researchers collected more than 2.4 billion readings and documented 9.4 million interactions between the workers.
http://www.nature.com/news/tracking-whole-colonies-shows-ants-make-career-moves–1.12833