header image


The Einstein Illusion

This is an interesting optical illusion.  At first this picture appears to be Albert Einstein, but if you back up around 10 or 11 feet it will appear to be Marilyn Monroe.

What does this say about eye witness accounts.What is the truth??

Fantasy Footwear

Henry Sapiecha


A security flaw in web-connected home security cameras made by Trendnet, which distributes in Australia, is allowing internet users to spy on the private video feeds of thousands.

Trendnet, a US company, issued an update to fix the flaw on February 6 but it requires owners of the cameras to take action, which has led to some speculating that many will not install the fix unless they are made aware of the flaws.

That speculation may well turn out to be true as links to thousands of live video feeds that are claimed to remain vulnerable have been posted on internet message boards such as 4chan and Reddit in recent weeks.

The security hole, which was revealed nearly a month ago by a blog called Console Cowboys, allows for real-time online access to the cameras without the need for a password.

Director of Trendnet’s Australian agent, BAX IT services’ Matthew Mann, said he had sold 53 affected cameras to 13 customers and that he found out about the security flaw yesterday. He was contacting customers today to get them to install the fix.

“They will have to do a firmware update which is very minimal,” he said. Another 70 cameras in stock remained affected by the flaw but would have a fix installed by technicians before they were sold.

He said there could potentially be more cameras in Australia that were vulnerable which people had purchased overseas using sites like eBay but said he was the only Australian agent for Trendnet and that their web-connected cameras hadn’t been a focus for his company.

What internet users claim they saw

One Reddit user, “Gl0we”, claimed many owners of the affected cameras were using them in private spaces, including in living rooms and bedrooms. The user added that some were using them as baby monitors and that “a lot of work places” appeared to be using them too. “Some look like they might be spying on employees even,” they claimed. “It’s not even funny.”

Tech blog The Verge claimed nudity was viewed, saying a woman taking off her pyjamas in her bedroom and a young mother standing next to a baby crib at night were seen by accessing the vulnerable cameras.

Trendnet addressed the problem in a statement.

“Trendnet has recently gained awareness of an IP camera vulnerability common to many Trendnet SecurView cameras,” the Torrance, California-based firm said.

“It is Trendnet’s understanding that video from select Trendnet IP cameras may be accessed online in real time,” Trendnet said.

“Upon awareness of the issue, Trendnet initiated immediate actions to correct and publish updated firmware which resolves the vulnerability,” it said.

In the statement, Trendnet listed 22 camera models sold since April 2010 which may have the vulnerability and provided a link to a site where camera owners can download a firmware fix.

“Trendnet is aware that this IP Camera security threat may affect your confidence in Trendnet solutions,” the company said. “Trendnet extends its deepest apologies to consumers which may be impacted by this issue.”

Australian security analyst at IBRS, James Turner, said that the camera vulnerability highlighted the fact that when you plugged any device into the internet, other people could find it. “Australians should be thinking about this issue very carefully as we look forward to all of the capabilities that the [national broadband network] is promising,” he said.

As broadband became more capable and ubiquitous, he said people would “inevitably increase their use of internet-intensive applications and services, such as video conferencing.”

The resulting plethora of devices, which will be left plugged in and turned on, many with webcams and microphones, would be “an appealing target to opportunistic hackers”, he said

Sourced & published by Henry Sapiecha

Private photos of facebook founder Mark Zuckerberg uploaded to his Facebook have leaked oot into the public internet following the discovery of yet another security flaw, one of the many that have plagued the social networking website since its inception in February 2004.

The flaw, which Facebook has acknowledged, appears to have first been posted about on a body building forum along with step-by-step instructions on how to obtain access to the private photos of any Facebook user.

The forum post has since been deleted and upon discovering the security flaw, Facebook said it “immediately disabled the system” used to obtain private photos and would only “return functionality” once it had confirmed a fix.

The flaw “allowed anyone to view a limited number of another user’s most recently uploaded photos irrespective of the privacy settings for these photos”, Facebook said in a statement, and was “the result of one of our recent code pushes”.

It was live for “a limited period of time”, it added.

One of the photos extracted from Facebook founder Mark Zuckerberg’s profile shows him holding a chicken upside down as if it were dead. Another shows him holding two plates, one with what looks to have battered chicken on it and the other, thinly-sliced potato chips.

If reports of Mr Zuckerberg only eating meat he has killed are anything to go by, it’s likely the chicken was slaughtered.

Other photos show him with “Beast”, his fluffy white dog, and girlfriend Priscilla Chan at their home.

There are also photos of Mr Zuckerberg with friends while eating and drinking, with US President Barack Obama and with children in costumes, likely taken during Halloween in the US.

Facebook has had a long history of access control vulnerabilities, especially around unauthorised access to photos, said Ty Miller, chief technology officer at the Australian security firm Pure Hacking.

In December 2009 a privacy overhaul of the social networking site saw almost 300 photos of Mr Zuckerberg and his friends as well as his calendar and wall posts made public to even non-friends. His access privileges were revised to “friends of friends” following reports of the photo treasure trove.

“Facebook users should expect variations of this type of security flaw to continue into the future,” Mr Miller said. “As a precaution Facebook users should ensure that they only upload content … that won’t negatively impact them if it is leaked.”

He added that the social networking giant should ensure that penetration tests were performed on all updates to the site to ensure that vulnerabilities like the recent one were detected prior to being released to the public.

Sourced & published by Henry Sapiecha

Brocial Network back online

Mex Cooper

May 20, 2011

The creator of a sexist Facebook group that spread raunchy images of women without their knowledge has allegedly resurfaced and appears to be selling a line of T-shirts.

The original group’s site, “The Brocial Network”, was removed by Facebook because it violated the use of real names after it is believed to have been set up using fake identities.

The group came under fire for spreading photos of scantily clad women copied from the Facebook photo albums of friends and family.

Advertisement: Story continues below

At least some of the women had no idea their photos were being circulated and felt violated by the group’s actions.

A person, who has dubbed himself “King Brocial”, has quickly established a new Facebook page and claims to be the leader of the original group.

More than 500 people are listed as liking the new site.

A negative comment posted from a woman on the new site’s wall vanished within minutes this afternoon, leaving only male comments mostly praising a return of the “king”.

The “king” requests the men contact him via email and to buy a $5 wristband with the words “I’m a Bro” on it.

It is not clear what happens once the men email the site’s creator. An email from The Age went unanswered.

To one person who posted: “King, whats the DL? im still unsure of what happened to the original network”.

‘King Brocial’ responds: “It was removed my bro … have no fear though. Email me and your mind will be blown once again.”

T-shirts are also being sold at another Brocial-related Facebook group page for $20.

The original group had attracted 8000 members — including three AFL footballers who claimed they were unwittingly added — before being shut down.

One post on the new site complains that previous members had invited “snitches and feminists”, leading to the site’s demise.

It seems the group’s name has been copied from a short video spoof of the film Social Network called The Brocial Network by a group called Atomic Production.

Sourced & published by Henry Sapiecha

Preteen girls charged

over Facebook sex prank

April 28, 2011 – 6:42AM

Two preteen US girls accused of hacking into a classmate’s Facebook page and posting sexually explicit photos and messages have been charged with cyberstalking and first-degree computer trespassing.

The girls, ages 11 and 12, have been under investigation since the alleged victim’s family contacted Issaquah police in Washington state on March 18, according to the charges filed in King County Juvenile Court. According to the charges, the two defendants used the victim’s password information to post sexually explicit content on her Facebook page.

They also posted messages that indicated the victim was willing to perform sex acts on people.

The defendants instant-messaged some boys to arrange dates where sex acts were to be performed by the victim, according to the charges.

Jon Knight, the stepfather of the 12-year-old alleged victim, said his family is relieved that the case has resulted in criminal charges. He said that he wasn’t taken seriously when he reported the incident to Issaquah police and to staff at Issaquah Middle School.

Knight said his stepdaughter, Leslie Cote, has asked the media to use her name in hopes of bringing attention to the issue of cyberstalking.

Issaquah police were called to the Cote-Knight home on March 18 after Leslie’s mother, Tara Cote, called to report vulgar postings on her daughter’s Facebook page, charges said. A woman who mentored Leslie told the family that she had noticed photos on the page had been changed to show Leslie with “devil’s horns” and with the words “I’m a slut” scrawled across one image, prosecutors said.

The alterations and postings apparently became more vulgar as the night progressed.

Prosecutors said that Leslie had been over at a defendant’s house in early March when she logged into Facebook. Leslie’s password information was somehow stored on the other girl’s computer.

After the girls had a falling out, the defendants hacked into the page “with the intent of embarrassing and tormenting the victim,” Issaquah police Detective Ryan Raulerson wrote in the affidavit of probable cause filed to support the charges.

Sara Niegowski, spokeswoman for the Issaquah School District, said Tuesday the district was not conducting its own investigation into the incident because it did not occur on school property. She said the defendants are still enrolled at Issaquah Middle School.

“This incident happened off-campus, off school time and not related to our school environments. There is no disciplinary action at all. It’s not a school district incident,” Niegowski said.

Niegowski said that the incident has not been a disruption at the school.

“You know what’s a disruption is the media coverage,” she said. “We always look out for the welfare of our students.”

Knight said that his stepdaughter has been granted a restraining order forbidding the defendants from contacting her and barring them from riding her school bus. The three girls are in some of the same classes, Knight said.

On Tuesday, King County Prosecutor Dan Satterberg said, “This case reveals the dark side of social media sites used by young people.”

In a news release, Satterberg wrote: “Many kids think that on a social media site that their actions will be anonymous and that they are free to use it as weapon to bully, harass, and intimidate another person. This case demonstrates that assuming the identity of another person on the Internet with the intent to torment them and expose them to the harassment of others is a crime.”


Ex-Apple executive

takes on Facebook with photo app

March 25, 2011 – 9:06AM
Color co-founder Bill Nguyen holds up his Apple iPhone with photos of himself using the Color application as he poses with staff members at the company's offices in Palo Alto, California.
Color co-founder Bill Nguyen holds up his Apple iPhone with photos of himself using the Color application. Photo: AP

We’ve all been to weddings where the bride and groom hand out disposable cameras to capture every angle of their big day. Now, a new application called Color allows you to do something similar with your phone, by sharing your images, videos and comments with anyone who comes within 50 feet (15 metres) of you.

The free app figures out if other users are close to you by using a secret blend of GPS data, ambient noise and even light.

Then your updates become available to them and you in turn see theirs.

The app, available initially on iPhones and Android-based smartphones, was created by a group of technologists led by CEO Bill Nguyen, the serial entrepreneur who sold digital music locker site Lala.com to Apple for an estimated $US85 million back in December 2009.

Nguyen said the app will help people break out of the mold of their current group of friends and give them more information about the people around them – namely co-workers and neighbours.

“I talk about identity: where I work and where I live. That’s a big chunk of who I am,” said Nguyen, 40, who demonstrated the app to The Associated Press. “But oddly, these people aren’t on my Facebook.”

While your first name appears on your posts, there is no password and no friending. So unlike Facebook, the notion of limiting private content to a friend network doesn’t exist.

In the future, the app will be able to intuit relationships based on whom its users spend time with regularly because it collects data constantly. You could bump into an acquaintance’s co-worker and immediately know that, simply because the two were in the same place during daylight hours on weekdays.

“The days of having to say anything are done,” Nguyen said. “There’s no more profiles, there’s no more friending, there’s no more electronic dog fence created by Facebook. It’s all over. This is the post-PC world. It’s a brand new way of sharing.”

Along with people within 50 feet, Color keeps sending feeds of people you recently were in contact with, although those contacts fade over time if you don’t engage with their streams. And if you’re at a concert, the app knows to string the entire group into one massive stream.

Color, with 30 employees in Palo Alto, California, was seeded with $US41 million in capital – $US25 million from Sequoia Capital, $US9 million from Bain Capital, and $US7 million from Silicon Valley Bank.

Mike Krupka, managing director of Bain Capital Ventures, said the site would seek to generate revenue from advertising by the end of the year. One possible way to help businesses advertise would be to enable restaurants to post photos of their specials to recent guests. Users might also be enticed by seeing pictures of what their acquaintances had ordered the last time they ate there.

“We believe that if you create a product that the consumer truly values to enhance their life experience, you’ll find a way to monetise that,” he said.

Gartner analyst Mike McGuire said the app was a good test to see if active social networkers were ready to take another step toward more sharing and less privacy. He noted that Nguyen is apt to change the app if people react adversely to the lack of privacy controls – noting that Lala was once a site that stored one’s personal CD collection online before becoming a way to buy web-based music.

“He’s willing to start with an idea and see how people react and change it accordingly,” McGuire said. “These guys have built the tools. Now it’s up to the consumers to do something with it.”

AP- Sourced & published by Henry Sapiecha