Throttling is a way for the cell phone company to limit its unlimited customers. Bloomberg technology columnist Rich Jaroslovsky talks to David Greene about what AT&T has been doing to customers who use the most data.
Suspense - The Hitchhiker
Morguefile90693 The Suspense episode "The Hitchhiker" is well known because the radio play was transformed into a television episode, and it has since lived on in reruns. In this story, a supernatural hitchhiker follows the main character on a trip across the country.
Orson Welles, for whom the role was written, first performed "The Hitchhiker" on the CBS network’s Mercury Theater on the Air in 1941, and then again on Suspense in 1942. The radio play was written by Lucille Fletcher, who also wrote Suspense’s most famous episode, "Sorry, Wrong Number." (This episode also features her husband, legendary film-composer Bernard Herrmann, who composed and conducted the music.) In 1960, "The Hitch-Hiker" became an episode of the CBS television show, The Twilight Zone but with Inger Stevens in the lead role.
The radio version has chilling sound effects. Well, chilling or hokey. It depends on your point of view. Listen for the sound effects of the phone call made by Welles. The suspense builds as his call goes from operator to operator across the country, but it also shows how many people had to be involved just to make a phone call back then!
This episode was broadcast on September 2, 1942.
This talk will give a brief history of phone phreaking from 1960 to 1980 the Golden Age of the analog telephone network. After a quick introduction to the then-modern long distance network and "operator toll dialing," you’ll see how the first "blue box" came to be, look at why organized crime loved the technology, and see how AT&T and the Department of Justice reacted to this fad in the 1960s. You’ll then follow the phreaks into the 1970s as their hobby hit the mainstream in 1971 with the publication of "Secrets of the Little Blue Box" in Esquire and the founding of YIPL, the first phone phreak newsletter. As a bonus, you’ll get to listen to some sounds of the old network! If you’ve ever used a blue box, this will be a phun trip down Memory Lane - and if you haven’t, you’ll get to listen to some great examples of hacking with tones!
Smartphones have changed the world. Your calendar, photographs, private documents, and communication with your entire social sphere is now just a swipe away. We are carrying exponentially increasing amounts of highly personal data around with us in our pockets. But are we doing enough to safeguard this data? Mobile devices are also becoming an important tool for social change, but with this they also become a more important target for governments and corporations. With so many attack vectors on mobile devices, it is important to know the ways that your mobile device can be compromised and how you can protect against these attacks. This talk will focus primarily on the security of the Android operating system. You will hear about how to protect your phone against warrantless search and seizure by law enforcement, as well as how much damage malicious apps can actually do and how to protect yourself from becoming the victim of malware. You will hear about password security concerns on Android and how to protect yourself, along with some of the many great security-related apps that Android has to offer. This talk will examine the question of whether you can protect yourself from the greatest of all threats to your phone: The Phone Company.