I’m in hot, humid Only TN just outside of Nashville. Three weeks. Thirty students. Vic Wooten and his team of extremely talented instructors are going to pump as much theory, technique, and wisdom into us as we learn the difference between playing around with an instrument, and being a world class musician. If you haven’t heard of Victor Wooten, check him out on YouTube. He’s well respected across the world as quite possibly the most proficient bassist alive. If you want to learn something, go to the best. We’ve got three weeks to whip into shape, and I’d better pay attention as we’ll be performing at a concert in the French quarter of Nashville in three weeks time. I asked Vic if I could blog about my experience, and he cleared me to talk about anything I want, especially if it’ll help people who are reading it. I’ll try and blog every day, and can already tell you my expectations are set high.
This is technically bass/nature “camp”, but being that I can barely focus on bass in this heat, let alone the poor hygiene to ensue, I checked myself into a nearby bed and breakfast down the street. So technically, this is bass/nature/bed and breakfast camp for me. I’ve already taken a reasonable amount of flack for that, but that’s OK: I’m the one sitting here in a nice comfy bed tonight, having had a long cool shower after a sweaty day. Come the first rain storm, or the first 100 degree night, the scoffers will suffer, while I’ll be appreciating my soft, comfy bed, air conditioned room, walk in shower, and mints on my pillow. Chestnut Hill Ranch is a quaint Tennessee farm that’s been converted into a Bed and Breakfast. Hot coffee, juice, and noms await me every morning. I have my own bath robe, rustic furniture in my room, and some of the most comfy pillows money can buy. After all, you spend 1/3 of your life on pillows. They’re worth the money to have the best. And that’s the difference between Chestnut Hill and a La Quinta Inn. That, and the fact that from the minute I left my vehicle, three roosters walked over to greet me, taking turns crowing. Thank goodness I have shades in my room so I don’t scare all the small woodland creatures.
Just when I thought my trip to Chicago would be average, some of the sergeants at the Chicago Police Training Academy, whom I’m training in iPhone forensic investigative methods, took me to the firing range in the basement and brought out an old dusty case. What came out of that case was an amazing pieceRead More
How freaking awesome is this: After I finished a forensics workshop in liberal Canada, where civilians aren’t allowed to own or even possess handguns, the most awesome regional cops let me come in and shoot at their police range. We tore through about 200+ rounds wearing bullet proof vests (which are required while shooting) andRead More
“Don’t ask yourself what the world needs. Ask yourself what makes you come alive and then go do that. Because what the world needs is people who have come alive.” – Howard Thurman
A friend of mine was going on about really knowing people; “people… are not defined by what they do”, he said. The point he was making was not to judge people by the cover of what they do in life. But the deeper point that he may not have realized, was the tragedy in the truth of that statement. How tragic it is that we aren’t defined by what we do. It seems to me that, given the finite amount of time we have to live and become, that we spend more of our lives thinking about what we want to do than actually doing it.
Bypassing Passcode and Backup Encryption: http://www.youtube.com/watch?v=5wS3AMbXRLs Forensic Recovery of Raw Disk: http://www.youtube.com/watch?v=kHdNoKIZUCw What Data Can You Steal From an iPhone in 2 Minutes? http://www.youtube.com/watch?v=34f47m-lYSg These YouTube videos demonsrate just how easy it is to bypass the passcode and backup encryption in an iPhone 3G[s] within only a couple of minutes’ time. A second video showsRead More
I recently did a talk at O’Reilly’s Ignite Boston party about the exciting iPhone forensics community emerging in law enforcement circles. With all of the excitement came shame, however; not for me, but for everyone in the audience who had bought an iPhone and put something otherwise embarrassing or private on it. Very few people, it seemed, were fully aware of just how much personal data the iPhone retains, in spite of the fact that Apple has known about it for quite some time. In spite of the impressive quantities of beer that get drunk at Tommy Doyle’s, I was surprised to find that many people were sober enough to turn their epiphany about privacy into a discussion about full disclosure. This has been a hot topic in the iPhone development community lately, and I have spent much time pleading with the different camps to return to embracing the practice of full disclosure.
The MIT Spam Conference concluded today with some great talks by various researchers in the field. I was particular sorry that I arrived late to miss Kathy Liszka’s talk on “Neural Networks for Image Spam”, as the tail end of it appeared very good. One thing I did notice that was quite refreshing about thisRead More
Last night marked a unique event in history. The Apple Store in Cambridge MA allowed me to come in through the front door and deliver a keynote to some 200+ people as they hosted the Mobile Monday Boston conference. In spite of the sheer chaos of fitting so many people into such a small store, and the generally poor acoustics of a mall, what the conference lacked in elegance was quickly made up for in quality of content.
It looks like I missed the 1960s, but I’ve read that there were plenty of free drugs and free sex to go around. One thing that apparently wasn’t free, though, was telephone equipment. And behind all of the groovy things to do back then, the one thing nerds seemed to be into was having fun with the telephone networks. The digital telephone network was brand new, and so consumer ignorance was at an all-time high. This made for easy profiting – AT&T had made a killing by charging their customers not only for telephone service, but to pay usage and equipment rental fees for telephones, answering machines, and anything else you wanted to plug into your phone jack.
File Vault is the encryption mechanism used to protect user accounts on Apple’s Mac OS X file system. While disabled by default, many people rely on file vault to protect their personal data. Many criminals, no doubt, also use file vault to encrypt content that would otherwise be incriminating. The security offered by an encrypted volume comes at a price – Apple’s closed source approach has left a significant amount of ambiguity about how the system actually works, and many erroneous assumptions have left holes for data to be recoverable. Among these misconceptions are the idea that raw data inside a vault cannot be accessed, and the erroneous belief that mechanisms such as Apple’s free space wipe will remove deleted data. This brief how-to shows you how to obtain a raw disk image from a file vault, and illustrates that deleted data can be recovered. It also shows that mechanisms like Disk Utility’s “Erase Free Space” option doesn’t affect the deleted contents inside a vault.
Countless sermons have been preached instructing people to give, and God will let you have the car you want, the house you want, and the life you want. Amusingly, my web logs indicate that this essay is found frequently by pastors Googling for prosperity sermons to preach on Sunday. It seems strange, though, that a people who profess to follow Christ are so anxious to convince the church that God wants them to be rich, when the Bible teaches no such thing – God has promised us no such prosperity, but only trials, tribulation, and possibly martyrdom. James teaches us that there’s something profoundly wrong with a miser, treating the notion of being rich as a sign of poor character in their lack of generosity. So are pastors just in error, wanting to see their congregation blessed in this consumer driven American culture, or are they preaching up promises of breakthroughs and finances because they know they’ll reap some of the benefits? In either case, Christians shouldn’t be so naive, given the role models we have in Jesus and the apostles.
I’ve spent many late evenings over the past month translating and researching an intriguing early Christian manuscript called the Didache. Greek for teaching, this first century Greek manuscript reveals the life and heart of the early Church. It has been the center of much academic interest and controversy since its rediscovery in 1883. Prior to this, it was once thought lost to history, although many early church fathers including Athanasius, Rufinus, and John of Damascas cited the book as inspired scripture. It was also accepted into the Apostolic Constitutions Canon 85 and the 81-book Ethiopic Canon. Many early church fathers including Barnabas, Irenaeus, Clement of Alexandria, and Origen either quote or reference the Didache.
A friend of mine proceeded half way home with lunch in hand after being delayed four minutes by an old, senile man who insisted upon checking his sandwich order. Shortly thereafter, she realized that her own turkey sandwich lacked an all-important ingredient – namely the turkey. They say that it’s counterproductive to turn back once you pass the halfway-home marker, and so she did what any other ordinary American would do –