

Executive Producers: Sir David Foley Duke of Silicon Valley, Grant Cynor, Sir Guy Boazy
Associate Executive Producers: Sean Connelly, Sir Tim Tillman, Kat & Rory Leander, anewdomain.net, Rolf Lehmann, Michael Siegenthaler
Art By: Thoren
Listen to show by clicking ►
Direct link to mp3 is here.
Direct link to shownotes.
Sign up for No Agenda Mailing List here.
Sites to consider: No Agenda Nation, No Agenda Films, No Agenda Records, No Agenda Stickers, and put a banner on your site! Click here!
NEW! Create a Promotional CD Here!
The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple’s TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID. This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.
Here’s more.
UPDATE: Not just fingerprints work.
A secret document, published in declassified form for the first time by the Guardian today, reveals that the US Air Force came dramatically close to detonating an atom bomb over North Carolina that would have been 260 times more powerful than the device that devastated Hiroshima.

Executive Producers: Phillip Smith, Sir Craig of Manama
Associate Executive Producers: Sir Steven Sevchuk, David Norman
Art By: Rob Lyttle
Listen to show by clicking ►
Direct link to mp3 is here.
Direct link to shownotes.
Sign up for No Agenda Mailing List here.
Sites to consider: No Agenda Nation, No Agenda Films, No Agenda Records, No Agenda Stickers, and put a banner on your site! Click here!
NEW! Create a Promotional CD Here!

Using the Wi-Fi connection at Starbucks was a better bet than risking putting confidential defense documents on a glitch-prone Pentagon computer network, a senior Defense Department official testified on Thursday at the Guantanamo trial of five prisoners charged with plotting the September 11 hijacked plane attacks.
The Internet link at the local Starbucks was “the best bad option that we had,” Air Force Colonel Karen Mayberry, the chief defense counsel for the war crimes tribunal, told the judge.
Read about it HERE.
Catch-22: Allowing everyone to have loaded guns means they could have stopped the killing earlier, yet not checking for and allowing guns in caused the problem.

Click here for non-Flash version.click ► to listen:
Right click here and select ‘Save Link As…’ to download the mp3 file.

I wonder what Jobs would have thought of using it for this…
Need to fire a mortar? There’s probably an app for that. Syrian rebels of the “Ansar Dimachyk” Brigade use an iPad as an aid for targeting a home-made mortar in one of the battlefronts in Jobar, Damascus.
Or Hollywood movies, for that matter. Pretty good description in there of our American way of “food” production, too.
Read about it HERE.
If an Android device (phone or tablet) has ever logged on to a particular Wi-Fi network, then Google probably knows the Wi-Fi password. Considering how many Android devices there are, it is likely that Google can access most Wi-Fi passwords worldwide.
[…]
Android devices have defaulted to coughing up Wi-Fi passwords since version 2.2. And, since the feature is presented as a good thing, most people wouldn’t change it. I suspect that many Android users have never even seen the configuration option controlling this. After all, there are dozens and dozens of system settings to configure.
The article explains how to turn this off. Not that it, most likely, as is also explained, will that matter.



If an Android device (phone or tablet) has ever logged on to a particular Wi-Fi network, then 












