<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <br>
    That is freakin' _excellent_.  <br>
    <br>
    That is exactly what we need.<br>
    <br>
    Paradigm:  When you control the technology, it's liberating.  When
    you don't, it's oppressive.<br>
    <br>
    For example Google's EULA agreement for their Search app update on
    Android, which gives them permission to turn on your camera and
    microphone at ANY time and WITHOUT notifying you or seeking
    confirmation: there is no other reason for that, than to spy on
    people: it's oppressive technology.  "You search Google, Google
    searches you.  We invented Search, we don't need no stinkin'
    warrant!"<br>
    <br>
    Contrast to: DIY mobiles, with open-source operating systems and
    apps, where every function is controlled by the user.  To which I'd
    add my "hookswitch," a simple physical switch with three positions:
    ON (fully enabled), Standby (all sensors physically disconnected
    & shorted, all it can do is ring), and OFF (battery
    disconnected, totally shut down).  <br>
    <br>
    Ideal case, the user can toggle every sensor on and off at will. 
    When you're making a phone call you probably don't want your camera
    on.  When you're taking photos, you probably don't want your mic
    on.  If you're concerned about being stalked, you don't want your
    GPS on unless you call 911.  <br>
    <br>
    But we don't have to settle for a wooden enclosure with un-labeled
    buttons.  We could also have custom enclosures built, that are fully
    functional and properly labeled, and more robust than the commercial
    ones.   There's no good reason a mobile can't be as physically
    robust as an oldschool dial phone.<br>
    <br>
    -G.<br>
      <br>
    <br>
    =====<br>
    <br>
    <br>
    <div class="moz-cite-prefix">On 13-03-27-Wed 1:29 PM, J Clark wrote:<br>
    </div>
    <blockquote
      cite="mid:42EBC818-6C71-4A06-864F-4D7CFA090598@manymedia.com"
      type="cite">Sudoers,
      <div><br>
      </div>
      <div>Following a related conversation earlier, here's info on a
        DIY cellphone:
        <div><a moz-do-not-send="true"
            href="http://hlt.media.mit.edu/?p=2182">http://hlt.media.mit.edu/?p=2182</a></div>
        <div><a moz-do-not-send="true"
            href="https://github.com/damellis/cellphone">https://github.com/damellis/cellphone</a></div>
        <div><br>
        </div>
        <div>I'd love to follow any development that happens around
          here. Not a coder, but happy to test!</div>
        <div><br>
        </div>
        <div>  j.</div>
      </div>
      <div><br>
      </div>
      <div>P.S. from the "you knew it was coming" dept:</div>
      <div><br>
      </div>
      <div><span class="Apple-style-span" style="font-family: monospace;
          ">How Hard Is It to 'De-Anonymize' Cellphone Data?</span><span
          class="Apple-style-span" style="font-family: monospace; "><br>
        </span><span class="Apple-style-span" style="font-family:
          monospace; "><a moz-do-not-send="true"
            href="http://j.mp/14oUhaC">http://j.mp/14oUhaC</a></span><span
          class="Apple-style-span" style="font-family: monospace; "> </span><span
          class="Apple-style-span" style="font-family: monospace; "> (Science
          Daily)</span><span class="Apple-style-span"
          style="font-family: monospace; "><br>
        </span><span class="Apple-style-span" style="font-family:
          monospace; "><br>
        </span><span class="Apple-style-span" style="font-family:
          monospace; ">  "The proliferation of sensor-studded cellphones
          could lead to a wealth</span><span class="Apple-style-span"
          style="font-family: monospace; "><br>
        </span><span class="Apple-style-span" style="font-family:
          monospace; ">   of data with socially useful applications --
          in urban planning,</span><span class="Apple-style-span"
          style="font-family: monospace; "><br>
        </span><span class="Apple-style-span" style="font-family:
          monospace; ">   epidemiology, operations research and
          emergency preparedness, among</span><span
          class="Apple-style-span" style="font-family: monospace; "><br>
        </span><span class="Apple-style-span" style="font-family:
          monospace; ">   other things. Of course, before being released
          to researchers, the</span><span class="Apple-style-span"
          style="font-family: monospace; "><br>
        </span><span class="Apple-style-span" style="font-family:
          monospace; ">   data would have to be stripped of identifying
          information. But how</span><span class="Apple-style-span"
          style="font-family: monospace; "><br>
        </span><span class="Apple-style-span" style="font-family:
          monospace; ">   hard could it be to protect the identity of
          one unnamed cellphone user</span><span
          class="Apple-style-span" style="font-family: monospace; "><br>
        </span><span class="Apple-style-span" style="font-family:
          monospace; ">   in a data set of hundreds of thousands or even
          millions?  According to</span><span class="Apple-style-span"
          style="font-family: monospace; "><br>
        </span><span class="Apple-style-span" style="font-family:
          monospace; ">   a paper appearing this week in Scientific
          Reports, harder than you</span><span class="Apple-style-span"
          style="font-family: monospace; "><br>
        </span><span class="Apple-style-span" style="font-family:
          monospace; ">   might think."</span><span
          class="Apple-style-span" style="font-family: monospace; "><br>
        </span><span class="Apple-style-span" style="font-family:
          monospace; "><br>
        </span></div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
sudo-discuss mailing list
<a class="moz-txt-link-abbreviated" href="mailto:sudo-discuss@lists.sudoroom.org">sudo-discuss@lists.sudoroom.org</a>
<a class="moz-txt-link-freetext" href="http://lists.sudoroom.org/listinfo/sudo-discuss">http://lists.sudoroom.org/listinfo/sudo-discuss</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>