<html><head></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">Sudoers,<div><br></div><div>Following a related conversation earlier, here's info on a DIY cellphone:<div><a href="http://hlt.media.mit.edu/?p=2182">http://hlt.media.mit.edu/?p=2182</a></div><div><a href="https://github.com/damellis/cellphone">https://github.com/damellis/cellphone</a></div><div><br></div><div>I'd love to follow any development that happens around here. Not a coder, but happy to test!</div><div><br></div><div>  j.</div></div><div><br></div><div>P.S. from the "you knew it was coming" dept:</div><div><br></div><div><span class="Apple-style-span" style="font-family: monospace; ">How Hard Is It to 'De-Anonymize' Cellphone Data?</span><span class="Apple-style-span" style="font-family: monospace; "><br></span><span class="Apple-style-span" style="font-family: monospace; "><a href="http://j.mp/14oUhaC">http://j.mp/14oUhaC</a></span><span class="Apple-style-span" style="font-family: monospace; "> </span><span class="Apple-style-span" style="font-family: monospace; "> (Science Daily)</span><span class="Apple-style-span" style="font-family: monospace; "><br></span><span class="Apple-style-span" style="font-family: monospace; "><br></span><span class="Apple-style-span" style="font-family: monospace; ">  "The proliferation of sensor-studded cellphones could lead to a wealth</span><span class="Apple-style-span" style="font-family: monospace; "><br></span><span class="Apple-style-span" style="font-family: monospace; ">   of data with socially useful applications -- in urban planning,</span><span class="Apple-style-span" style="font-family: monospace; "><br></span><span class="Apple-style-span" style="font-family: monospace; ">   epidemiology, operations research and emergency preparedness, among</span><span class="Apple-style-span" style="font-family: monospace; "><br></span><span class="Apple-style-span" style="font-family: monospace; ">   other things. Of course, before being released to researchers, the</span><span class="Apple-style-span" style="font-family: monospace; "><br></span><span class="Apple-style-span" style="font-family: monospace; ">   data would have to be stripped of identifying information. But how</span><span class="Apple-style-span" style="font-family: monospace; "><br></span><span class="Apple-style-span" style="font-family: monospace; ">   hard could it be to protect the identity of one unnamed cellphone user</span><span class="Apple-style-span" style="font-family: monospace; "><br></span><span class="Apple-style-span" style="font-family: monospace; ">   in a data set of hundreds of thousands or even millions?  According to</span><span class="Apple-style-span" style="font-family: monospace; "><br></span><span class="Apple-style-span" style="font-family: monospace; ">   a paper appearing this week in Scientific Reports, harder than you</span><span class="Apple-style-span" style="font-family: monospace; "><br></span><span class="Apple-style-span" style="font-family: monospace; ">   might think."</span><span class="Apple-style-span" style="font-family: monospace; "><br></span><span class="Apple-style-span" style="font-family: monospace; "><br></span></div></body></html>