Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Last Chance - Get 15% off sitewide on Slashdot Deals with coupon code "BLACKFRIDAY" (some exclusions apply)". ×
Privacy Security Hardware Technology

Transparency Grenade Collects and Leaks Sensitive Data 103

Zothecula writes "If you thought WikiLeaks was a disruptive idea, the transparency grenade is going to blow you away. This tiny bit of hardware hidden under the shell shaped like a classic Soviet F1 hand grenade allows you to leak information from anywhere just by pulling a pin. The device is essentially a small computer with a powerful wireless antenna and a microphone. Following 'detonation,' the grenade intercepts local network traffic and captures audio data, then makes the information immediately available online."
This discussion has been archived. No new comments can be posted.

Transparency Grenade Collects and Leaks Sensitive Data

Comments Filter:
  • by TubeSteak (669689) on Tuesday February 21, 2012 @04:40PM (#39116651) Journal

    Well the problem is that you tuned out after looking at the pictures.
    It was made for an art exhibit in Germany and the creator is working on making an app for Android phones that will mimic the basic functionality.

    The open sourcing and commoditization of hardware is bringing us the kind of technology that once required the R&D budget of a large company or the CIA..

Some programming languages manage to absorb change, but withstand progress. -- Epigrams in Programming, ACM SIGPLAN Sept. 1982