article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

In fact, it's so easy we demonstrated this at a elementary school museum where the museum shows kids how to use lasers to inject voices. I show six year old children how to put their voice in here with the laser beam it's it's really not that hard. But really it’s not. Fu: It's not even that hard. Once you understand the physics.

article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

In fact, it's so easy we demonstrated this at a elementary school museum where the museum shows kids how to use lasers to inject voices. I show six year old children how to put their voice in here with the laser beam it's it's really not that hard. But really it’s not. Fu: It's not even that hard. Once you understand the physics.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

In fact, it's so easy we demonstrated this at a elementary school museum where the museum shows kids how to use lasers to inject voices. I show six year old children how to put their voice in here with the laser beam it's it's really not that hard. But really it’s not. Fu: It's not even that hard. Once you understand the physics.

article thumbnail

The CyberWire Daily Podcast EP. 389 With Guest Speaker David Brumley

ForAllSecure

David Brumley: [00:07:01] I think everyone accepts the notion, and they're trying to figure out how to implement it right now. Dave Bittner: [00:07:05] And so how is that going? So when you deny them access to the location data in the operating system, that essentially denies them access to the GPS receiver.

article thumbnail

The CyberWire Daily Podcast EP. 389 With Guest Speaker David Brumley

ForAllSecure

David Brumley: [00:07:01] I think everyone accepts the notion, and they're trying to figure out how to implement it right now. Dave Bittner: [00:07:05] And so how is that going? So when you deny them access to the location data in the operating system, that essentially denies them access to the GPS receiver.

article thumbnail

THE CYBERWIRE DAILY PODCAST EP. 389 WITH GUEST SPEAKER DAVID BRUMLEY

ForAllSecure

David Brumley: [00:07:01] I think everyone accepts the notion, and they're trying to figure out how to implement it right now. Dave Bittner: [00:07:05] And so how is that going? So when you deny them access to the location data in the operating system, that essentially denies them access to the GPS receiver.