‘Holy Smokes’ Loads Cremation Ashes Into Shotgun Shells

Bullets like these could be loaded up with the ashes of your loved ones. Photo Wetsun/Flickr

Possibly the very best thing about this company is its name: Holy Smoke. That might sound quite so great until you find out that its business is taking the ashes of your loved ones and packing them into rifle cartridges and shotgun shells.

Holy Smoke, predictably based in Alabama, will divide the ashes between 250 shot-shells, 250 pistol cartridges or 100 rifle cartridges. All can be had in standard calibers, and all can be had in handcrafted “mantle-worthy” wooden boxes should you decide you don’t want to pump slugs full of Grampa into the local fauna all at once.

I love that Holy Smoke is positioning its service as environmentally friendly, and I guess it is compared to burial. I also love this tale of the company’s beginnings when it was founded by two state law enforcement officers “several years ago.”

I was talking with my friend and co-worker at work one evening. I told my […] that I thought I wanted to be cremated and in some fashion, have my ashes tossed into a river or spread through the woods.

My friend smiled and said “You know I’ve thought about this for some time and I want to be cremated. Then I want my ashes put into some turkey load shotgun shells and have someone that knows how to turkey hunt use the shotgun shells with my ashes to shoot a turkey. That way I will rest in peace knowing that the last thing that one turkey will see is me, screaming at him at about 900 feet per second.”

I don’t know why that guy hates turkeys so much, but as corporate origin stories go, it’s up there with the best.

Should you decide to send your cremated friends or relatives off at “900 feet per second,” a box of shells (in the above-mentioned amounts) will cost you $850, plus an extra $100 for the wooden case. Available now, or whenever you might need them.

Holy Smoke product page [Holy Smoke via Werd]

See Also:


Sony locks 93,000 PSN and SOE accounts due to ‘massive’ hack attempt

Sony’s not having a good morning. In addition to having to recall 1.6 million Bravia TVs, it’s also been forced to temporarily lock 93,000 customers out of their PSN and Sony Online Entertainment accounts. You won’t be surprised by the reason: an attempt by hackers to “test a massive set of sign-in IDs and passwords” against Sony’s network database. Some of the affected accounts showed “additional activity prior to being locked” and are being investigated. On the flip-side, Sony’s Chief Information Security Officer, Philip Reitinger, stressed that most of the hackers’ details resulted in failed logins and in any case credit card details are not at risk. Users are being told to expect an email if they’ve been affected, which will contain further instructions. Has Sony finally realized the value of timely communication?

Sony locks 93,000 PSN and SOE accounts due to ‘massive’ hack attempt originally appeared on Engadget on Wed, 12 Oct 2011 07:51:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceSony  | Email this | Comments

ITT unveils GhostRider encryption device capable of securing US Army smartphones

That may look like a Motorola Atrix, but it’s actually something known as the GhostRider — a new encryption device that could go a long way toward securing the Army’s smartphones. Developed by defense company ITT, this revamped handset would allow military personnel to transmit secure text messages and phone calls over the Army’s network, even if they’re out on the battlefield. All they’d have to do is place their personal phones next to the GhostRider, tap and hold its touchscreen to activate the security features and begin texting away. When another GhostRider user receives an SMS, he or she would have to enter a pass code before reading it. The phone’s security mechanisms, meanwhile, have been certified by the cryptographers at the NSA, which would certainly help justify its $1,500 price tag. The handset’s display, meanwhile, looks awfully similar to the Army’s Nett Warrior platform — an Android-based OS that features a host of mapping functions designed explicitly for war zones. Officials unveiled the latest incarnation of Nett Warrior at the recent Association of the US Army gala in DC, though the platform’s creators are still looking for the appropriate commercial device to host it — unless, of course, GhostRider’s software replaces it altogether. “We think Nett Warrior should be something like this,” ITT vice president Richard Takahashi told Wired. “This can be the smart device.” March past the break for more information, in ITT’s jargon-laced PR.

Continue reading ITT unveils GhostRider encryption device capable of securing US Army smartphones

ITT unveils GhostRider encryption device capable of securing US Army smartphones originally appeared on Engadget on Tue, 11 Oct 2011 15:22:00 EDT. Please see our terms for use of feeds.

Permalink Wired  |   | Email this | Comments

Facelock app hits the Ovi Store, Symbian handsets frame your face for security

Unlocking your phone doesn’t get any easier than a simple patterned swipe or pre-set pin. But for the fussy amongst you, there’s an alternative solution to make you feel both confidently futuristic, and downright ridiculous. Facelock, the facial recognition security app announced back at Nokia World 2010, has finally mosied on over to the Ovi Store, beta tag in tow. The screen lock tech functions pretty much as you’d expect: once you’ve set a static image of your face as a code, the front-facing camera will then match it up to your mug and, presto magico, you’ll have access to your device. The free app is apparently compatible only with Symbian 3 handsets, although those rocking Anna and Belle shouldn’t encounter any difficulties. Ready to face / off with your phone? Then hit up the source link below to download the gratis goods.

[Thanks, Jerry]

Facelock app hits the Ovi Store, Symbian handsets frame your face for security originally appeared on Engadget on Sat, 08 Oct 2011 04:43:00 EDT. Please see our terms for use of feeds.

Permalink Nokia HD Blog (Translated)  |  sourceOvi Store  | Email this | Comments

NC State researchers team with IBM to keep cloud-stored data away from prying eyes

The man on your left is Dr. Peng Ning — a computer science professor at NC State whose team, along with researchers from IBM, has developed an experimental new method for safely securing cloud-stored data. Their approach, known as a “Strongly Isolated Computing Environment” (SICE), would essentially allow engineers to isolate, store and process sensitive information away from a computing system’s hypervisors — programs that allow networked operating systems to operate independently of one another, but are also vulnerable to hackers. With the Trusted Computing Base (TCB) as its software foundation, Ping’s technique also allows programmers to devote specific CPU cores to handling sensitive data, thereby freeing up the other cores to execute normal functions. And, because TCB consists of just 300 lines of code, it leaves a smaller “surface” for cybercriminals to attack. When put to the test, the SICE architecture used only three percent of overhead performance for workloads that didn’t require direct network access — an amount that Ping describes as a “fairly modest price to pay for the enhanced security.” He acknowledges, however, that he and his team still need to find a way to speed up processes for workloads that do depend on network access, and it remains to be seen whether or not their technique will make it to the mainstream anytime soon. For now, though, you can float past the break for more details in the full PR.

Continue reading NC State researchers team with IBM to keep cloud-stored data away from prying eyes

NC State researchers team with IBM to keep cloud-stored data away from prying eyes originally appeared on Engadget on Fri, 07 Oct 2011 09:24:00 EDT. Please see our terms for use of feeds.

Permalink   |   | Email this | Comments

HTC confirms security hole, says patch is incoming

HTC held true to its promise to look into the security vulnerability that surfaced over the weekend, an apparent glitch that allows any app requesting internet access to take a peek at a user account information, GPS location, system logs, and other potentially private data. While HTC assured us that user data isn’t at risk of being harmed by its own software, a third party malware app could exploit the security flaw and cause some trouble. The outfit is already building a patch, and will ship it out in an over the air update after a short testing period with its carrier partners. Until then? HTC recommends steering clear of apps from publishers you don’t trust. Hit the break to see the official statement.

Continue reading HTC confirms security hole, says patch is incoming

HTC confirms security hole, says patch is incoming originally appeared on Engadget on Tue, 04 Oct 2011 01:47:00 EDT. Please see our terms for use of feeds.

Permalink   |   | Email this | Comments

HTC’s Version of Android Gives Personal Data to Any App That Asks

HTC's Sense-skinned phones will blab to just about anyone who asks. Photo: Jon Snyder/Wired.com

HTC’s skinned version of Android contains a serious security flaw which allows any application access to a huge trove of your personal information, according to mobile blog Android Police.

HTC’s proprietary Sense software — which runs on the company’s EVO 4G and Thunderbolt smartphones, amongst others — contains almost everything that happens on your phone in a data file, including GPS location information, phone numbers, SMS data (plain numbers and encoded text), and more. Any app can get access to this data simply through a permissions request.

The problem is due to logging tools that HTC recently added, which gather a huge amount of personal info and usage data. HTC hasn’t provided a reason for adding the tools.

Here’s the process, as described by Android Police:

any app on affected devices that requests a single android.permission.INTERNET (which is normal for any app that connects to the web or shows ads) can get its hands on [the data.]

Worryingly, there is an off-by-default VNC server included in the OS. This could possibly allow remote access, according to Artem Russakovski at Android Police.

Out of all the currently available mobile operating systems, security issues and exploits plague Android the most by far. Because applications submitted to the Android Market are not vetted by Google in advance, malware and insecure applications have a far greater chance of slipping in undetected. In August, McAfee released a report citing Android as the “most attacked operating system,” with Android mobile malware attacks jumping 76 percent in a three month period. In May, the popular Skype app for Android was also discovered to contain a security vulnerability, which could allow malicious apps access to personal data.

But as Android Police says, the Skype loophole pales in comparison to HTC’s security issues. Whereas Apple could deploy a quick fix just a week after its GPS-gate affair (which was little more than location data being cached in the iPhone and not being encrypted during backups), Android OS updates are notoriously slow to roll out. Because the carrier takes care of the updates, it can be months before they are pushed to customers, if at all.

Tech savvy users can root their phones and remove the HTCloggers apk file. The majority of Android users will have to wait for this update.

Massive Security Vulnerability In HTC Android Devices Exposes Phone Numbers, GPS, SMS, Email Addresses [Android Police]

See Also:


Mango kills Microsoft’s always-on location tracking, makes good on letter to House of Representatives

Remember all that iPhone tracking hubbub back in April? Sure you do — you probably also recall Apple’s denial, the subsequent Senate hearing, and the rest of the fiasco’s dramatic fallout. Amid the ballyhoo, Microsoft stepped out to admit that its Windows Phone also collected location data, but quickly promised to knock it off following the next scheduled update. According to ChevronWP7 collaborator Rafael Rivera, Windows Phone 7.5 cinches it: Mango “no longer sends location data prior to being granted permission to do so.” Redmond previously told the US House of Representatives that it only collected location data if a user expressly allowed an application to send it along — a claim which Rivera debunked last week, noting that simply launching the camera application captured and transmitted “pin-point accurate positioning information.” The big M maintains that the collected location data was anonymous, and that it shouldn’t have been sent at all unless the user allowed it. Either way, Microsoft’s chapter in the big location tracking blunder of 2011 seems to be at a close, squaring the firm with Congress, its developers, and hopefully its customers.

Mango kills Microsoft’s always-on location tracking, makes good on letter to House of Representatives originally appeared on Engadget on Mon, 03 Oct 2011 02:06:00 EDT. Please see our terms for use of feeds.

Permalink BGR  |   | Email this | Comments

HTC security vulnerability said to leak phone numbers, GPS data, and more, HTC responds (video)




The folks at Android Police seem to have stumbled across a rather jarring security vulnerability in HTC handsets running Android, giving common apps with internet access a peek at the device’s vital statistics, user information and more. Demonstrated in the above video, developer Trevor Eckheart found that a recent HTC update packed in a suite of logging tools that collects data on user accounts (including email addresses), recent GPS locations, SMS data and encoded text, phone numbers, system logs, running processes and more — all of which can be accessed by common apps requesting access to android.permission.INTERNET.

HTC is already looking into the issue, stating, “HTC takes our customers’ security very seriously, and we are working to investigate this claim as quickly as possible. We will provide an update as soon as we’re able to determine the accuracy of the claim and what steps, if any, need to be taken.” If you’re too antsy to wait for HTC’s update, head on over to the source link below — Eckheart says the issue can be resolved by removing HTCloggers from a rooted device.

HTC security vulnerability said to leak phone numbers, GPS data, and more, HTC responds (video) originally appeared on Engadget on Sun, 02 Oct 2011 19:17:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceAndroid Police, InfectedROM  | Email this | Comments

Pickpockets Can Steal The Lens Right Off Your Camera

Living in Barcelona Spain — one of the pickpocket capitals of the world — I’m completely paranoid whenever I leave the house. I’m also well-versed in most of the popular scams. But I have never seen or heard of this until today: a street thief stealing the lens right off the mark’s camera:

The video is a clip from the BBC show The Real Hustle, which is a “factual entertainment series about scams and cons” (and sounds pretty awesome). The perpetrator of the scam is Paul Wilson, a presenter of the show and scam expert.

Apparently this trick is one being used for real on city streets. It would work perfectly in Barcelona, which is full of camera and map-toting tourists. I wonder how you could defend against it?

My usual practice is to cover my bag with my hand whenever any stranger talks to me (I don’t really care if the honest ones are insulted). But perhaps a cleverer hack might work. Presumably thieves know that they’re targeting Nikons and Canons, and that the lenses mount in different directions (clockwise for Canon, counterclockwise for Nikon). Perhaps putting a Canon sticker on your Nikon and vice versa would do the trick?

Anyhow, watch out. The best way to avoid being a mark is to stay alert, and suspect everyone. Or carry a compact camera.

The Real Hustle [BBC]

Lens thieves ruin the day [Pixiq via PetaPixel]

See Also: