TimesToCome

Life on the third coast

Archive for the ‘Geekiness’ Category

10k average winning pace by age and sex

without comments

It was really really difficult to find this data so I rolled my own.
– Compiled averages from 100s of races by age/sex
– Took 5 year (2+/- rolling average)
– Smoothed out bumps
It should be good enough to give you an idea of where you are but I wouldn’t publish any papers with this data.

Age Male Female
20 8:05 9:34
21 8:10 9:37
22 8:15 9:39
23 8:20 9:41
24 8:25 9:45
25 8:30 9:51
26 8:34 9:55
27 8:35 10:02
28 8:41 10:02
29 8:45 10:03
30 8:45 10:03
31 8:46 10:04
32 8:46 10:04
33 8:47 10:05
34 8:47 10:05
35 8:47 10:06
36 8:47 10:06
37 8:47 10:07
38 8:48 10:07
39 8:48 10:08
40 8:48 10:08
41 8:48 10:09
42 8:48 10:10
43 8:48 10:12
44 8:48 10:17
45 8:48 10:17
46 8:52 10:17
47 8:58 10:21
48 8:58 10:21
49 8:58 10:22
50 8:59 10:22
51 8:59 10:23
52 9:04 10:24
53 9:07 10:27
54 9:09 10:29
55 9:17 10:42
56 9:24 10:48
57 9:24 10:59
58 9:25 11:02
59 9:26 11:06
60 9:27 11:08
61 9:28 11:21
62 9:30 11:22
63 9:33 11:24
64 9:37 11:32
65 9:47 11:38
66 9:50 11:40
67 9:55 11:45
68 10:09 11:50
69 10:19 11:50
70 10:22 11:55

You might enjoy:

TimesToCome Mobile GPS Run Tracker for iOS
TimesToCome Mobile Treadmill Tracker for iOS

Written by Linda MacPhee-Cobb

September 4th, 2013 at 10:50 am

Posted in Geekiness

DefCon notes: Using sensors for data collection

without comments

This was my favorite talk. It’s especially timely for me as I’m just digging into phone sensors, data collection and digital signal processing.

CreepyDOL (paper)
CreepyDOL (slides from BlackHat)
Stalking a city for fun and frivolity (slides)

F-Bomb (Ballistically launched object that makes backdoors )
FireSheep

Notes:
Everything leaks data
Privacy is as important as security
It is no longer possible to blend with the crowd
Sunlight is the best disinfectant

Written by Linda MacPhee-Cobb

August 6th, 2013 at 4:15 pm

Posted in Geekiness

Defcon notes: Software

without comments

Written by Linda MacPhee-Cobb

August 6th, 2013 at 4:14 pm

Posted in Geekiness

Tagged with

DefCon notes: Fake Cell Towers

without comments

All the examples of using Femtocells to create fake cell towers were done using Version units. Root access was gained by crashing during boot and getting dropped into a shell. This vulnerability has been patched, none are yet known for ATT.

The Femtocells were rooted and Snort, TCP Dump, and WireShark were added to watch the traffic.

Interesting asides:
Your phone mic sends data before the call is connected.
Browser connections are sent in plain text

Juniper Mobile Threats Paper
Do it yourself cellular IDS

Written by Linda MacPhee-Cobb

August 6th, 2013 at 4:14 pm

Posted in Geekiness

Tagged with

DefCon notes: Sim card apps

without comments

Sim cards have processors and can run applets created in Java.

SIM Hacks, everything you need for hacking SIM cards, slides from DefCon talk
Java Card SDK
SIMAlliance CAT Loader

You’ll need a PCSC smart card reader

Interesting asides:
Applets can run separately from the cell phone
Carrier can remotely and silently install apps
Apps can be remotely queried for data

Juniper Mobile Threats Paper
SMS Fuzzing, SIM Toolkit Attack
The secret life of SIM cards ( slides )

Written by Linda MacPhee-Cobb

August 6th, 2013 at 4:13 pm

Posted in Geekiness

Tagged with ,

DefCon notes: RFID tag

without comments

RFID tags are often used to gain access to secure buildings. You can copy and clone a card you can get close to but it’s not easy to do so from a distance ( couple of inches )

Resources:
Proxmark3 using Proxbrute is the favorite tool for grabbing data.
RFIDiot Software tool set for exploring RFID tech

Written by Linda MacPhee-Cobb

August 6th, 2013 at 4:12 pm

Posted in Geekiness