--
You received this message because you are subscribed to the Google Groups "HeatSync Labs" group.
To unsubscribe from this group and stop receiving emails from it, send an email to heatsynclabs...@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
That sounds cool, David. I'm just sort of interested in exactly how that works. It is "location anonymous" due to being proxied through Tor? (and the prism and physical setup is just eye-candy?) Or else what actually is going on there?
-Alt
--
You received this message because you are subscribed to the Google Groups "HeatSync Labs" group.
To unsubscribe from this group and stop receiving emails from it, send an email to heatsynclabs...@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
So, mumble will automatically generate a client side certificate, but then it's up to server settings as to what happens from there. The server usually needs pseudonyms (usernames) for each of the clients, which are associated with these certificates. So these client certs will be stored on the server. But since they're automatically generated, it's likely that they don't have much or any personally identifiable information. But it's possible that they could have info like time zone, OS info, client software version, etc... Which could be identifiable in the same way that user agent strings are highly identifiable. I'll look into it more tonight.
-Alt
--
--
You received this message because you are subscribed to the Google Groups "HeatSync Labs" group.
To unsubscribe from this group and stop receiving emails from it, send an email to heatsynclabs...@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
A ups will pass all of that along.... Unless you pull the power cord and have it operate in backup mode. There are relays, they are a pass through unless you lose power.
Why not just comb filter the audio for both frequencies in software or inject both as well?
http://feedly.com/k/15gm7Dk relevant hackaday?