Google offers USB security key - U2F  “Tarnovsky needed six months to figure out his attack, which requires skill in modifying the tiny parts of the chip without destroying it.  Using off-the-shelf chemicals, Tarnovsky soaked chips in acid to dissolve their hard outer shells. Then he applied rust remover to help take off layers of mesh wiring, to expose the chips’ cores. From there, he had to find the right communication channels to tap into using a very small needle.  The needle allowed him to set up a wiretap and eavesdrop on all the programming instructions as they are sent back and forth between the chip and the computer’s memory”  iOS 8.1  SMS/MMS relay pay Drug dealer banks supported iCloud Drive iPad Air 2 specs  iPad mini 3 is the same as the mini 2  1Q84  Kafka on the Shore  FileVault  OS X 10.10.0 Bugs  Vibrancy vs Aero  iPhone 6 Plus weak spot metal reinforcement  Civilization: Beyond Earth - Mac and Linux late 2014  Civ 5 talk  Blizzard/Activision disaster  Project Cars  Star Citizen funded $54 million  The Piratebay  Audiobooks FrootVPN advertiser OpenVPN on iOS  Wolfenstein  3D realms  Bluetooth-tracking in LA and Chicago  Date: 2014–10–23  Time: 01:05:23