This blog is dedicated to methodology development of the scientific approach to computer science education and cybersecurity fields like digital forensics and information assurance. This site is not intended as a reference for practitioners of cybersecurity, but a guidance for those entering this field and would like to learn the basics of the scientific approach and methodological testing of scientific problems that is missing from a basic computer science and technology based STEM education.
Friday, May 1, 2015
Apple Watch Customized
I not just got a hold of my first apple, but hacked it to my custom needs, and installed fingerprint authentication on top of it. I even managed to keep the air filtration system in place for reliable operation. The time values are encrypted, so only I can find out the actual time. It is not cheap plastic, but well engineered space age metal. It is not connected to the Internet to provide a very secure operation. Of course, it does not need battery anymore, just a single apple can provide hours of energy. ( I'm not sure if it is genetically modified, it was not labeled. )
P.S. I just had a hard time posting this since I had to find a replacement hard drive for my laptop :-)
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment