OMEN messaging environment draft

Reading Time: 3 minutes

Open messaging environment (project OMEN)

OMEN is an open source news and messaging platform. It aims to create the framework
for employees who are working in intensive information related environments. OMEN is
browser based, operating system neutral, free of upgrades or updates.

It is currently implemented for normal computer environments in 2010, but aims to support
Eyetap technology (Virtual Reality glasses, by doctor Steve Mann of U. Toronto) by 2015.

Picture this: you are low on money, mood, and it is freaking raining -1 degree celsius water
sticks in your neck. Your gf just lost you, and life couldn’t be bitcher. Or so you thought!

Oh yes, wait for the real snacks. Since you are traversing in new territory, you do not know
a heck of the geography. Your snappy cool smartphone just choked on a heavy vector
graphics hack of a map, so you are out of web browser help. And was it today that the
bus drivers were implementing their yearly strikes?

This is close to a real world situation I
was once in. I promised I would get even. Finnish IT infrastructure is bipolar in nature;
it is supposedly way ahead of competition, but in a cold and evil way it is also leaving
you hopelessly without help in the worst of situations.

OMENs main message is: get in touch, stay in touch! And thus stay out of trouble!
It employs
single sign on (SSO) for fast sign ons, and no password fuzzes
lost password recovery
warnings for possible multiple session usage (hacked)
realtime broadcast messaging
fast email with easy, powerful search (naturalized grep)
Voice over IP telephony
versioning of all data
autocat categorization system, which keeps your documents and data in a new flexible form

Using OMEN feels subjectively like being in the blessing or some norse gods. You
feel empowered and not lost at all. Things are easy to achieve; you can get
in touch all the time, read your mail, see from a satellite’s bird eye view where you
are, etc. In fact, once you get used to OMEN, it is quite a strange experiment
to live without it.

One of the main things OMEN tackles is the synchrony of time problems (SoTp) in
modern, globalized working places. This means in practical terms that OMEN helps
employees understand how the organization is awake; who is in where, doing what, and
can they collaborate; or when to expect an answer.

main line of focus is at providing a modern, operating system neutral
platform for workers.

Attributes of OMEN

Openness – there is no “system” in that everyone can inspect and question the
architecture. The OMEN framework merely provides a technical basis and structure
for people’s natural communications needs. OMEN does not make people hide or
swear about the system. There are no principles or ideologies behind OMEN.

Practicality – Some reference designs are made for easy, hands-on activity.
Like implementing a VoIP headset / handset with as little $$$ as possible, still
attaining good voice quality.

Ease of use

– the qualities of objects are visible; for example, a mailbox: how often it updates, how frequently it gets inbound email; how much data is used by inbox and folders. Etc. Lot of practical meters.

– OMEN is running in a distributed cloud, so its security is based on the access
control to the cloud’s databases. These in turn are based on the authentication and authorization methods used at the client machine level.
– by default, OMEN uses strong cryptography in software implementation.
– Onion routing of data

Little updates — better stability and ease of use
– users can expect the system to be stable in terms of usability, ie. the updates
are not driven in daily, weekly; they are as transparent as possible. Maybe expect
2 or 3 major updates a year. Updates can be distributed as stegonets, driven into
the software with a PCXT agent, or maintained by hand. You are in control of the method.

– user
– admin
– architect
– god: the original programmer of OMEN, a Finnish system administrator who goes by the nickname ‘poek’.

Project development steps

Prioritized milestones :: aka what to provide and when
– messaging = basic channel, private, and broadcast messaging
– email kind of functionality
– intellispider, crawling web for articles in a way you want. {lang,length,images,spammy,topical}
– VoIP telephone integration


EFFi keskustelua ja kanta intialaisen vaalikonehakkerin toimista

Reading Time: < 1 minute

EFFi: Intian vaalikoneiden hakkerointi

keyword: India, EFF, Electronic Frontier Foundation Finland ry, EFFi, elections,
voting tricks, hacking, bribe, liberty, democracy, politics, voting machine
Diebold, hacks, Microsoft, Visual Basic, smartcard

Backgrounder in English: Finnish branch of the EFF, Electronic
Foundation Finland ry, brings light of their opinion in the
matter regarding the arrest warrant for Hari Prasad, an Indian
security researchers. Prasad has researched the reliability
and other factors of Indian voting machines.
, a Finnish engineer,
hacked one of these in USA, which brough Diebold in pretty
bad light. The hack was done using Visual basic and little

Effi: Intian vapautettava
äänestysjärjestelmän aukot paljastanut tietoturvatutkija

Electronic Frontier Finland ry (Effi) vaatii, että
Intian on
vapautettava välittömästi tietoturvatutkija Hari Prasad.
Prasad on
ollut pidätettynä viime lauantaista lähtien ja häntä epäillään
tutkimuskohteena olleen äänestyskoneen varastamisesta. Prasad on
kieltäytynyt toistaiseksi paljastamasta, kuka koneen toimitti hänelle ja
Michiganin yliopiston tutkija J. Alex Haldermanille.

Effin Ville Oksanen kommentoi:”Kyseessä
on saamiemme tietojen mukaan
selkeästi poliittisin perustein tehty pidätys. Prasadin ja Hardermanin
julkaisemat tiedot äänestysjärjestelmän aukoista osoittavat, ettei
järjestelmään ja siten äänestystulokseen voi luottaa. Ei ole erityisen
yllättävää, että hallinto haluaa saada selville ongelmat paljastaneen
tahon eli henkilön, joka toimitti äänestyskoneen puolueettoman tahon

Effi pelkää, että Prasadin
pidättäminen muodostaa jälleen uuden vaarallisen ennakkotapauksen, jolla hyökätään tietoturvatutkijoiden sananvapautta vastaan. Erityisesti poliittisesti
herkissä aiheissa, kuten äänestysjärjestelmien luotettavuudessa, vapaa tieteellinen tutkimus olisi kuitenkin ensisijaisen tärkeää järjestelmien legitimiteetin varmistamiseksi.

Effin n.n lisää lopuksi:” Vaadimme, että Intian hallitus vapauttaa Hamid
Prasadin välittämästi. Viestinviejän kimppuun hyäkkäämisen sijaan
järkevämpää olisi tunnustaa äänestysjärjestelmän ongelmat ja korjata ne!”

Linkit aiheesta

Security Analysis of India’s Electronic Voting Machines

Update: Indian E-Voting Researcher Remains in Police Custody

India’s unsafe EVM: Shooting the Messenger


PIN encoding monster – protect your sheets

Reading Time: 3 minutes

#include <stdio.h>
#include <stdlib.h>

The pin encoding monster. Encrypts and generates
lists of numeric pin codes using simple over- and
underflow arithmetic. Security based on 1 master
PIN code.

– enter your sheet of codes to be protected, into pins array
– check the 3 variables that control what kind of PINs are accepted
– enter your main PIN code
– run program to produce output sheet of encrypted PINs

The over- and underflow means that each PIN, containing
arabian numeric characters (0..9), is added a key number.
The key number is overflowing (if over 9, goes from 0 and round again)
and underflowing (if decreasing 0, then roll over to 9 and count down).
This means the lineage is infinite. You can use

Freely distributable, keep the copyright and e-mail
markings intact. Enjoy. No guarantees as usual.

DO NOT use for counterfeiting, hacking, or any other purpose
which might bring you harm. Do as ye wish, less harm none.

Feedback appreciated:

Jukka Paulin, CS Student
November 2001, Finland

= I wish a *peaceful Christmas* to all the people in the world. =
= Stop the war. Revenge begets revenge! Recursion quite obvious. =
= Over and out. =


#define PIN_COUNT 74
#define MAX_PIN_LEN 4
#define MAX_KEY_LEN 4

char * pins[PIN_COUNT] = {

char * confirmCodes [18] = {

Params: – *pin is the PIN number in asciiZ
– *key is the KEY in asciiZ
– *targetBuffer is where the encoded PIN gets written
void encode (char *pin, const char *key, char *targetBuffer) {
int length;
int j;
char tmp;

if (length<1) return;
if (length>MAX_KEY_LEN) {
printf (“\nerror: KEY too long. Maximum is: %d\n”,MAX_KEY_LEN);
for (j=0; j<length; j++) {
tmp = *pin++;
tmp += *key++ – ‘0’;
if (tmp > ‘9’) tmp -= 10;
*targetBuffer++ = tmp;

Makes a Nordea SOLO -type PIN list. This has 80 disposable
PINs and a fixed list of 18 verification codes. The verification
codes are not overwritten on use, they last until the whole list
– parameters: listOfPins = a pointer to PIN codes in ASCII
listOfCodes = a pointer to fixed codes in ASCII
codesLetters = a table of alphabets which match fixed codes
(might be eg. “ABCDEFGHJ” where ‘I’ is skipped because it
would morph easily with ‘1’. If the list length is less
than the amount of PINs, they used over again.)
startOrdinal = the ordinal number of first PIN, even if
the PIN actually omitted
excludedAmount = how many codes have been omitted from start
rowsInColumn = how many numbers to print in one vertical column
key = the encoding key */
int makeNordeaList (char *listOfPins[], char *listOfCodes[],
const char *codesLetters,
int startOrdinal, int excludedAmount,
int totalAmount, int rowsInColumn, const char *key)
char encoded[5];
int remainder;
int columns;
encoded[4] = 0; /* set string terminator */

/* Some fiddling first with the format of the output list.
– format the list so that it reminds the original one even
though some codes may have been omitted from the start
if (rowsInColumn == 0) {
printf (“\nError: rowsInColumn = 0. Not a valid format!\n”);
remainder = excludedAmount % rowsInColumn;
columns = totalAmount / rowsInColumn;

if ((excludedAmount > 0) && ((excludedAmount % rowsInColumn) != 0))
printf (“\nList needs modification on format.\n”);
} else {
/* List fine, needs no adjustment. */

int main ()
/* Params: pins, codes, chars, start, excluded, total, percolumn, key */
makeNordeaList (pins,confirmCodes,”ABCDEFGHJKLMNPRSTU”,
01, 7, 80, 10, “7890”);
return 0;


Caresim simulator of hitch hikers

Reading Time: < 1 minute

Simulation of car hitch-hiking service

This simulation is an exercise and rose out of my
interest to get a Zimride.com -type of transportation into Finland and rest of the Europe.

Modeled (simulated) decentralized logistic service
with two classes of people: those with a car, and those without.

The purpose of simulation is to investigate how a given road network can help people get moving from place to place. It is based on monitoring road traffic manually via ascii string entry, and getting automated information via mass movement, so that datamining preserves privacy.

Simulation parameters are:

v – the road network (segments, speed limits)
n – number of points (buildings, start and end points)
a – car (speed, characteristics of the gasoline consumption, etc.)
k – users ([x, y]; need; media; money)

Road network consists of points, which are connected to a straight line.

The road can be simulated to arbitrary careful if necessary. In practice sufficient, for example, that the curves sampled at 100m resolution.

Simulation is not relevant to the road shape, but the road
The total length and its various components, the speed limit.

The speed limit is the maximum allowable speed of the vehicle in a specific section of the road.

The simulation assumes that cars do not drive at overspeed (ie. beyond the speed limit).


Saab 9-1 consumer futurology and anthropologic trends

Reading Time: 4 minutes

Traffic and sociology research for initial phase progress
of Saab 9-1 concept car, due out in 2014.

Historical aspect

The car has evolved for approximately 100 years now. The first vehicles to compete with horse-led carriages appeared in the 1700s. But these were not yet automobiles, even though the terminology, “automobile”, means exactly this: a carriage that moves by itself. (latin: automovile).

Auto means by itself, in latin language. Motive is for movement (movile, mobile, mobility). Automobile is thus a self moving (object). Even though the car does not actually move without a engine, we can assume that the engine is part of the automobile.

Though never take these kinds of things for granted, since there is possible that like certain other technological objects, especially my memory reminds me of so-called Winmodems, the modem does not contain the chips necessary to do modulation demodulation functions, as they were moved into the
responsibility of the computer in these cases.
[Modems are computer hardware meant to enable birectional data transmission].

As I’m writing this text, with the goal of explaining and researching into the new Saab 91’s information systems, I also revisit the history of a whole industry. If you have good knowledge of automobile history, please contribute to the article by leaving a comment on this page.

The car is an interesting object of study. Its creation and especially birth in history involves many INVENTIONS, and it was not so clear in the beginning that such a thing
would ever succeed – just like it was not clear with many great inventions.

Cars were merely “test beds with wheels” for steam power! Some said that cars will never replace horses. But these engineering wonders evolved and became dominant way of land transport.

There are two main defining terms in a car: self-propellant, and personal.

Cars have evolved in several areas. The transmission, engine, and many facets that involve safety have been improved over the years.

Many challenges remain in the whole industry: reducing pollution, considering alternative fuel sources to fossil fuels, choosing safe, lightweight and environmentally friendly construction materials; and reducing accidents – among other things.

The automotive industry is like any other: good ideas
spread, they become a norm, but there is usually a manufacturer that pilots the idea first.

I’d like to however pick up two big trends coming over in the early 21st century: ecology and the amount of electronics (“intelligence”) a car has.

Both these are very interesting forks, and prove plenty of challenge to the designers.

Saab 91 is aimed mainly at the 20-30s who want to extend their mobile life style into the driving experience as well. The essential tagline for the project is: extend yourself!

This by no means rules out other potential users; with its highly
advanced navigational and other driving aids, combined with Saab’s tradition for safety-first principle, the car is ideal for people with slight cognitive disabilities like eyesight problems and such. As the growing population

Saab can guide the person on the road- both in terms of navigation and realtime, computer-aided scenery interpretation (“eyesight” for the computer).

The car will enable people to leave for work or leisure, without
worrying about whether they have a computer, a network, or the correct type of music CDs with them. The car is an extension and a bridge between the home and other places. Your drive is more comfortable, varied with choice and pleasure.

Picture this: usually you are disconnected when your car trip begins; you set your phone somewhere, you certainly cannot access your laptop while driving; and even the idea of streaming music, realtime to your environment is usually impossible or difficult. Ford has done lot of research and development with Microsoft, and they have come up with the system for delivering rich experiences while driving.

With Saab it’s different; you’re seamlessly connected with the cellphone, controlling it from the car’s steering wheel and with voice commands.

An incoming call is not anymore a hassle; you can swiftly handle talking, without having to grab your phone from a bag or other difficult place.

In addition, you have a superb navigational system with realtime objects in the map: restaurants, places to take a break, gas stations, information about congestion and
hazards – all that you can imagine of.

Saab connects to networks using any technology that is available:
directly through its own mobile network; using wideband, fast wireless connection (perhaps ultrawideband, or UWB), or by using your mobile phone’s shared connection. The car minimizes the offline time, yet doesn’t make too much of data plan costs if instructed to do so.

speed of vehicles
reach, and dayreach
power distribution; or fuel distribution
costs of driving, per km in certain timeslot
social habits of people
pollution awareness
the CO2 problem
which segments are cars competing with in general?
interview a lot of carless people
green wave
people’s stress
mobile work
leisure time profile
gasoline cost
25% of all crashes happen in shop parking spaces, worth $4000-$6000 per incident

4G rollout
-speed test results
-average results
-max results
-minimum worst case
4G rollout is extremely important for good LivingIP system.
Though by no means are we tied to 4G, but basically
meaning a 4G-like radio mesh.

mobile services
shopping assist
logistics with shopping chains
people’s preference

The branches

1. nothing changes
cars get faster
power is stabilized
consumption gets down to asymptotic minimum
fuel considerations; biofuel is available in 10-15% of cases
tech increases slightly; radars, multimedia, but nothing radical

2. medium change

3. radical change, Saab dream
– autos become autopiloted
– gradual increase in % of autopilot cars in traffic
– optimal driving; luxury. Manual override always possible
– consumption least, saving energy
– traffic lights unnecessary in robo roads
– no speedings; cars become actually safe as they can be
– the earth traffic can be modelled like space traffic,
neglecting pretty much things related to human nervous
system inaccuracies


Working outdoors with a laptop

Reading Time: 2 minutes

Taking the laptop outdoors either in your own yard, the summer cottage, or in a park outside your office is a good idea.. kind of.

Picture of finnish gooseberry, homeyard, august 2010

But you need to consider a couple of things.

Energy – how long your battery can provide you with power, without the laptop being plugged in to mains power. The energy consumption is very logical: the brighter display settings you use, the more devices you have plugged into the machine like mice, USB devices, digital camera cables, and so on – the more you spend, thus less time to work.

Moist – sometimes outdoor weather is pretty moist. This means a couple of things. You might feel a bit strange using the keyboard; and this happens also when your fingers are getting cold. Second, the machine might not like moist too much. Most laptops are okay with normal moisture ranges, but if there’s a particularly warm and moist weather, or a lot of visible fog, don’t take the laptop outside. It might get trashed or work erroneously.

Screen contrast – visibility. It’s amazing how much irradiant light comes from the sun. In the office space or inside your home, it’s usually dimmed by shades in the windows and so on. But outside, it’s totally different thing. The sun’s energy is defined like this (in Wikipedia):
Daylight or the light of day is the combination of all direct and indirect sunlight outdoors during the daytime (and perhaps twilight). This includes direct sunlight, diffuse sky radiation, and (often) both of these reflected from the Earth and terrestrial objects.