A phone in London and a seasick girl.
May. 11th, 2004 08:56 pmWe are looking to get a cameraphone for
redcountess (see her post). We're eyeing up the Motorola V525 for nothing up front on a one-year £15/month contract. It does 640×480 photos and everything else except MP3s, really.
So. Have any of you lot tried it?
The rest of Vodafone's nothing-up-front selection is here. Motorola V525, Panasonic X60, Sony Ericsson T610, Nokia 6820, Samsung P400, Sharp GX10i and Nokia 6600. The ones doing 352×288 are not suitable.
Update: Thanks to impatience, we've gone for the Motorola. Arriving Friday.
(no subject)
Date: 2004-05-11 01:35 pm (UTC)(no subject)
Date: 2004-05-11 02:06 pm (UTC)(no subject)
Date: 2004-05-11 02:07 pm (UTC)(no subject)
Date: 2004-05-11 02:15 pm (UTC)(no subject)
Date: 2004-05-11 02:20 pm (UTC)Um, okay.
In any case, I only switch it on when I actually want to use it, which is just common sense anyhow (running an extra radio costs battery life), which is seldom in a situation where anybody'd have an opportunity to break into my phone. My co-workers could... only to find that the addressbook is primarily them.
The threat model just doesn't make sense here.
(no subject)
Date: 2004-05-11 02:38 pm (UTC)(no subject)
Date: 2004-05-11 03:01 pm (UTC)(no subject)
Date: 2004-05-11 03:40 pm (UTC)I think
I think that, disregarding all of my complaints against the actual funtionality of the attack, the threat model still isn't there. The proven attacks involve stealing my contact information (have it! here, you want it?) or schedule (I don't use the phone for that, so have fun). So I'm not scared because I understand the threat model and it simply doesn't apply to me.
Maybe it does to you?
(no subject)
Date: 2004-05-11 03:59 pm (UTC)(no subject)
Date: 2004-05-11 04:02 pm (UTC)The two things are not logically related. A paired device (like a laptop or a headset) could do this. But I've seen no evidence that supports that theory that some random attacker can waltz up and pair with my phone (unless it's a Nokia, which it's not). The repeat-old-pairing-even-if-deleted problem is a bit bothersome... so don't pair with things that don't belong to you. Poof.
Threat model, threat model, threat model.
(no subject)
Date: 2004-05-11 03:13 pm (UTC)(no subject)
Date: 2004-05-11 03:26 pm (UTC)Bluetooth ain't perfect. Neither is 802.11. Neither is SSH (2, even). That doesn't mean they aren't useful technologies, and that doesn't mean there's a realistic threat model where it's logical to believe that I'd be injured by this attack. Therefore, I choose to use the technologies, knowing the risks. (And they're really not that great in the case of Bluetooth out there in the Real World.)
(no subject)
Date: 2004-05-11 02:10 pm (UTC)(no subject)
Date: 2004-05-11 02:14 pm (UTC)(no subject)
Date: 2004-05-11 02:16 pm (UTC)I had every intention of buying a PowerBook or iBook (SE and Apple are cooperating on synching addressbooks), and SE's is probably the best Bluetooth stuff you can get in the states. But most of those things don't apply to you.
(no subject)
Date: 2004-05-12 05:16 am (UTC)(no subject)
Date: 2004-05-12 06:02 am (UTC)