new use for duct tape

Saw this on the news tonight:

A Pierce County couple captured a violent burglar, proving once and for all there really are a million uses for duct tape.

When a Pierce County couple came home Friday to their pastoral paradise, they knew something was wrong when someone came jetting out of the inside of the house.

The owners, who asked us not to reveal their names, say someone had broken into the home and the fight was on.

“She was able to, uh, grab a softer piece of his anatomy and convince him to move a little bit,” Jim says.

Jim tackled the suspect to the ground as neighbors arrived and tied him up with television cable and duct tape.

Original story is here (registration required, bug me not )

when random people link

So what does the rest of the blogging community do when you're curious who is linking to you?

Recently someone posted a random trackback ping to my website. No problem, so I go check them out. I'm in their blogroll, and so is Bill, and neither of us know who they are. I don't really have a problem with this — this is the web, and this is what it's meant to do… But now I'm curious!

[ Due diligence: there is no e-mail address listed on the website; going to the parent domain ( ) gives a few links, primarily to some pictures, and I don't know anyone in them, nor does Bill. ]

Genius! The PEEP Protocol

Found over at Benjy Feen's website — the PEEP Protocol. A wonderful way to converse with other busy people over IM and IRC. Of course, on the flip side, my console-based AIM client is full of peep, peep, meep, meep, qp, meep, etc.

SHA-1 Broken

Bruce Schneier posts that SHA-1 has been broken:

SHA-1 has been broken. Not a reduced-round version. Not a simplified version. The real thing.

The research team of Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu (mostly from Shandong University in China) have been quietly circulating a paper announcing their results:

  • collisions in the the full SHA-1 in 2**69 hash operations, much less than the brute-force attack of 2**80 operations based on the hash length.
  • collisions in SHA-0 in 2**39 operations.
  • collisions in 58-round SHA-1 in 2**33 operations.