There was a talk about this at defcon around 2010ish. I'll try to dig it up and the other articles I've seen on it. Lots of different methods, you will look strange or "cyberpunk" but it works.
There was a talk about this at defcon around 2010ish. I'll try to dig it up and the other articles I've seen on it. Lots of different methods, you will look strange or "cyberpunk" but it works.
(post is archived)