{"id":318,"date":"2023-09-23T15:25:31","date_gmt":"2023-09-23T15:25:31","guid":{"rendered":"https:\/\/www.hexkey.co.uk\/lee\/?p=318"},"modified":"2023-09-23T15:25:31","modified_gmt":"2023-09-23T15:25:31","slug":"person-of-interest-s4e07","status":"publish","type":"post","link":"https:\/\/www.hexkey.co.uk\/lee\/log\/2023\/09\/person-of-interest-s4e07\/","title":{"rendered":"Person of Interest S4E07"},"content":{"rendered":"\n<p>Notes for season 4, episode 7, &#8220;<a href=\"https:\/\/personofinterest.fandom.com\/wiki\/Honor_Among_Thieves\" data-type=\"link\" data-id=\"https:\/\/personofinterest.fandom.com\/wiki\/Honor_Among_Thieves\">Honor Among Thieves<\/a>&#8220;<\/p>\n\n\n\n<p>01:13 Shaw is assisting a group of robbers cosplaying as Eliot from Mr Robot.<\/p>\n\n\n\n<p>10:58 Root runs a &#8220;BSSID WiFi crack&#8221; and the output shows &#8220;<code>B4b!5e84st14n<\/code>&#8221; as the &#8220;WEP&#8221; password. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wired_Equivalent_Privacy\" data-type=\"link\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/Wired_Equivalent_Privacy\">WEP<\/a> keys were usually expressed as 10 base-16\u00a0 hexadecimal characters &#8211; i.e. 0-9 and A-F. Also, the use of RC4 meant that WEP was obsolete by 2003, and probably shouldn&#8217;t be found in the house of a rich tech guy in 2014.<\/p>\n\n\n\n<p>11:38 &#8220;one tablet per student&#8221; is a clear allusion to the\u00a0 &#8220;<a href=\"https:\/\/en.wikipedia.org\/wiki\/One_Laptop_per_Child\" data-type=\"link\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/One_Laptop_per_Child\">one laptop per child<\/a>&#8221; which was famous for it&#8217;s white and green &#8220;XO&#8221; laptop designs between 2006 and 2012. The project still exists, but now distributes more conventional black laptops running Ubuntu.<\/p>\n\n\n\n<p>13:32 &#8220;McCauley&#8217;s crew in LA&#8221; is a reference to Heat (1995), and a little more subtle than naming your Spanish Thomas Crown, &#8220;Tomas Koroa&#8221;.<\/p>\n\n\n\n<p>18:48 Ah, the &#8220;Fast Five&#8221; solution to safe cracking.<\/p>\n\n\n\n<p>21:33 The <a href=\"https:\/\/web.archive.org\/web\/20141105194216\/http:\/\/www.cdc.gov\/vhf\/marburg\/\" data-type=\"link\" data-id=\"https:\/\/web.archive.org\/web\/20141105194216\/http:\/\/www.cdc.gov\/vhf\/marburg\/\">actual CDC Marburg page<\/a> at the time of air looked different from the one shown. There have been a number of news reports on Marburg in the last year, with a media now primed to treat any outbreak of anything as a potential future pandemic.<\/p>\n\n\n\n<p>24:00 More 3D printers. The tablet project is using the&nbsp;Stratasys Dimension 1200 (from 2006).<\/p>\n\n\n\n<p>29:21 ISA operators transporting their Dell monitors in Pelican cases.<\/p>\n\n\n\n<p>31:58 Samaritan identifies a &#8220;gait mismatch&#8221; between Root and the legal secretary she&#8217;s posing as.<\/p>\n\n\n\n<p>32:50 &#8220;I got a text offering me $3000 if I can fix your internet in the next five minutes.&#8221; Samaritan is able to create an impromptu gig economy to be it&#8217;s hands in the physical world.<\/p>\n\n\n\n<p>37:45 Reese is wearing Aiden Pierce cosplay with his mask and iconic cap.<\/p>\n\n\n\n<p>40:00 Finch has successfully destroyed the &#8220;free tablets for kids&#8221; scheme. But at least those kids won&#8217;t be subjected to algorithmic surveillance. Google launched &#8220;Google Classroom&#8221; in 2014, and in 2015 the EFF submitted a complaint to the FCC regarding the data collection done with the settings on Chromebooks provided in education.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Notes for season 4, episode 7, &#8220;Honor Among Thieves&#8220; 01:13 Shaw is assisting a group of robbers cosplaying as Eliot from Mr Robot. 10:58 Root runs a &#8220;BSSID WiFi crack&#8221; and the output shows &#8220;B4b!5e84st14n&#8221; as the &#8220;WEP&#8221; password. WEP keys were usually expressed as 10 base-16\u00a0 hexadecimal characters &#8211; i.e. 0-9 and A-F. Also, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[7],"class_list":["post-318","post","type-post","status-publish","format-standard","hentry","category-notes","tag-person-of-interest"],"_links":{"self":[{"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/posts\/318","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/comments?post=318"}],"version-history":[{"count":1,"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/posts\/318\/revisions"}],"predecessor-version":[{"id":319,"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/posts\/318\/revisions\/319"}],"wp:attachment":[{"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/media?parent=318"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/categories?post=318"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hexkey.co.uk\/lee\/wp-json\/wp\/v2\/tags?post=318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}