Marketing guerilla: fake-fake-blogs

Par défaut

In last months, there has been a lot of noise about fake blogs, companies creating dummy blogs to praise their products, acting like a real personn who really like this product.
It’s not new, it has been used for years on by authors using fake identities to praise their own books.

After a new EU directive, this kind of behavior will be forbidden at the end of the year.

It’s the last happy year for companies using this technique, and I wonder if it would be possible to counter-attack them at their own game: creating fake-fake-blog, praising a product so much that it obviously appears as a marketing campaign.

  • What would be the needs for this kind of attack?
  • How would it be efficient, and how to mesure its effectiveness?
  • Would it be possible to create a win-win situation using this strategy?

Hacking history: Back Orifice

Par défaut

Nearly 10 years ago, a teenager dream became a virtual reality: Back Orifice released by The Cult of The Dead Cow

Basicly, it was a small trojan horse with really simple commands to connect to infected computers on internet. All you needed is a range of ip – national ISP networks were working well – to scan for any open connection and start playing with it. Really useless, but so much fun 🙂

Today, CCC has released a documentary about this piece of history:

BEAM Robotics: electronic art life

Par défaut

From Wikipedia:

The word « beam » in BEAM robotics is an acronym for Biology, Electronics, Aesthetics, and Mechanics. This is a term that refers to a style of robotics that primarily uses simple analog circuits instead of a microprocessor in order to produce an unusually simple design (in comparison to traditional mobile robots) that trades flexibility for robustness and efficiency in performing the task for which it was designed. Exceptions to the convention of using only analog electronics do exist and these are often colloquially referred to as « mutants« .

Interesting links: