Comments

Clive RobinsonMarch 4, 2017 1:54 AM

It needs to br noyed that Marconi brought this upon himself.

He was a trickster, con artist, plagiarist and a lot worse. Examination of his patents show he quite deliberatly deceived the "patent clerks" and stole the ideas of many people of the time.

Thus to see him get a little "comeuppance" in public was a small fraction to redressing his wrongs.

On a technical note, the type of transmitter being used to do thr hack was a "spark transmitter" which has an incredibly broadband output and would be considered a "jammer" these days. Thus even if the receiver used in the lecture had been "tuned", the close proximity of the spark transmission would still have overcome the limited "pre-selection" of being what we would now call a TRF receiver. True selectivity of the level required did not comeabout untill the Super Hetrodyne receiver was designed some years later.

NystagmusEMarch 6, 2017 4:43 PM

Thanks for that article. It really is delightfully entertaining and educational.

It's nice to learn about those who aren't household names in the books of fame.
It's a good lesson in phenomenology. Leave it to The Magicians to have the last laugh.
And it's nice that we can laugh with them not at them, and they with us and not at us either.

The reality of truth and the truth of reality are the only things that matter.
All else is opinion or illusion or both. (or propaganda)

This article is another one of those timeless examples of this.

ThunderbirdMarch 10, 2017 9:57 AM

I was wondering why this post was tagged "man-in-the-middle-attacks," when there's no man-in-the-middle component? It seems that the transmission was just overwhelmed by a closer one, not intercepted and retransmitted.

Wow, only two comments on this post!

Leave a comment

Allowed HTML: <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre>

Photo of Bruce Schneier by Per Ervland.

Schneier on Security is a personal website. Opinions expressed are not necessarily those of IBM Resilient.