<article>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#article10_03_30_0352247</id>
	<title>Self-Destructing USB Stick</title>
	<author>samzenpus</author>
	<datestamp>1269950220000</datestamp>
	<htmltext><a href="http://hughpickens.com/slashdot/" rel="nofollow">Hugh Pickens</a> writes <i>"PC World reports that Victorinox, maker of the legendary Swiss Army Knife, has launched a new super-secure memory stick that sounds like something out of Mission: Impossible. The Secure Pro USB comes in 8GB, 16GB, and 32GB sizes, and provides a variety of security measures including fingerprint identification, a thermal sensor, and even <a href="http://www.pcworld.com/article/192738/victorinox\_launches\_supersecure\_usb\_stick.html">a self-destruct mechanism</a>. Victorinox says the Secure is 'the most secure [device] of its kind available to the public.' The Secure features a fingerprint scanner and a thermal sensor 'so that the finger alone, detached from the body, will still not give access to the memory stick's contents.'  While offering no explanation how the self-destruct mechanism works, Victorinox says that if someone tries to forcibly open the memory stick it triggers a self-destruct mechanism that 'irrevocably burns [the Secure's] CPU and memory chip.' At a contest held in London, Victorinox  put its money where its mouth was and <a href="http://blogs.zdnet.com/gadgetreviews/?p=13542">put the Secure Pro to the test offering a &pound;100,000 cash prize</a> ($149,000) to a team of professional hackers if they could break into the USB drive within two hours. They failed."</i></htmltext>
<tokenext>Hugh Pickens writes " PC World reports that Victorinox , maker of the legendary Swiss Army Knife , has launched a new super-secure memory stick that sounds like something out of Mission : Impossible .
The Secure Pro USB comes in 8GB , 16GB , and 32GB sizes , and provides a variety of security measures including fingerprint identification , a thermal sensor , and even a self-destruct mechanism .
Victorinox says the Secure is 'the most secure [ device ] of its kind available to the public .
' The Secure features a fingerprint scanner and a thermal sensor 'so that the finger alone , detached from the body , will still not give access to the memory stick 's contents .
' While offering no explanation how the self-destruct mechanism works , Victorinox says that if someone tries to forcibly open the memory stick it triggers a self-destruct mechanism that 'irrevocably burns [ the Secure 's ] CPU and memory chip .
' At a contest held in London , Victorinox put its money where its mouth was and put the Secure Pro to the test offering a   100,000 cash prize ( $ 149,000 ) to a team of professional hackers if they could break into the USB drive within two hours .
They failed .
"</tokentext>
<sentencetext>Hugh Pickens writes "PC World reports that Victorinox, maker of the legendary Swiss Army Knife, has launched a new super-secure memory stick that sounds like something out of Mission: Impossible.
The Secure Pro USB comes in 8GB, 16GB, and 32GB sizes, and provides a variety of security measures including fingerprint identification, a thermal sensor, and even a self-destruct mechanism.
Victorinox says the Secure is 'the most secure [device] of its kind available to the public.
' The Secure features a fingerprint scanner and a thermal sensor 'so that the finger alone, detached from the body, will still not give access to the memory stick's contents.
'  While offering no explanation how the self-destruct mechanism works, Victorinox says that if someone tries to forcibly open the memory stick it triggers a self-destruct mechanism that 'irrevocably burns [the Secure's] CPU and memory chip.
' At a contest held in London, Victorinox  put its money where its mouth was and put the Secure Pro to the test offering a £100,000 cash prize ($149,000) to a team of professional hackers if they could break into the USB drive within two hours.
They failed.
"</sentencetext>
</article>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31670186</id>
	<title>Re:Two hours?</title>
	<author>pz</author>
	<datestamp>1269962520000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>Presumably, if you had physical access to the drive, wouldn't you have more time to crack it than two hours?</p></div><p>And presumably, you would consider the contents sufficiently important that you could practice cracking on a few spare copies.  I have serious doubts that with sufficient time, physical access could be prevented, self-destruct mechanism or no.  Self-destruct mechanisms require power, in the form of batteries or capacitors.  Detecting separation of the case is one thing, detecting a very fine hole strategically drilled to disable the internal power supply (after a non-destructive x-ray inspection to figure out exactly where the hole should be placed) is quite another.  Once the self-destruct mechanism has been disabled, you can do whatever you want to the stick, and, therefore, have complete access.</p></div>
	</htmltext>
<tokenext>Presumably , if you had physical access to the drive , would n't you have more time to crack it than two hours ? And presumably , you would consider the contents sufficiently important that you could practice cracking on a few spare copies .
I have serious doubts that with sufficient time , physical access could be prevented , self-destruct mechanism or no .
Self-destruct mechanisms require power , in the form of batteries or capacitors .
Detecting separation of the case is one thing , detecting a very fine hole strategically drilled to disable the internal power supply ( after a non-destructive x-ray inspection to figure out exactly where the hole should be placed ) is quite another .
Once the self-destruct mechanism has been disabled , you can do whatever you want to the stick , and , therefore , have complete access .</tokentext>
<sentencetext>Presumably, if you had physical access to the drive, wouldn't you have more time to crack it than two hours?And presumably, you would consider the contents sufficiently important that you could practice cracking on a few spare copies.
I have serious doubts that with sufficient time, physical access could be prevented, self-destruct mechanism or no.
Self-destruct mechanisms require power, in the form of batteries or capacitors.
Detecting separation of the case is one thing, detecting a very fine hole strategically drilled to disable the internal power supply (after a non-destructive x-ray inspection to figure out exactly where the hole should be placed) is quite another.
Once the self-destruct mechanism has been disabled, you can do whatever you want to the stick, and, therefore, have complete access.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668668</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31670692</id>
	<title>A good Offensive is teh best Defense...</title>
	<author>Anonymous</author>
	<datestamp>1269964140000</datestamp>
	<modclass>Funny</modclass>
	<modscore>4</modscore>
	<htmltext><p>Rather than try to "protect" the data contained within a thumb stick (which is kind of passive if you think about it), why not actively try to destroy all data to whatever is connected to the thumb stick instead...</p><p>Criminal: "Ha! I stole this thumb stick from that stupid corporation, and I am sure it is just stuffed with credit card info! Now to just use these easily available utilities I found online to crack it..."<br>Plugs in device<br>PC: "Password:                 "<br>Criminal: "Pffft I can just ignore that, now where did I put that cracker utility..."<br>PC: "Timeout. Initiating self destruct!"<br>Criminal: "Pfft as if it is going to blow up or something, what a joke..."<br>PC: "Virus Loaded....Deleting all files.... Complete. Have a nice day!"<br>Criminal: "....."<br>Criminal: "....."</p></htmltext>
<tokenext>Rather than try to " protect " the data contained within a thumb stick ( which is kind of passive if you think about it ) , why not actively try to destroy all data to whatever is connected to the thumb stick instead...Criminal : " Ha !
I stole this thumb stick from that stupid corporation , and I am sure it is just stuffed with credit card info !
Now to just use these easily available utilities I found online to crack it... " Plugs in devicePC : " Password : " Criminal : " Pffft I can just ignore that , now where did I put that cracker utility... " PC : " Timeout .
Initiating self destruct !
" Criminal : " Pfft as if it is going to blow up or something , what a joke... " PC : " Virus Loaded....Deleting all files.... Complete. Have a nice day !
" Criminal : " ..... " Criminal : " ..... "</tokentext>
<sentencetext>Rather than try to "protect" the data contained within a thumb stick (which is kind of passive if you think about it), why not actively try to destroy all data to whatever is connected to the thumb stick instead...Criminal: "Ha!
I stole this thumb stick from that stupid corporation, and I am sure it is just stuffed with credit card info!
Now to just use these easily available utilities I found online to crack it..."Plugs in devicePC: "Password:                 "Criminal: "Pffft I can just ignore that, now where did I put that cracker utility..."PC: "Timeout.
Initiating self destruct!
"Criminal: "Pfft as if it is going to blow up or something, what a joke..."PC: "Virus Loaded....Deleting all files.... Complete. Have a nice day!
"Criminal: "....."Criminal: "....."</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31674218</id>
	<title>Nice Denial-Of-Service Feature</title>
	<author>that this is not und</author>
	<datestamp>1269974760000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>So now, if somebody wants to sabatogue a data collection effort, they don't need to connect the storage device to a system and delete/scramble it's data.  They don't need to do anything major to physically destroy the device.  They simply need to learn the minimum 'tamper' thing needed to cause the storage device to brick itself.  And the owner of the device probably doesn't even need to find out until much later, when it's too late, that the data is gone.</p></htmltext>
<tokenext>So now , if somebody wants to sabatogue a data collection effort , they do n't need to connect the storage device to a system and delete/scramble it 's data .
They do n't need to do anything major to physically destroy the device .
They simply need to learn the minimum 'tamper ' thing needed to cause the storage device to brick itself .
And the owner of the device probably does n't even need to find out until much later , when it 's too late , that the data is gone .</tokentext>
<sentencetext>So now, if somebody wants to sabatogue a data collection effort, they don't need to connect the storage device to a system and delete/scramble it's data.
They don't need to do anything major to physically destroy the device.
They simply need to learn the minimum 'tamper' thing needed to cause the storage device to brick itself.
And the owner of the device probably doesn't even need to find out until much later, when it's too late, that the data is gone.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669748</id>
	<title>Re:Shame it has a knife on it</title>
	<author>Anonymous</author>
	<datestamp>1269960780000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>Just remember to take it out of your pocket before getting back on that plane.</p><p>I'd be interested in one without the knife as something to play with, but I'm not sure I want to carry all the rest of it around with me (I'm not some knife freak, but I want a USB stick to be just a USB stick).</p></div><p>They make "Flight" versions that still have the laser but are sans blades.</p></div>
	</htmltext>
<tokenext>Just remember to take it out of your pocket before getting back on that plane.I 'd be interested in one without the knife as something to play with , but I 'm not sure I want to carry all the rest of it around with me ( I 'm not some knife freak , but I want a USB stick to be just a USB stick ) .They make " Flight " versions that still have the laser but are sans blades .</tokentext>
<sentencetext>Just remember to take it out of your pocket before getting back on that plane.I'd be interested in one without the knife as something to play with, but I'm not sure I want to carry all the rest of it around with me (I'm not some knife freak, but I want a USB stick to be just a USB stick).They make "Flight" versions that still have the laser but are sans blades.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668694</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31681954</id>
	<title>swiss army usb bomb</title>
	<author>FragHARD</author>
	<datestamp>1269964080000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Oh great, just another tool for the islamist's to ignite their privates with<nobr> <wbr></nobr>:0)</htmltext>
<tokenext>Oh great , just another tool for the islamist 's to ignite their privates with : 0 )</tokentext>
<sentencetext>Oh great, just another tool for the islamist's to ignite their privates with :0)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668984</id>
	<title>Re:Shame it has a knife on it</title>
	<author>bds1986</author>
	<datestamp>1269956400000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Given the fuss about laptop batteries igniting a while back, I can't see the TSA being too pleased with a device with an inbuilt (presumably incendiary) self-destruct mechanism, even without the knife.</p></htmltext>
<tokenext>Given the fuss about laptop batteries igniting a while back , I ca n't see the TSA being too pleased with a device with an inbuilt ( presumably incendiary ) self-destruct mechanism , even without the knife .</tokentext>
<sentencetext>Given the fuss about laptop batteries igniting a while back, I can't see the TSA being too pleased with a device with an inbuilt (presumably incendiary) self-destruct mechanism, even without the knife.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668694</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669514</id>
	<title>Re:Thermal sensor?</title>
	<author>Aceticon</author>
	<datestamp>1269959400000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Warming up loose bits of meat is on of the things microwaves excel at.</p></htmltext>
<tokenext>Warming up loose bits of meat is on of the things microwaves excel at .</tokentext>
<sentencetext>Warming up loose bits of meat is on of the things microwaves excel at.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668686</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31670222</id>
	<title>Re:What if they just breathe at the sensor?</title>
	<author>Tekfactory</author>
	<datestamp>1269962640000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>Funny the story only says Fingerprint scanner and Thermal Sensor, but even thermal + pulse can be fooled by making the fake fingerprint very thin, and applying it to the end of your own finger, unless you don't have a body temperature and pulse.</p><p>Mythbusters did it on the Crimes and Mythdemeanors episode, and I consider the fingerprint overlay patch, and Jamie's Marks-a-lot fingerprint enhancement to be improvements over the original $20 Gummy Bear attack from a Japanese researcher in 2002 that they were copying.</p><p>The original researcher enhanced the fingerprint details in photoshop, Jamie blew up the image in a copier and connected broken lines with a marker and shrunk the image back down.</p><p>The rest of the details Photo Etched Circuit board, silicon/ballistics gel/gummi bears are pretty much unchanged.</p></htmltext>
<tokenext>Funny the story only says Fingerprint scanner and Thermal Sensor , but even thermal + pulse can be fooled by making the fake fingerprint very thin , and applying it to the end of your own finger , unless you do n't have a body temperature and pulse.Mythbusters did it on the Crimes and Mythdemeanors episode , and I consider the fingerprint overlay patch , and Jamie 's Marks-a-lot fingerprint enhancement to be improvements over the original $ 20 Gummy Bear attack from a Japanese researcher in 2002 that they were copying.The original researcher enhanced the fingerprint details in photoshop , Jamie blew up the image in a copier and connected broken lines with a marker and shrunk the image back down.The rest of the details Photo Etched Circuit board , silicon/ballistics gel/gummi bears are pretty much unchanged .</tokentext>
<sentencetext>Funny the story only says Fingerprint scanner and Thermal Sensor, but even thermal + pulse can be fooled by making the fake fingerprint very thin, and applying it to the end of your own finger, unless you don't have a body temperature and pulse.Mythbusters did it on the Crimes and Mythdemeanors episode, and I consider the fingerprint overlay patch, and Jamie's Marks-a-lot fingerprint enhancement to be improvements over the original $20 Gummy Bear attack from a Japanese researcher in 2002 that they were copying.The original researcher enhanced the fingerprint details in photoshop, Jamie blew up the image in a copier and connected broken lines with a marker and shrunk the image back down.The rest of the details Photo Etched Circuit board, silicon/ballistics gel/gummi bears are pretty much unchanged.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668988</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668688</id>
	<title>Re:What if they cut the finger and heat it</title>
	<author>Anonymous</author>
	<datestamp>1269954060000</datestamp>
	<modclass>Funny</modclass>
	<modscore>1</modscore>
	<htmltext><p>Oh common, you're ruining the movie!</p></htmltext>
<tokenext>Oh common , you 're ruining the movie !</tokentext>
<sentencetext>Oh common, you're ruining the movie!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668754</id>
	<title>Does it have a physical read/write switch?</title>
	<author>schwit1</author>
	<datestamp>1269954600000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Does it have a physical read/write switch?</htmltext>
<tokenext>Does it have a physical read/write switch ?</tokentext>
<sentencetext>Does it have a physical read/write switch?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668748</id>
	<title>2 Hours?</title>
	<author>Anonymous</author>
	<datestamp>1269954540000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>Only 2 hours? What are they scared that this thing will be crackable in 3? Seriously, if you are buying one of these to keep something secret on, and you lose it. It will have to remain resistant to attacks for way longer than that.
</p><p>This is (of course) just a cheap publicity stunt.</p></htmltext>
<tokenext>Only 2 hours ?
What are they scared that this thing will be crackable in 3 ?
Seriously , if you are buying one of these to keep something secret on , and you lose it .
It will have to remain resistant to attacks for way longer than that .
This is ( of course ) just a cheap publicity stunt .</tokentext>
<sentencetext>Only 2 hours?
What are they scared that this thing will be crackable in 3?
Seriously, if you are buying one of these to keep something secret on, and you lose it.
It will have to remain resistant to attacks for way longer than that.
This is (of course) just a cheap publicity stunt.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669634</id>
	<title>MacGyver</title>
	<author>pikine</author>
	<datestamp>1269960060000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>There should be a MacGyver episode where he uses the self-destructing USB swiss army knife as a detonator of some explosives he concocted in order to escape some thug...</htmltext>
<tokenext>There should be a MacGyver episode where he uses the self-destructing USB swiss army knife as a detonator of some explosives he concocted in order to escape some thug.. .</tokentext>
<sentencetext>There should be a MacGyver episode where he uses the self-destructing USB swiss army knife as a detonator of some explosives he concocted in order to escape some thug...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668694</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31672046</id>
	<title>Re:Shame it has a knife on it</title>
	<author>AllynM</author>
	<datestamp>1269967920000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>They make them without the blade:<br><a href="http://www.swissarmy.com/multitools/Pages/Category.aspx?category=presentation+pro&amp;" title="swissarmy.com">http://www.swissarmy.com/multitools/Pages/Category.aspx?category=presentation+pro&amp;</a> [swissarmy.com]</p><p>Allyn Malventano<br>Storage Editor, PC Perspective</p></htmltext>
<tokenext>They make them without the blade : http : //www.swissarmy.com/multitools/Pages/Category.aspx ? category = presentation + pro&amp; [ swissarmy.com ] Allyn MalventanoStorage Editor , PC Perspective</tokentext>
<sentencetext>They make them without the blade:http://www.swissarmy.com/multitools/Pages/Category.aspx?category=presentation+pro&amp; [swissarmy.com]Allyn MalventanoStorage Editor, PC Perspective</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668694</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664</id>
	<title>What if they cut the finger and heat it</title>
	<author>unity100</author>
	<datestamp>1269953880000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>5</modscore>
	<htmltext><p>to 37 degrees celsius ?</p></htmltext>
<tokenext>to 37 degrees celsius ?</tokentext>
<sentencetext>to 37 degrees celsius ?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31682116</id>
	<title>Product Testing</title>
	<author>AtomicRhino</author>
	<datestamp>1269965040000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I just want to know how they tested the detached finger scenario....

"Hey Frank, Wanna lend a hand on this test?"</htmltext>
<tokenext>I just want to know how they tested the detached finger scenario... . " Hey Frank , Wan na lend a hand on this test ?
"</tokentext>
<sentencetext>I just want to know how they tested the detached finger scenario....

"Hey Frank, Wanna lend a hand on this test?
"</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668904</id>
	<title>Re:What if they cut the finger and heat it</title>
	<author>Anonymous</author>
	<datestamp>1269955800000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Then the owner of the finger wouldn't feel the heat.</p></htmltext>
<tokenext>Then the owner of the finger would n't feel the heat .</tokentext>
<sentencetext>Then the owner of the finger wouldn't feel the heat.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669166</id>
	<title>WTF!?</title>
	<author>kpainter</author>
	<datestamp>1269957480000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext>The self destruct mechanism link in TFA is a link to a review of Ironkey's self destruct.  I was going to say, this isn't anything new.  I had a Sandisk brick itself when it could not be ejected.  We switched to Ironkey.  We havn't had any problems with these and the encryption is hardware based so it is pretty fast.  There is an option to have the drive be capable of being reformatted if you can't enter the password within 10 attempts.<br>
<br>
I have not had a lot of love for fingerprint scanners readers.  I think I will stay with Ironkey.</htmltext>
<tokenext>The self destruct mechanism link in TFA is a link to a review of Ironkey 's self destruct .
I was going to say , this is n't anything new .
I had a Sandisk brick itself when it could not be ejected .
We switched to Ironkey .
We hav n't had any problems with these and the encryption is hardware based so it is pretty fast .
There is an option to have the drive be capable of being reformatted if you ca n't enter the password within 10 attempts .
I have not had a lot of love for fingerprint scanners readers .
I think I will stay with Ironkey .</tokentext>
<sentencetext>The self destruct mechanism link in TFA is a link to a review of Ironkey's self destruct.
I was going to say, this isn't anything new.
I had a Sandisk brick itself when it could not be ejected.
We switched to Ironkey.
We havn't had any problems with these and the encryption is hardware based so it is pretty fast.
There is an option to have the drive be capable of being reformatted if you can't enter the password within 10 attempts.
I have not had a lot of love for fingerprint scanners readers.
I think I will stay with Ironkey.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668718</id>
	<title>Won't help you</title>
	<author>Lorens</author>
	<datestamp>1269954300000</datestamp>
	<modclass>Funny</modclass>
	<modscore>4</modscore>
	<htmltext><p>Against the trojan on the computer you hook it up to.</p><p>The knife might be useful for cutting off your finger though.</p></htmltext>
<tokenext>Against the trojan on the computer you hook it up to.The knife might be useful for cutting off your finger though .</tokentext>
<sentencetext>Against the trojan on the computer you hook it up to.The knife might be useful for cutting off your finger though.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668686</id>
	<title>Thermal sensor?</title>
	<author>Anonymous</author>
	<datestamp>1269954060000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>5</modscore>
	<htmltext><blockquote><div><p>The Secure features a fingerprint scanner and a thermal sensor 'so that the finger alone, detached from the body, will still not give access to the memory stick's contents.'</p></div></blockquote><p>

Surely if somebody can chop off your finger he can also warm it up?</p></div>
	</htmltext>
<tokenext>The Secure features a fingerprint scanner and a thermal sensor 'so that the finger alone , detached from the body , will still not give access to the memory stick 's contents .
' Surely if somebody can chop off your finger he can also warm it up ?</tokentext>
<sentencetext>The Secure features a fingerprint scanner and a thermal sensor 'so that the finger alone, detached from the body, will still not give access to the memory stick's contents.
'

Surely if somebody can chop off your finger he can also warm it up?
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669448</id>
	<title>Re:What if they just breathe at the sensor?</title>
	<author>Ihlosi</author>
	<datestamp>1269959100000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p><i>Exposing blood to air gives your pretty decent oxygen saturation.</i> </p><p>Only if you create a \_huge\_ surface area. Exposing a drop of blood to air doesn't saturate it at all. There's a reason why the inside of your lungs have a surface area about the size of a tennis court.</p><p><i>Perhaps more practical, I wonder how difficult it would be to produce a variant of the classic "gelatin finger with correct fingerprint" that reads as having oxygen sat and a pulse? </i> </p><p>Much, much easier than trying the same with a detached finger. That's why there's no reason for chopping off any appendages. Unless you're a really, really dumb criminal.</p></htmltext>
<tokenext>Exposing blood to air gives your pretty decent oxygen saturation .
Only if you create a \ _huge \ _ surface area .
Exposing a drop of blood to air does n't saturate it at all .
There 's a reason why the inside of your lungs have a surface area about the size of a tennis court.Perhaps more practical , I wonder how difficult it would be to produce a variant of the classic " gelatin finger with correct fingerprint " that reads as having oxygen sat and a pulse ?
Much , much easier than trying the same with a detached finger .
That 's why there 's no reason for chopping off any appendages .
Unless you 're a really , really dumb criminal .</tokentext>
<sentencetext>Exposing blood to air gives your pretty decent oxygen saturation.
Only if you create a \_huge\_ surface area.
Exposing a drop of blood to air doesn't saturate it at all.
There's a reason why the inside of your lungs have a surface area about the size of a tennis court.Perhaps more practical, I wonder how difficult it would be to produce a variant of the classic "gelatin finger with correct fingerprint" that reads as having oxygen sat and a pulse?
Much, much easier than trying the same with a detached finger.
That's why there's no reason for chopping off any appendages.
Unless you're a really, really dumb criminal.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668988</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668918</id>
	<title>Re:Thermal sensor?</title>
	<author>Anonymous</author>
	<datestamp>1269955920000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>What I want to know is how many people are seriously in danger of someone cutting off their finger just to get access to their family photos, perhaps bank details, personal documents, and maybe even corporate documents?  Just because that kind of thing can help regularly in the movies doesn't mean the average individual is in any danger of such a thing.</p></htmltext>
<tokenext>What I want to know is how many people are seriously in danger of someone cutting off their finger just to get access to their family photos , perhaps bank details , personal documents , and maybe even corporate documents ?
Just because that kind of thing can help regularly in the movies does n't mean the average individual is in any danger of such a thing .</tokentext>
<sentencetext>What I want to know is how many people are seriously in danger of someone cutting off their finger just to get access to their family photos, perhaps bank details, personal documents, and maybe even corporate documents?
Just because that kind of thing can help regularly in the movies doesn't mean the average individual is in any danger of such a thing.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668686</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31676256</id>
	<title>Pitty there is a knife with it...</title>
	<author>Anonymous</author>
	<datestamp>1269982680000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>...because if you to try to bring it in cabin, or forget to leave it inside your luggage, the customs will nicely autodestruct it for you</p></htmltext>
<tokenext>...because if you to try to bring it in cabin , or forget to leave it inside your luggage , the customs will nicely autodestruct it for you</tokentext>
<sentencetext>...because if you to try to bring it in cabin, or forget to leave it inside your luggage, the customs will nicely autodestruct it for you</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668952</id>
	<title>Re:Two hours?</title>
	<author>syousef</author>
	<datestamp>1269956220000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>Presumably, if you had physical access to the drive, wouldn't you have more time to crack it than two hours?</p></div><p>Would you believe this much? Okay chief, this is top secret. Let's use the cone of silence.</p></div>
	</htmltext>
<tokenext>Presumably , if you had physical access to the drive , would n't you have more time to crack it than two hours ? Would you believe this much ?
Okay chief , this is top secret .
Let 's use the cone of silence .</tokentext>
<sentencetext>Presumably, if you had physical access to the drive, wouldn't you have more time to crack it than two hours?Would you believe this much?
Okay chief, this is top secret.
Let's use the cone of silence.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668668</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668752</id>
	<title>Im going to lunch</title>
	<author>Anonymous</author>
	<datestamp>1269954540000</datestamp>
	<modclass>Troll</modclass>
	<modscore>-1</modscore>
	<htmltext><p>Does anyone want anything?</p></htmltext>
<tokenext>Does anyone want anything ?</tokentext>
<sentencetext>Does anyone want anything?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668668</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669228</id>
	<title>Where oh where....</title>
	<author>vikingpower</author>
	<datestamp>1269957840000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>...can I get one ? I mean: my tax eviction records should be backed up somewhere, some day...</htmltext>
<tokenext>...can I get one ?
I mean : my tax eviction records should be backed up somewhere , some day.. .</tokentext>
<sentencetext>...can I get one ?
I mean: my tax eviction records should be backed up somewhere, some day...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669656</id>
	<title>Re:What if they cut the finger and heat it</title>
	<author>Anonymous</author>
	<datestamp>1269960180000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Yes, that's why I'd be afraid to use something like that with retina or iris identification. I don't want someone taking my eye-ball just to steal some data. o\_O</p></htmltext>
<tokenext>Yes , that 's why I 'd be afraid to use something like that with retina or iris identification .
I do n't want someone taking my eye-ball just to steal some data .
o \ _O</tokentext>
<sentencetext>Yes, that's why I'd be afraid to use something like that with retina or iris identification.
I don't want someone taking my eye-ball just to steal some data.
o\_O</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668946</id>
	<title>Re:Thermal sensor?</title>
	<author>Errol backfiring</author>
	<datestamp>1269956100000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I experienced something opposite many years ago: Just holding your hand over a recently used finger print scanner was enough to log you in as the previous user. The previous login had left enough sweat for the device to recognise as a real finger. Holding your hand above it was just to trigger the temperature sensor to activate the reading. The finger print scanners have hopefully improved much since then...</htmltext>
<tokenext>I experienced something opposite many years ago : Just holding your hand over a recently used finger print scanner was enough to log you in as the previous user .
The previous login had left enough sweat for the device to recognise as a real finger .
Holding your hand above it was just to trigger the temperature sensor to activate the reading .
The finger print scanners have hopefully improved much since then.. .</tokentext>
<sentencetext>I experienced something opposite many years ago: Just holding your hand over a recently used finger print scanner was enough to log you in as the previous user.
The previous login had left enough sweat for the device to recognise as a real finger.
Holding your hand above it was just to trigger the temperature sensor to activate the reading.
The finger print scanners have hopefully improved much since then...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668686</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669362</id>
	<title>Variety of other features?</title>
	<author>Anonymous</author>
	<datestamp>1269958620000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Is it just me thinking this or are the "other features" such as a knife blade, etc. going to cause me more security problems than this thing is worth?</p></htmltext>
<tokenext>Is it just me thinking this or are the " other features " such as a knife blade , etc .
going to cause me more security problems than this thing is worth ?</tokentext>
<sentencetext>Is it just me thinking this or are the "other features" such as a knife blade, etc.
going to cause me more security problems than this thing is worth?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31677296</id>
	<title>Or you'd just pay Chipworks to do it for you</title>
	<author>tlambert</author>
	<datestamp>1269942540000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Or you'd just pay Chipworks to do it for you</p><p>If they can put back together an EEPROM from a data recorder from the Swissair 111 crash where the chip was partially destroyed, they should have no problem whatsoever taking apart a USB key fob to get the data out.  Plus their prices for something like this are generally less than the prize that was offered.</p><p><a href="http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=00922915" title="ieee.org">http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=00922915</a> [ieee.org]<nobr> <wbr></nobr>...or if not the Canadians, give it to the Australians:</p><p><a href="http://portal.acm.org/citation.cfm?id=1363217.1363243" title="acm.org">http://portal.acm.org/citation.cfm?id=1363217.1363243</a> [acm.org]</p><p>Or trojan the machine they plug it into and wait for it to be unlocked.</p><p>-- Terry</p></htmltext>
<tokenext>Or you 'd just pay Chipworks to do it for youIf they can put back together an EEPROM from a data recorder from the Swissair 111 crash where the chip was partially destroyed , they should have no problem whatsoever taking apart a USB key fob to get the data out .
Plus their prices for something like this are generally less than the prize that was offered.http : //ieeexplore.ieee.org/stamp/stamp.jsp ? arnumber = 00922915 [ ieee.org ] ...or if not the Canadians , give it to the Australians : http : //portal.acm.org/citation.cfm ? id = 1363217.1363243 [ acm.org ] Or trojan the machine they plug it into and wait for it to be unlocked.-- Terry</tokentext>
<sentencetext>Or you'd just pay Chipworks to do it for youIf they can put back together an EEPROM from a data recorder from the Swissair 111 crash where the chip was partially destroyed, they should have no problem whatsoever taking apart a USB key fob to get the data out.
Plus their prices for something like this are generally less than the prize that was offered.http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=00922915 [ieee.org] ...or if not the Canadians, give it to the Australians:http://portal.acm.org/citation.cfm?id=1363217.1363243 [acm.org]Or trojan the machine they plug it into and wait for it to be unlocked.-- Terry</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668668</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31670102</id>
	<title>Re:What if they just breathe at the sensor?</title>
	<author>WhatAmIDoingHere</author>
	<datestamp>1269962220000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext>Just do it like they did on mythbusters.  Pull a print, make a thin copy, put it on your own thumb, swipe.  Your body heat would work just as well.<br> <br>Hell, on CSI they managed to get prints from a bloated water logged corpse by cutting the fingers off, removing the bones, and using the finger meat as a glove.<br> <br>If you want to get in you'll get in.</htmltext>
<tokenext>Just do it like they did on mythbusters .
Pull a print , make a thin copy , put it on your own thumb , swipe .
Your body heat would work just as well .
Hell , on CSI they managed to get prints from a bloated water logged corpse by cutting the fingers off , removing the bones , and using the finger meat as a glove .
If you want to get in you 'll get in .</tokentext>
<sentencetext>Just do it like they did on mythbusters.
Pull a print, make a thin copy, put it on your own thumb, swipe.
Your body heat would work just as well.
Hell, on CSI they managed to get prints from a bloated water logged corpse by cutting the fingers off, removing the bones, and using the finger meat as a glove.
If you want to get in you'll get in.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668988</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668694</id>
	<title>Shame it has a knife on it</title>
	<author>solevita</author>
	<datestamp>1269954120000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext>From TFA:<blockquote><div><p>Anyone stateside wanting one of these bad boys will have to wait patiently or hop on a transatlantic flight.</p></div></blockquote><p> Just remember to take it out of your pocket before getting back on that plane.<br> <br>I'd be interested in one without the knife as something to play with, but I'm not sure I want to carry all the rest of it around with me (I'm not some knife freak, but I want a USB stick to be just a USB stick).</p></div>
	</htmltext>
<tokenext>From TFA : Anyone stateside wanting one of these bad boys will have to wait patiently or hop on a transatlantic flight .
Just remember to take it out of your pocket before getting back on that plane .
I 'd be interested in one without the knife as something to play with , but I 'm not sure I want to carry all the rest of it around with me ( I 'm not some knife freak , but I want a USB stick to be just a USB stick ) .</tokentext>
<sentencetext>From TFA:Anyone stateside wanting one of these bad boys will have to wait patiently or hop on a transatlantic flight.
Just remember to take it out of your pocket before getting back on that plane.
I'd be interested in one without the knife as something to play with, but I'm not sure I want to carry all the rest of it around with me (I'm not some knife freak, but I want a USB stick to be just a USB stick).
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669716</id>
	<title>Re:Professional hackers? 2 hours?</title>
	<author>elrous0</author>
	<datestamp>1269960540000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>You mean Samsonite luggage ISN'T indestructible?!?!?</htmltext>
<tokenext>You mean Samsonite luggage IS N'T indestructible ? ! ? !
?</tokentext>
<sentencetext>You mean Samsonite luggage ISN'T indestructible?!?!
?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668684</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669150</id>
	<title>Re:Shame it has a knife on it</title>
	<author>kgo</author>
	<datestamp>1269957420000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>They offered their original non-encrypted drive in a 'without-a-knife' option.</p><p>But if you really want a USB stick that's just a USB stick with some encryption, I'd go with a IronKey.  <a href="http://www.ironkey.com./" title="www.ironkey.com" rel="nofollow">http://www.ironkey.com./</a> [www.ironkey.com]</p></htmltext>
<tokenext>They offered their original non-encrypted drive in a 'without-a-knife ' option.But if you really want a USB stick that 's just a USB stick with some encryption , I 'd go with a IronKey .
http : //www.ironkey.com./ [ www.ironkey.com ]</tokentext>
<sentencetext>They offered their original non-encrypted drive in a 'without-a-knife' option.But if you really want a USB stick that's just a USB stick with some encryption, I'd go with a IronKey.
http://www.ironkey.com./ [www.ironkey.com]</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668694</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668684</id>
	<title>Professional hackers? 2 hours?</title>
	<author>alexandre</author>
	<datestamp>1269954060000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>3</modscore>
	<htmltext><p>I thought that we had stopped 10 years ago to consider such scam contest as serious security proof?</p></htmltext>
<tokenext>I thought that we had stopped 10 years ago to consider such scam contest as serious security proof ?</tokentext>
<sentencetext>I thought that we had stopped 10 years ago to consider such scam contest as serious security proof?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31671558</id>
	<title>Potential workaround</title>
	<author>Anonymous</author>
	<datestamp>1269966660000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>The Achilles' heel here is that it likely uses magnetic memory.  Find something capable of identifying magnetic charges with an adequate resolution (passive MRI?) or perhaps an electron micrograph of the internals of the storage medium, and an analysis of the magnetic domain arrangement could potentially yield the useful information you're looking for. Granted, it'd probably roast the thing beyond redemption, but a picture is worth a thousand words, and it wouldn't take 2 hours to get that picture, assuming a mobile setup. The process for doing this, mind you, would NOT be trivial, expensive, cumbersome, and might require a mobile computer with a fair amount of processing power to analyze the image, but a dedicated government entity, or even a well funded criminal organization ( drug cartels, anyone?) could manage to implement this. Just reinforces the old adage, if two people know about it, it's not a secret.</p><p>A far easier circumvention method, though, and an obvious one, would be to compromise the system on which it is being read. The USB stick might be secure, but highly doubtful the reading unit (PC, Mac, etc, pick your poison) will be equally so, or even more fundamental, the "monkey in the middle" handling the blasted thing. People are largely more easily compromised than any system ever could be, just appeal to any of the "MICE" conditions (Money, Ideology, Conscience, Ego), and you're all set.</p></htmltext>
<tokenext>The Achilles ' heel here is that it likely uses magnetic memory .
Find something capable of identifying magnetic charges with an adequate resolution ( passive MRI ?
) or perhaps an electron micrograph of the internals of the storage medium , and an analysis of the magnetic domain arrangement could potentially yield the useful information you 're looking for .
Granted , it 'd probably roast the thing beyond redemption , but a picture is worth a thousand words , and it would n't take 2 hours to get that picture , assuming a mobile setup .
The process for doing this , mind you , would NOT be trivial , expensive , cumbersome , and might require a mobile computer with a fair amount of processing power to analyze the image , but a dedicated government entity , or even a well funded criminal organization ( drug cartels , anyone ?
) could manage to implement this .
Just reinforces the old adage , if two people know about it , it 's not a secret.A far easier circumvention method , though , and an obvious one , would be to compromise the system on which it is being read .
The USB stick might be secure , but highly doubtful the reading unit ( PC , Mac , etc , pick your poison ) will be equally so , or even more fundamental , the " monkey in the middle " handling the blasted thing .
People are largely more easily compromised than any system ever could be , just appeal to any of the " MICE " conditions ( Money , Ideology , Conscience , Ego ) , and you 're all set .</tokentext>
<sentencetext>The Achilles' heel here is that it likely uses magnetic memory.
Find something capable of identifying magnetic charges with an adequate resolution (passive MRI?
) or perhaps an electron micrograph of the internals of the storage medium, and an analysis of the magnetic domain arrangement could potentially yield the useful information you're looking for.
Granted, it'd probably roast the thing beyond redemption, but a picture is worth a thousand words, and it wouldn't take 2 hours to get that picture, assuming a mobile setup.
The process for doing this, mind you, would NOT be trivial, expensive, cumbersome, and might require a mobile computer with a fair amount of processing power to analyze the image, but a dedicated government entity, or even a well funded criminal organization ( drug cartels, anyone?
) could manage to implement this.
Just reinforces the old adage, if two people know about it, it's not a secret.A far easier circumvention method, though, and an obvious one, would be to compromise the system on which it is being read.
The USB stick might be secure, but highly doubtful the reading unit (PC, Mac, etc, pick your poison) will be equally so, or even more fundamental, the "monkey in the middle" handling the blasted thing.
People are largely more easily compromised than any system ever could be, just appeal to any of the "MICE" conditions (Money, Ideology, Conscience, Ego), and you're all set.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668750</id>
	<title>Don't Need One...</title>
	<author>happy\_place</author>
	<datestamp>1269954540000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>1</modscore>
	<htmltext>I'm doing fine destroying USB sticks on my own... why would I ever want to do so deliberately... can't count how many have gone through the wash. I've run a couple over with my car... My kids who think they can be jammed into the airconditioning slots in the car... sigh...</htmltext>
<tokenext>I 'm doing fine destroying USB sticks on my own... why would I ever want to do so deliberately... ca n't count how many have gone through the wash. I 've run a couple over with my car... My kids who think they can be jammed into the airconditioning slots in the car... sigh.. .</tokentext>
<sentencetext>I'm doing fine destroying USB sticks on my own... why would I ever want to do so deliberately... can't count how many have gone through the wash. I've run a couple over with my car... My kids who think they can be jammed into the airconditioning slots in the car... sigh...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31670376</id>
	<title>You're trying too hard</title>
	<author>Zinho</author>
	<datestamp>1269963120000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>You're thinking about the problem all wrong - you don't need to recreate the environment that the sensor expects, you need to deliver the response that it wants.  Most blood oxygen and pulse sensors are merely combinations of LEDs and photosensors which look for the amount of light reflected back and track its variation.</p><p>All you need to fool one of these is a gummy frog with an embedded LED that will provide the necessary feedback.  Add a rubber cement cast of the subject's fingerprint and you're golden.  The implementation is left as an exercise for the reader<nobr> <wbr></nobr>;^)</p></htmltext>
<tokenext>You 're thinking about the problem all wrong - you do n't need to recreate the environment that the sensor expects , you need to deliver the response that it wants .
Most blood oxygen and pulse sensors are merely combinations of LEDs and photosensors which look for the amount of light reflected back and track its variation.All you need to fool one of these is a gummy frog with an embedded LED that will provide the necessary feedback .
Add a rubber cement cast of the subject 's fingerprint and you 're golden .
The implementation is left as an exercise for the reader ; ^ )</tokentext>
<sentencetext>You're thinking about the problem all wrong - you don't need to recreate the environment that the sensor expects, you need to deliver the response that it wants.
Most blood oxygen and pulse sensors are merely combinations of LEDs and photosensors which look for the amount of light reflected back and track its variation.All you need to fool one of these is a gummy frog with an embedded LED that will provide the necessary feedback.
Add a rubber cement cast of the subject's fingerprint and you're golden.
The implementation is left as an exercise for the reader ;^)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668988</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31670308</id>
	<title>My guess is that they will have .....</title>
	<author>WindBourne</author>
	<datestamp>1269962940000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>China build these for them. And they will be loaded with virus and will destruct at very strange times.</htmltext>
<tokenext>China build these for them .
And they will be loaded with virus and will destruct at very strange times .</tokentext>
<sentencetext>China build these for them.
And they will be loaded with virus and will destruct at very strange times.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669094</id>
	<title>Article is exaggerating things just a tad...</title>
	<author>AllynM</author>
	<datestamp>1269957060000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>4</modscore>
	<htmltext><p>I saw a self-destructed sample of this unit at CES in January.  It did not self destruct from an opening attempt, as opening those is quite easy.  The drive is enclosed by a simple clear plastic shell (not epoxy filled).  The 'destruction' was caused by presumably supplying voltage in excess of the USB spec.  You could literally pry the plastic off of the USB drive with the included knife, and it would work just fine (sans enclosure).</p><p>Also, it would be nice if PCWorld at would at least get the name of these things correct:<br><a href="http://www.swissarmy.com/multitools/Pages/Category.aspx?category=presentation+pro&amp;" title="swissarmy.com">http://www.swissarmy.com/multitools/Pages/Category.aspx?category=presentation+pro&amp;</a> [swissarmy.com]</p><p>Perhaps the USB-only part is dubbed 'Secure', but you won't ask for that name when you want to buy one.</p><p>Allyn Malventano<br>Storage Editor, PC Perspective</p></htmltext>
<tokenext>I saw a self-destructed sample of this unit at CES in January .
It did not self destruct from an opening attempt , as opening those is quite easy .
The drive is enclosed by a simple clear plastic shell ( not epoxy filled ) .
The 'destruction ' was caused by presumably supplying voltage in excess of the USB spec .
You could literally pry the plastic off of the USB drive with the included knife , and it would work just fine ( sans enclosure ) .Also , it would be nice if PCWorld at would at least get the name of these things correct : http : //www.swissarmy.com/multitools/Pages/Category.aspx ? category = presentation + pro&amp; [ swissarmy.com ] Perhaps the USB-only part is dubbed 'Secure ' , but you wo n't ask for that name when you want to buy one.Allyn MalventanoStorage Editor , PC Perspective</tokentext>
<sentencetext>I saw a self-destructed sample of this unit at CES in January.
It did not self destruct from an opening attempt, as opening those is quite easy.
The drive is enclosed by a simple clear plastic shell (not epoxy filled).
The 'destruction' was caused by presumably supplying voltage in excess of the USB spec.
You could literally pry the plastic off of the USB drive with the included knife, and it would work just fine (sans enclosure).Also, it would be nice if PCWorld at would at least get the name of these things correct:http://www.swissarmy.com/multitools/Pages/Category.aspx?category=presentation+pro&amp; [swissarmy.com]Perhaps the USB-only part is dubbed 'Secure', but you won't ask for that name when you want to buy one.Allyn MalventanoStorage Editor, PC Perspective</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31683588</id>
	<title>EASY PICKINGS....</title>
	<author>dogzdik</author>
	<datestamp>1269977160000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>Buy 10.<p>.</p><p> Make it self destruct.</p><p>.</p><p> Analise the residues.</p><p>.</p><p>Implement Counter Measures.</p><p>.</p><p>Extract Chips.</p><p>.</p><p>Begin crytonalysis of Chips</p><p>.</p><p>Figureit all out - evetually.</p></htmltext>
<tokenext>Buy 10.. Make it self destruct.. Analise the residues..Implement Counter Measures..Extract Chips..Begin crytonalysis of Chips.Figureit all out - evetually .</tokentext>
<sentencetext>Buy 10.. Make it self destruct.. Analise the residues..Implement Counter Measures..Extract Chips..Begin crytonalysis of Chips.Figureit all out - evetually.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668746</id>
	<title>Excuses, Excuses</title>
	<author>kiehlster</author>
	<datestamp>1269954540000</datestamp>
	<modclass>Funny</modclass>
	<modscore>4</modscore>
	<htmltext>Teacher, I swear I wrote up the entire 40 page paper, but I burned my thumb really bad the other day and when I went to retrieve my paper, it exploded.</htmltext>
<tokenext>Teacher , I swear I wrote up the entire 40 page paper , but I burned my thumb really bad the other day and when I went to retrieve my paper , it exploded .</tokentext>
<sentencetext>Teacher, I swear I wrote up the entire 40 page paper, but I burned my thumb really bad the other day and when I went to retrieve my paper, it exploded.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31670808</id>
	<title>Re:What if they cut the finger and heat it</title>
	<author>Wierdy1024</author>
	<datestamp>1269964440000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I'm pretty sure the surface temperature of the skin on my fingers sometimes falls below 15 Celsius if I've just come in from the snow outside or something.  Also, I know that in hot countries ambient temperature of a usb stick could easily reach 30 Celsius.</p><p>Knowing these two facts, it seems there is no threshold they could use to accurately detect if a finger is "attached" or not...</p></htmltext>
<tokenext>I 'm pretty sure the surface temperature of the skin on my fingers sometimes falls below 15 Celsius if I 've just come in from the snow outside or something .
Also , I know that in hot countries ambient temperature of a usb stick could easily reach 30 Celsius.Knowing these two facts , it seems there is no threshold they could use to accurately detect if a finger is " attached " or not.. .</tokentext>
<sentencetext>I'm pretty sure the surface temperature of the skin on my fingers sometimes falls below 15 Celsius if I've just come in from the snow outside or something.
Also, I know that in hot countries ambient temperature of a usb stick could easily reach 30 Celsius.Knowing these two facts, it seems there is no threshold they could use to accurately detect if a finger is "attached" or not...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669986</id>
	<title>Re:What if they cut the finger and heat it</title>
	<author>misterhaan</author>
	<datestamp>1269961800000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>this could lead to a lot of fingers in the microwave.  maybe the professional hackers should specifically label one of the microwaves in the break room severed fingers in THIS microwave only.</p></htmltext>
<tokenext>this could lead to a lot of fingers in the microwave .
maybe the professional hackers should specifically label one of the microwaves in the break room severed fingers in THIS microwave only .</tokentext>
<sentencetext>this could lead to a lot of fingers in the microwave.
maybe the professional hackers should specifically label one of the microwaves in the break room severed fingers in THIS microwave only.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668772</id>
	<title>Re:What if they cut the finger and heat it</title>
	<author>Anonymous</author>
	<datestamp>1269954780000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>5</modscore>
	<htmltext><p>Or alternatively, find someone the owner of the USB stick cares about and threaten to cut off that persons finger if the owner doesn't cooperate.</p></htmltext>
<tokenext>Or alternatively , find someone the owner of the USB stick cares about and threaten to cut off that persons finger if the owner does n't cooperate .</tokentext>
<sentencetext>Or alternatively, find someone the owner of the USB stick cares about and threaten to cut off that persons finger if the owner doesn't cooperate.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669626</id>
	<title>Re:Two hours?</title>
	<author>Rich0</author>
	<datestamp>1269960000000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>4</modscore>
	<htmltext><p>Yup.</p><p>Plus, if somebody did need to crack one of these within two hours of getting their hands on it with minimal equipment this isn't how they'd go about it.</p><p>Step one for an attacker would be to go to a store and just buy a dozen of these USB drives.  Then they attack the drives from home with a full machine shop, a clean room, electron microscopes, logic analyzers, FPGAs, and the works.</p><p>Then they figure out how to defeat the devices defenses, and then package that up into a minimal set of tools and steps needed to accomplish the feat in a few minutes.</p><p>Then when they steal the device they already know exactly what they're doing and it takes them no time at all.</p><p>It would be like a bank robber deciding on a whim to break into a bank, without checking plans, casing the place, identifying the vault make/model, etc.  Like anything, a quickly executed mission depends on good planning.</p></htmltext>
<tokenext>Yup.Plus , if somebody did need to crack one of these within two hours of getting their hands on it with minimal equipment this is n't how they 'd go about it.Step one for an attacker would be to go to a store and just buy a dozen of these USB drives .
Then they attack the drives from home with a full machine shop , a clean room , electron microscopes , logic analyzers , FPGAs , and the works.Then they figure out how to defeat the devices defenses , and then package that up into a minimal set of tools and steps needed to accomplish the feat in a few minutes.Then when they steal the device they already know exactly what they 're doing and it takes them no time at all.It would be like a bank robber deciding on a whim to break into a bank , without checking plans , casing the place , identifying the vault make/model , etc .
Like anything , a quickly executed mission depends on good planning .</tokentext>
<sentencetext>Yup.Plus, if somebody did need to crack one of these within two hours of getting their hands on it with minimal equipment this isn't how they'd go about it.Step one for an attacker would be to go to a store and just buy a dozen of these USB drives.
Then they attack the drives from home with a full machine shop, a clean room, electron microscopes, logic analyzers, FPGAs, and the works.Then they figure out how to defeat the devices defenses, and then package that up into a minimal set of tools and steps needed to accomplish the feat in a few minutes.Then when they steal the device they already know exactly what they're doing and it takes them no time at all.It would be like a bank robber deciding on a whim to break into a bank, without checking plans, casing the place, identifying the vault make/model, etc.
Like anything, a quickly executed mission depends on good planning.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668966</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669238</id>
	<title>Re:Two hours?</title>
	<author>sorak</author>
	<datestamp>1269957960000</datestamp>
	<modclass>Funny</modclass>
	<modscore>2</modscore>
	<htmltext><p><div class="quote"><p>Presumably, if you had physical access to the drive, wouldn't you have more time to crack it than two hours?</p></div><p>Exactly. You have 24 before Keifer Southerland kicks your ass.</p></div>
	</htmltext>
<tokenext>Presumably , if you had physical access to the drive , would n't you have more time to crack it than two hours ? Exactly .
You have 24 before Keifer Southerland kicks your ass .</tokentext>
<sentencetext>Presumably, if you had physical access to the drive, wouldn't you have more time to crack it than two hours?Exactly.
You have 24 before Keifer Southerland kicks your ass.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668668</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668988</id>
	<title>Re:What if they just breathe at the sensor?</title>
	<author>fuzzyfuzzyfungus</author>
	<datestamp>1269956460000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>4</modscore>
	<htmltext>Just for curiosity's sake, I'm trying to think of how difficult that would actually be....<br> <br>

Exposing blood to air gives your pretty decent oxygen saturation. Doing that for any great length of time is likely to cause clotting or other nastiness, so it isn't exactly an alternative to the "lung" side of "heart lung machine"; but this isn't medicine we are talking about, just fooling a sensor. In the same vein, the sensor isn't going to care about blood type, immune matching, or anything like that. Also, a finger doesn't have that much volume to in. A few CCs of fresh blood(from say, yourself, or the same guy you took the finger from), exposed to air for a few seconds, would be fine.<br> <br>

Pulse could presumably be simulated with a low power pump(perhaps a small peristaltic unit), with its power supply being turned on and off at roughly the right frequency. I can't imagine that huge exactness is required, since the pulse rates of humans vary fairly widely with conditions, and people would be pissed if their fingerprint scanner doesn't work if they've just run up a flight of stairs, or are freaking out about the big presentation in 20 minutes.<br> <br>

The real difficulty, or lack thereof, would really come down to the artery/vein structure of the finger. If you can get away with just connecting to a couple of big blood vessels and ignoring some minor leakage(since this is all temporary and nonmedical), an amateur willing to just shove a few little tubes in there should do fine. If the sensor can detect(and is tuned to care about) the details of the vascalature, you'd pretty much need a cooperative microsurgeon, a fancy microscope, and real surgical kit. That would probably be problematic for most applications.<br> <br>

Obviously, the above would be a huge pain in the ass, even under good conditions, and is highly unlikely to be worth it(probably easier just to show the owner of the finger your pair of bolt cutters, and let him operate the scanner for you, unless you are in an environment where the cameras would pick up on that, in which case the above described apparatus could, quite plausibly, be fit down the sleeve of a not-too-suspicious garment).<br> <br>

Perhaps more practical, I wonder how difficult it would be to produce a variant of the classic "gelatin finger with correct fingerprint" that reads as having oxygen sat and a pulse? Would one made of <a href="http://en.wikipedia.org/wiki/Blood\_agar#Blood\_agar\_types" title="wikipedia.org">blood agar</a> [wikipedia.org] return plausible results under optical oxygen saturation tests? If so, that's raise the bar from "supermarket" to "laboratory supply house"; but that wouldn't be too bad. For pulse, the question is "how complex does your simulated vasculature have to be?" Any decently competent modeler can probably mould a simple circulatory loop into a gel finger; but achieving an actual capillary structure is sci-fi self-assembling nanomaterials stuff...</htmltext>
<tokenext>Just for curiosity 's sake , I 'm trying to think of how difficult that would actually be... . Exposing blood to air gives your pretty decent oxygen saturation .
Doing that for any great length of time is likely to cause clotting or other nastiness , so it is n't exactly an alternative to the " lung " side of " heart lung machine " ; but this is n't medicine we are talking about , just fooling a sensor .
In the same vein , the sensor is n't going to care about blood type , immune matching , or anything like that .
Also , a finger does n't have that much volume to in .
A few CCs of fresh blood ( from say , yourself , or the same guy you took the finger from ) , exposed to air for a few seconds , would be fine .
Pulse could presumably be simulated with a low power pump ( perhaps a small peristaltic unit ) , with its power supply being turned on and off at roughly the right frequency .
I ca n't imagine that huge exactness is required , since the pulse rates of humans vary fairly widely with conditions , and people would be pissed if their fingerprint scanner does n't work if they 've just run up a flight of stairs , or are freaking out about the big presentation in 20 minutes .
The real difficulty , or lack thereof , would really come down to the artery/vein structure of the finger .
If you can get away with just connecting to a couple of big blood vessels and ignoring some minor leakage ( since this is all temporary and nonmedical ) , an amateur willing to just shove a few little tubes in there should do fine .
If the sensor can detect ( and is tuned to care about ) the details of the vascalature , you 'd pretty much need a cooperative microsurgeon , a fancy microscope , and real surgical kit .
That would probably be problematic for most applications .
Obviously , the above would be a huge pain in the ass , even under good conditions , and is highly unlikely to be worth it ( probably easier just to show the owner of the finger your pair of bolt cutters , and let him operate the scanner for you , unless you are in an environment where the cameras would pick up on that , in which case the above described apparatus could , quite plausibly , be fit down the sleeve of a not-too-suspicious garment ) .
Perhaps more practical , I wonder how difficult it would be to produce a variant of the classic " gelatin finger with correct fingerprint " that reads as having oxygen sat and a pulse ?
Would one made of blood agar [ wikipedia.org ] return plausible results under optical oxygen saturation tests ?
If so , that 's raise the bar from " supermarket " to " laboratory supply house " ; but that would n't be too bad .
For pulse , the question is " how complex does your simulated vasculature have to be ?
" Any decently competent modeler can probably mould a simple circulatory loop into a gel finger ; but achieving an actual capillary structure is sci-fi self-assembling nanomaterials stuff.. .</tokentext>
<sentencetext>Just for curiosity's sake, I'm trying to think of how difficult that would actually be.... 

Exposing blood to air gives your pretty decent oxygen saturation.
Doing that for any great length of time is likely to cause clotting or other nastiness, so it isn't exactly an alternative to the "lung" side of "heart lung machine"; but this isn't medicine we are talking about, just fooling a sensor.
In the same vein, the sensor isn't going to care about blood type, immune matching, or anything like that.
Also, a finger doesn't have that much volume to in.
A few CCs of fresh blood(from say, yourself, or the same guy you took the finger from), exposed to air for a few seconds, would be fine.
Pulse could presumably be simulated with a low power pump(perhaps a small peristaltic unit), with its power supply being turned on and off at roughly the right frequency.
I can't imagine that huge exactness is required, since the pulse rates of humans vary fairly widely with conditions, and people would be pissed if their fingerprint scanner doesn't work if they've just run up a flight of stairs, or are freaking out about the big presentation in 20 minutes.
The real difficulty, or lack thereof, would really come down to the artery/vein structure of the finger.
If you can get away with just connecting to a couple of big blood vessels and ignoring some minor leakage(since this is all temporary and nonmedical), an amateur willing to just shove a few little tubes in there should do fine.
If the sensor can detect(and is tuned to care about) the details of the vascalature, you'd pretty much need a cooperative microsurgeon, a fancy microscope, and real surgical kit.
That would probably be problematic for most applications.
Obviously, the above would be a huge pain in the ass, even under good conditions, and is highly unlikely to be worth it(probably easier just to show the owner of the finger your pair of bolt cutters, and let him operate the scanner for you, unless you are in an environment where the cameras would pick up on that, in which case the above described apparatus could, quite plausibly, be fit down the sleeve of a not-too-suspicious garment).
Perhaps more practical, I wonder how difficult it would be to produce a variant of the classic "gelatin finger with correct fingerprint" that reads as having oxygen sat and a pulse?
Would one made of blood agar [wikipedia.org] return plausible results under optical oxygen saturation tests?
If so, that's raise the bar from "supermarket" to "laboratory supply house"; but that wouldn't be too bad.
For pulse, the question is "how complex does your simulated vasculature have to be?
" Any decently competent modeler can probably mould a simple circulatory loop into a gel finger; but achieving an actual capillary structure is sci-fi self-assembling nanomaterials stuff...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668822</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31672600</id>
	<title>Two hours is not enough</title>
	<author>RichiH</author>
	<datestamp>1269969660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Give them a month or two and see what happens.</p><p>Guarding against crackers that have a limited amount of time might be a worthwhile goal, but it \_must not\_ be the standard you design by.</p></htmltext>
<tokenext>Give them a month or two and see what happens.Guarding against crackers that have a limited amount of time might be a worthwhile goal , but it \ _must not \ _ be the standard you design by .</tokentext>
<sentencetext>Give them a month or two and see what happens.Guarding against crackers that have a limited amount of time might be a worthwhile goal, but it \_must not\_ be the standard you design by.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31670226</id>
	<title>and the answer is...</title>
	<author>fortapocalypse</author>
	<datestamp>1269962640000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Magnesium. Case closed.</htmltext>
<tokenext>Magnesium .
Case closed .</tokentext>
<sentencetext>Magnesium.
Case closed.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31680786</id>
	<title>Re:What if they cut the finger and heat it</title>
	<author>hellop2</author>
	<datestamp>1269957840000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>It would be better if it could sense pulse.  I have a feeling that would be harder to simulate on a severed finger.</htmltext>
<tokenext>It would be better if it could sense pulse .
I have a feeling that would be harder to simulate on a severed finger .</tokentext>
<sentencetext>It would be better if it could sense pulse.
I have a feeling that would be harder to simulate on a severed finger.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31671406</id>
	<title>Ironkey</title>
	<author>Anonymous</author>
	<datestamp>1269966240000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>This thing already exists. Its called the Ironkey and it actually got FIPS approval which goes a little past giving a couple of people two hours to break into the flash drive.</p></htmltext>
<tokenext>This thing already exists .
Its called the Ironkey and it actually got FIPS approval which goes a little past giving a couple of people two hours to break into the flash drive .</tokentext>
<sentencetext>This thing already exists.
Its called the Ironkey and it actually got FIPS approval which goes a little past giving a couple of people two hours to break into the flash drive.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669822</id>
	<title>Re:Two hours?</title>
	<author>COMON$</author>
	<datestamp>1269961140000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>That is because it is all about proving a level of security, not calling something unbreakable.  What they prove here is that it is not reasonable for any street thug to crack this sucker,  it is up to the business professional to decide if that security is adequate enough for the data it is going to hold.   The competition does what it is supposed to do.  Release to the public and time will do the rest.</htmltext>
<tokenext>That is because it is all about proving a level of security , not calling something unbreakable .
What they prove here is that it is not reasonable for any street thug to crack this sucker , it is up to the business professional to decide if that security is adequate enough for the data it is going to hold .
The competition does what it is supposed to do .
Release to the public and time will do the rest .</tokentext>
<sentencetext>That is because it is all about proving a level of security, not calling something unbreakable.
What they prove here is that it is not reasonable for any street thug to crack this sucker,  it is up to the business professional to decide if that security is adequate enough for the data it is going to hold.
The competition does what it is supposed to do.
Release to the public and time will do the rest.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668966</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669582</id>
	<title>Victorinox</title>
	<author>Ukab the Great</author>
	<datestamp>1269959700000</datestamp>
	<modclass>Funny</modclass>
	<modscore>4</modscore>
	<htmltext><p>When are they going to make a USB Stick with a corkscrew? I might just need to recover with a bottle of wine after my thumb drive destroys itself.</p></htmltext>
<tokenext>When are they going to make a USB Stick with a corkscrew ?
I might just need to recover with a bottle of wine after my thumb drive destroys itself .</tokentext>
<sentencetext>When are they going to make a USB Stick with a corkscrew?
I might just need to recover with a bottle of wine after my thumb drive destroys itself.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668690</id>
	<title>Inspector Gadget??</title>
	<author>BinaryBobbie</author>
	<datestamp>1269954060000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>0</modscore>
	<htmltext>This message will self destruct in 30 seconds...</htmltext>
<tokenext>This message will self destruct in 30 seconds.. .</tokentext>
<sentencetext>This message will self destruct in 30 seconds...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669116</id>
	<title>Re:Thermal sensor?</title>
	<author>Anonymous</author>
	<datestamp>1269957240000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>&gt;bank details</p><p>You know, some IT people work at a bank and if someone wants to rob it, best do it digitally by "finding" the IT guy and taking his finger. Easier than having to take him hostage.</p></htmltext>
<tokenext>&gt; bank detailsYou know , some IT people work at a bank and if someone wants to rob it , best do it digitally by " finding " the IT guy and taking his finger .
Easier than having to take him hostage .</tokentext>
<sentencetext>&gt;bank detailsYou know, some IT people work at a bank and if someone wants to rob it, best do it digitally by "finding" the IT guy and taking his finger.
Easier than having to take him hostage.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668918</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668822</id>
	<title>What if they just breathe at the sensor?</title>
	<author>Ihlosi</author>
	<datestamp>1269955260000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>No detached fingers necessary. Many scanners can be fooled by "reactivating" the most recent fingerprint with the moisture in the exhaled air.</p><p>And \_really\_ professional fingerprint scanners don't check temperature, they check blood oxygen saturation and pulse. That makes cutting of any appendages pretty much a non-issue - it's easier to fool the thing with a dummy finger (or the actual finger that's still attached to the unconscious or otherwise compliant owner) than trying to simulate blood oxygen saturation and pulse with a detached finger.</p></htmltext>
<tokenext>No detached fingers necessary .
Many scanners can be fooled by " reactivating " the most recent fingerprint with the moisture in the exhaled air.And \ _really \ _ professional fingerprint scanners do n't check temperature , they check blood oxygen saturation and pulse .
That makes cutting of any appendages pretty much a non-issue - it 's easier to fool the thing with a dummy finger ( or the actual finger that 's still attached to the unconscious or otherwise compliant owner ) than trying to simulate blood oxygen saturation and pulse with a detached finger .</tokentext>
<sentencetext>No detached fingers necessary.
Many scanners can be fooled by "reactivating" the most recent fingerprint with the moisture in the exhaled air.And \_really\_ professional fingerprint scanners don't check temperature, they check blood oxygen saturation and pulse.
That makes cutting of any appendages pretty much a non-issue - it's easier to fool the thing with a dummy finger (or the actual finger that's still attached to the unconscious or otherwise compliant owner) than trying to simulate blood oxygen saturation and pulse with a detached finger.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669466</id>
	<title>Re:What if they cut the finger and heat it</title>
	<author>leifbork</author>
	<datestamp>1269959160000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>The temperature of limbs, like fingers, are usually lower than the rest of the body, depending on the environment temperature.<br>
At twenty degrees Celsius, I think the temperature of the fingertips are about 28 degrees or something.
<br> <br>
If the device requires believable finger heat, it probably would have to measure the environment temperature as well, or else it probably wouldn't be able to function properly in different conceivable environments.</htmltext>
<tokenext>The temperature of limbs , like fingers , are usually lower than the rest of the body , depending on the environment temperature .
At twenty degrees Celsius , I think the temperature of the fingertips are about 28 degrees or something .
If the device requires believable finger heat , it probably would have to measure the environment temperature as well , or else it probably would n't be able to function properly in different conceivable environments .</tokentext>
<sentencetext>The temperature of limbs, like fingers, are usually lower than the rest of the body, depending on the environment temperature.
At twenty degrees Celsius, I think the temperature of the fingertips are about 28 degrees or something.
If the device requires believable finger heat, it probably would have to measure the environment temperature as well, or else it probably wouldn't be able to function properly in different conceivable environments.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31671722</id>
	<title>Re:Shame it has a knife on it</title>
	<author>bihoy</author>
	<datestamp>1269967080000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Yeah, I'm going to stick with my IronKey. It's a simple USB Drive that will self destruct if you enter your password incorrectly 10 times.</p></htmltext>
<tokenext>Yeah , I 'm going to stick with my IronKey .
It 's a simple USB Drive that will self destruct if you enter your password incorrectly 10 times .</tokentext>
<sentencetext>Yeah, I'm going to stick with my IronKey.
It's a simple USB Drive that will self destruct if you enter your password incorrectly 10 times.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668694</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668720</id>
	<title>Re:Two hours?</title>
	<author>warGod3</author>
	<datestamp>1269954300000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext><p>The article didn't mention two things:</p><p>* Was the "team of professional hackers" paid for NOT cracking this?<br>* Was the "team of professional hackers" able to beat the security at all?</p></htmltext>
<tokenext>The article did n't mention two things : * Was the " team of professional hackers " paid for NOT cracking this ?
* Was the " team of professional hackers " able to beat the security at all ?</tokentext>
<sentencetext>The article didn't mention two things:* Was the "team of professional hackers" paid for NOT cracking this?
* Was the "team of professional hackers" able to beat the security at all?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668668</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669714</id>
	<title>Re:What if they cut the finger and heat it</title>
	<author>Conspiracy\_Of\_Doves</author>
	<datestamp>1269960480000</datestamp>
	<modclass>Redundant</modclass>
	<modscore>0</modscore>
	<htmltext><p>And again, XKCD covers every possible situation</p><p><a href="http://xkcd.com/538/" title="xkcd.com" rel="nofollow">http://xkcd.com/538/</a> [xkcd.com]</p></htmltext>
<tokenext>And again , XKCD covers every possible situationhttp : //xkcd.com/538/ [ xkcd.com ]</tokentext>
<sentencetext>And again, XKCD covers every possible situationhttp://xkcd.com/538/ [xkcd.com]</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668772</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668714</id>
	<title>easy</title>
	<author>Anonymous</author>
	<datestamp>1269954240000</datestamp>
	<modclass>Funny</modclass>
	<modscore>2</modscore>
	<htmltext><p>Cut off the finger stick in mouth then use.</p></htmltext>
<tokenext>Cut off the finger stick in mouth then use .</tokentext>
<sentencetext>Cut off the finger stick in mouth then use.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31670444</id>
	<title>Smart Cards also do this</title>
	<author>kriston</author>
	<datestamp>1269963420000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>The infamous smart cards used by cell phones and governments do this but in a smaller scale.  After several failed attempts to use your PIN the secrets (keys, certs, data) on the card are erased.  Actually, a circuit physically burns out the memory and permanently disables it.  The card must be replaced with a new one at your local smart card processing office.</p></htmltext>
<tokenext>The infamous smart cards used by cell phones and governments do this but in a smaller scale .
After several failed attempts to use your PIN the secrets ( keys , certs , data ) on the card are erased .
Actually , a circuit physically burns out the memory and permanently disables it .
The card must be replaced with a new one at your local smart card processing office .</tokentext>
<sentencetext>The infamous smart cards used by cell phones and governments do this but in a smaller scale.
After several failed attempts to use your PIN the secrets (keys, certs, data) on the card are erased.
Actually, a circuit physically burns out the memory and permanently disables it.
The card must be replaced with a new one at your local smart card processing office.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31682328</id>
	<title>Not impressive.</title>
	<author>Sean</author>
	<datestamp>1269966300000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>In two hours? What a lame test. That makes me trust the product less than if they didn't bother doing a contest at all. Giving the attackers 100 units (and providing more upon request) and giving them 6 months would be reasonable.</p></htmltext>
<tokenext>In two hours ?
What a lame test .
That makes me trust the product less than if they did n't bother doing a contest at all .
Giving the attackers 100 units ( and providing more upon request ) and giving them 6 months would be reasonable .</tokentext>
<sentencetext>In two hours?
What a lame test.
That makes me trust the product less than if they didn't bother doing a contest at all.
Giving the attackers 100 units (and providing more upon request) and giving them 6 months would be reasonable.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668668</id>
	<title>Two hours?</title>
	<author>mog007</author>
	<datestamp>1269953880000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>5</modscore>
	<htmltext><p>Presumably, if you had physical access to the drive, wouldn't you have more time to crack it than two hours?</p></htmltext>
<tokenext>Presumably , if you had physical access to the drive , would n't you have more time to crack it than two hours ?</tokentext>
<sentencetext>Presumably, if you had physical access to the drive, wouldn't you have more time to crack it than two hours?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668708</id>
	<title>Re:Two hours?</title>
	<author>stupid\_is</author>
	<datestamp>1269954180000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext><p>But then you wouldn't be able to have a snazzy Press Release stating that <em>professional hackers</em> couldn't get into it.</p></htmltext>
<tokenext>But then you would n't be able to have a snazzy Press Release stating that professional hackers could n't get into it .</tokentext>
<sentencetext>But then you wouldn't be able to have a snazzy Press Release stating that professional hackers couldn't get into it.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668668</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669258</id>
	<title>Re:Thermal sensor?</title>
	<author>Anonymous</author>
	<datestamp>1269958140000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><blockquote><div><p>Surely if somebody can chop off your finger he can also warm it up?</p></div><div><p>Actually, the device won't recognized the fingerprint of a chopped off finger after about 10 min. due to the blood loss (according to my computer and network security courses).</p><p>[overanalyzing obvious marketing ploy]</p></div></blockquote></div></div>
	</htmltext>
<tokenext>Surely if somebody can chop off your finger he can also warm it up ? Actually , the device wo n't recognized the fingerprint of a chopped off finger after about 10 min .
due to the blood loss ( according to my computer and network security courses ) .
[ overanalyzing obvious marketing ploy ]</tokentext>
<sentencetext>Surely if somebody can chop off your finger he can also warm it up?Actually, the device won't recognized the fingerprint of a chopped off finger after about 10 min.
due to the blood loss (according to my computer and network security courses).
[overanalyzing obvious marketing ploy]
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668686</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669992</id>
	<title>Re:What if they cut the finger and heat it</title>
	<author>Anonymous</author>
	<datestamp>1269961800000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Yes that was my question exactly.  But if you're in the kind of job where you need a thumbprint-reading, self-destructing usb drive, maybe the fear of losing a thumb isn't your biggest problem.</p><p>At the same time, though, a device like this does sort of seem to be begging the bad guys--who are after your data--to cut your thumb off.  And possibly microwave it for a few seconds...maybe just wrap it in an electric blanket.  Either way it will probably be rendered unreattachable.</p><p>I'm glad I don't have any reason to have one of these with my thumbprint stored in it.</p></htmltext>
<tokenext>Yes that was my question exactly .
But if you 're in the kind of job where you need a thumbprint-reading , self-destructing usb drive , maybe the fear of losing a thumb is n't your biggest problem.At the same time , though , a device like this does sort of seem to be begging the bad guys--who are after your data--to cut your thumb off .
And possibly microwave it for a few seconds...maybe just wrap it in an electric blanket .
Either way it will probably be rendered unreattachable.I 'm glad I do n't have any reason to have one of these with my thumbprint stored in it .</tokentext>
<sentencetext>Yes that was my question exactly.
But if you're in the kind of job where you need a thumbprint-reading, self-destructing usb drive, maybe the fear of losing a thumb isn't your biggest problem.At the same time, though, a device like this does sort of seem to be begging the bad guys--who are after your data--to cut your thumb off.
And possibly microwave it for a few seconds...maybe just wrap it in an electric blanket.
Either way it will probably be rendered unreattachable.I'm glad I don't have any reason to have one of these with my thumbprint stored in it.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668908</id>
	<title>Re:What if they cut the finger and heat it</title>
	<author>period3</author>
	<datestamp>1269955860000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Then you'd win the contest, but all your winnings would be needed for your legal defense.</p></htmltext>
<tokenext>Then you 'd win the contest , but all your winnings would be needed for your legal defense .</tokentext>
<sentencetext>Then you'd win the contest, but all your winnings would be needed for your legal defense.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669762</id>
	<title>Re:What if they cut the finger and heat it</title>
	<author>bhsbulldozer</author>
	<datestamp>1269960900000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>rubber-hose cryptography, xkcd, yada yada</htmltext>
<tokenext>rubber-hose cryptography , xkcd , yada yada</tokentext>
<sentencetext>rubber-hose cryptography, xkcd, yada yada</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668772</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668966</id>
	<title>Re:Two hours?</title>
	<author>spacerog</author>
	<datestamp>1269956280000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><p>"At a contest held in London, Victorinox was offering a &pound;100,000 cash prize ($149,000) to a team of professional hackers if they could break into the USB drive within two hours. They failed."</p><p>Umm, they weren't Pros. The contest was open to anyone who preregistered and you got to keep the knife after the contest. Not only that there were several restrictions on the contest. First you have to live in the UK, preregister and you only get two hours. Because ya know the bad guys always tell you who they are and always give up after two hours. Oh, and you have to be present to win, no Internet based attacks, you can only use Windows 64bit or whatever Linux flavor they are providing and of course you have to give up your exploit if you win. All that and more for a measly hundred thousand pounds? Yeah, no thanks, but hey it makes for great publicity and it is a cool knife.</p><p>So called "Hacker Challenges" are not a valid security assessment.</p><p>- Space Rogue</p></htmltext>
<tokenext>" At a contest held in London , Victorinox was offering a   100,000 cash prize ( $ 149,000 ) to a team of professional hackers if they could break into the USB drive within two hours .
They failed .
" Umm , they were n't Pros .
The contest was open to anyone who preregistered and you got to keep the knife after the contest .
Not only that there were several restrictions on the contest .
First you have to live in the UK , preregister and you only get two hours .
Because ya know the bad guys always tell you who they are and always give up after two hours .
Oh , and you have to be present to win , no Internet based attacks , you can only use Windows 64bit or whatever Linux flavor they are providing and of course you have to give up your exploit if you win .
All that and more for a measly hundred thousand pounds ?
Yeah , no thanks , but hey it makes for great publicity and it is a cool knife.So called " Hacker Challenges " are not a valid security assessment.- Space Rogue</tokentext>
<sentencetext>"At a contest held in London, Victorinox was offering a £100,000 cash prize ($149,000) to a team of professional hackers if they could break into the USB drive within two hours.
They failed.
"Umm, they weren't Pros.
The contest was open to anyone who preregistered and you got to keep the knife after the contest.
Not only that there were several restrictions on the contest.
First you have to live in the UK, preregister and you only get two hours.
Because ya know the bad guys always tell you who they are and always give up after two hours.
Oh, and you have to be present to win, no Internet based attacks, you can only use Windows 64bit or whatever Linux flavor they are providing and of course you have to give up your exploit if you win.
All that and more for a measly hundred thousand pounds?
Yeah, no thanks, but hey it makes for great publicity and it is a cool knife.So called "Hacker Challenges" are not a valid security assessment.- Space Rogue</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668668</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668766</id>
	<title>Good luck getting this on a plane.</title>
	<author>OneMadMuppet</author>
	<datestamp>1269954720000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Srsly.</htmltext>
<tokenext>Srsly .</tokentext>
<sentencetext>Srsly.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31671720</id>
	<title>Cheap USB + TrueCrypt</title>
	<author>Anonymous</author>
	<datestamp>1269967080000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Why buy some fancy thing when you could D.I.Y. with a commodity drive with a TrueCrypt filesystem on it?</p></htmltext>
<tokenext>Why buy some fancy thing when you could D.I.Y .
with a commodity drive with a TrueCrypt filesystem on it ?</tokentext>
<sentencetext>Why buy some fancy thing when you could D.I.Y.
with a commodity drive with a TrueCrypt filesystem on it?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669922</id>
	<title>Re:Two hours?</title>
	<author>Anonymous</author>
	<datestamp>1269961500000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>It takes two hours to run home and delete all your porn before your wife figures out the stored passwords...</p><p>(captcha is 'beatable'.. hehe)</p></htmltext>
<tokenext>It takes two hours to run home and delete all your porn before your wife figures out the stored passwords... ( captcha is 'beatable'.. hehe )</tokentext>
<sentencetext>It takes two hours to run home and delete all your porn before your wife figures out the stored passwords...(captcha is 'beatable'.. hehe)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668668</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668792</id>
	<title>Re:Two hours?</title>
	<author>ark1</author>
	<datestamp>1269954960000</datestamp>
	<modclass>Funny</modclass>
	<modscore>1</modscore>
	<htmltext>The article fails to say that you have to press the fingerprint identification every 108 minutes or else it will self-destruct.</htmltext>
<tokenext>The article fails to say that you have to press the fingerprint identification every 108 minutes or else it will self-destruct .</tokentext>
<sentencetext>The article fails to say that you have to press the fingerprint identification every 108 minutes or else it will self-destruct.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668668</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669086</id>
	<title>2 hours?</title>
	<author>Lord Bitman</author>
	<datestamp>1269957000000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext><p>Some mornings I can't get into my own e-mail account in under two hours, why so low? Why not.. three?</p><p>Here's guessing a blogger will get into one by next month.</p></htmltext>
<tokenext>Some mornings I ca n't get into my own e-mail account in under two hours , why so low ?
Why not.. three ? Here 's guessing a blogger will get into one by next month .</tokentext>
<sentencetext>Some mornings I can't get into my own e-mail account in under two hours, why so low?
Why not.. three?Here's guessing a blogger will get into one by next month.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669892</id>
	<title>Re:Shame it has a knife on it</title>
	<author>Fnord666</author>
	<datestamp>1269961440000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>Just remember to take it out of your pocket before getting back on that plane.
</p><p>
I'd be interested in one without the knife as something to play with, but I'm not sure I want to carry all the rest of it around with me (I'm not some knife freak, but I want a USB stick to be just a USB stick).</p></div>
</blockquote><p>

If it is anything like their <a href="http://www.swissarmy.com/multitools/Pages/Category.aspx?category=presentation+pro&amp;" title="swissarmy.com">presentation</a> [swissarmy.com] series, then
</p><ol>
<li>The usb stick is detachable from the knife portion, so flying is not a problem, and</li><li>They offer a version that does not include all of the knife "stuff"</li></ol></div>
	</htmltext>
<tokenext>Just remember to take it out of your pocket before getting back on that plane .
I 'd be interested in one without the knife as something to play with , but I 'm not sure I want to carry all the rest of it around with me ( I 'm not some knife freak , but I want a USB stick to be just a USB stick ) .
If it is anything like their presentation [ swissarmy.com ] series , then The usb stick is detachable from the knife portion , so flying is not a problem , andThey offer a version that does not include all of the knife " stuff "</tokentext>
<sentencetext>Just remember to take it out of your pocket before getting back on that plane.
I'd be interested in one without the knife as something to play with, but I'm not sure I want to carry all the rest of it around with me (I'm not some knife freak, but I want a USB stick to be just a USB stick).
If it is anything like their presentation [swissarmy.com] series, then

The usb stick is detachable from the knife portion, so flying is not a problem, andThey offer a version that does not include all of the knife "stuff"
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668694</parent>
</comment>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_14</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669986
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31670186
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668668
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_16</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669992
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_37</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669466
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669922
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668668
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_34</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669150
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668694
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31677296
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668668
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669748
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668694
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_35</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669714
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668772
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_32</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668946
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668686
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_23</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668792
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668668
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669238
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668668
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_38</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31670102
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668988
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668822
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_28</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31672046
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668694
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_19</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669762
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668772
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_22</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668952
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668668
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669892
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668694
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_18</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31671722
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668694
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_21</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31670808
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669656
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669822
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668966
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668668
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669448
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668988
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668822
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_36</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668708
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668668
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669626
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668966
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668668
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_15</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31670376
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668988
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668822
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_17</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669716
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668684
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_20</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668908
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669116
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668918
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668686
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669514
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668686
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_33</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668720
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668668
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_26</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668984
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668694
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_30</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669258
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668686
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_25</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668750
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_27</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669634
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668694
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_29</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31670222
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668988
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668822
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668752
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668668
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668688
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_31</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668904
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_03_30_0352247_24</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31680786
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664
</commentlist>
</thread>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_30_0352247.10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668748
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_30_0352247.9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668690
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_30_0352247.8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668684
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669716
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_30_0352247.6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668694
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669748
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31671722
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31672046
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669150
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669634
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668984
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669892
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_30_0352247.4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668664
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669466
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668772
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669714
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669762
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31670808
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31680786
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669656
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668908
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668750
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668688
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669986
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668822
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668988
---http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31670222
---http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669448
---http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31670376
---http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31670102
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668904
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669992
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_30_0352247.2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31670692
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_30_0352247.7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669086
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_30_0352247.5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668686
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668946
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669258
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669514
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668918
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669116
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_30_0352247.3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31682328
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_30_0352247.1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668746
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_03_30_0352247.0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668668
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668792
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668952
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669238
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31670186
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31677296
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668966
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669626
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669822
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31669922
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668720
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668752
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_03_30_0352247.31668708
</commentlist>
</conversation>
