[Noisebridge-discuss] Access control & Safety, both personal and general space.

Shannon Lee shannon at scatter.com
Wed Feb 8 19:38:24 UTC 2012

Putting this together with Kelly's hottub-access idea from last night, we
could make authority chains...

You have access to the gate via your phone number; you can give others
access to the gate by registering their phone number, but it's tied to
yours; if they give others access, it's two levels down that particular
access branch.

This way, if we revoke my access, my little branch of the tree of trust
gets cut off, and people who gained access via me have to get re-authorized.

Ideally, I'd be able to get on several upstream people's access lists, that
way if one of them gets booted I still have a way in...


On Wed, Feb 8, 2012 at 11:32 AM, Jonathan Lassoff <jof at thejof.com> wrote:

> On Wed, Feb 8, 2012 at 11:26 AM, Shannon Lee <shannon at scatter.com> wrote:
> > I think the original idea was that you'd have a list of caller IDs whose
> > phone would unlock the door.
> Oh, right duh. Seems decent.
> Another fun idea I've heard bandied about: use device descriptor
> information of arbitrary USB devices. Most have some vendor IDs and
> serial numbers that makes them mostly unique. Have a port downstairs
> that you can plug a USB stick into.
> I like the idea of methods of gaining entry that take a bit of skill.
> This raises the bar for entry and acts as a bit of a filter against
> moochers, and filters for hacker types (whom I'd love to hang out
> with, but seem way too rare at 2169 as of late).
> Cheers,
> jof

Shannon Lee
(503) 539-3700

"Any sufficiently analyzed magic is indistinguishable from science."
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.noisebridge.net/pipermail/noisebridge-discuss/attachments/20120208/f2e1c69b/attachment.html>

More information about the Noisebridge-discuss mailing list