<div dir="ltr">Not cryptography per se, but a privacy issue.  A way malware can track smart phone location from power usage.<div><br></div><div><a href="http://www.technologyreview.com/view/535346/how-malware-can-track-your-smartphone-without-using-location-data/?utm_source=feedburner&utm_medium=email&utm_campaign=Feed%3A+arXivblog+%28the+physics+arXiv+blog%29">http://www.technologyreview.com/view/535346/how-malware-can-track-your-smartphone-without-using-location-data/?utm_source=feedburner&utm_medium=email&utm_campaign=Feed%3A+arXivblog+%28the+physics+arXiv+blog%29</a><br clear="all"><div><br></div>-- <br><div class="gmail_signature">Jim Windle   <br>(646) 470-9657    <br>Oh, and be sure to state your name so my cyborg can tell me who is calling!<br></div>
</div></div>