On Nov 30, 2007 3:34 PM, Michael Shiloh <<a href="mailto:email@example.com">firstname.lastname@example.org</a>> wrote:<br><div class="gmail_quote"><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
<div class="Ih2E3d"><br></div>If Bob (or Alice) hands his (or her) phone to the other, then if both<br>phones are shaken in the same hand, the acceleration pattern might<br>provide an extremely unique yet similar signature, not unlike exchanging
<br>an encryption key.<br><br>So if you want to establish a trusted relationship with another Neo<br>user, the two phones are shaken together until the software indicates<br>that you have generated a complex enough pattern that has been
<br>recognized on the other.<br><br>Once this has been established, they can exchange one of the standard<br>encryption keys.<br><br>All without pressing a single key, and without danger of exposing<br>anything to other Neo or bluetooth devices within range.
<br><div><div></div><div class="Wj3C7c"><br></div></div></blockquote></div><br>You mean... like this...<br><a href="http://www.youtube.com/watch?v=ktJC0S4_X58">http://www.youtube.com/watch?v=ktJC0S4_X58</a><br>