Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged IT

Rss Feed Group items tagged

chrisr22

The NSA Can Probably Break Tor's Encryption Keys - 0 views

  •  
    When it turned out that the Firefox JavaScript Tor vulnerability shenanigans were originating from the NSA not the FBI, it was pretty clear that the agency was looking to undermine and access Tor's anonymous internet. It's like a moth to a flame. But now security expert Robert Graham has outlined his reasons for believing that the NSA doesn't even need tricks and paltry exploits to access Tor, because they have the keys to the kingdom. Or can.
  •  
    When it turned out that the Firefox JavaScript Tor vulnerability shenanigans were originating from the NSA not the FBI, it was pretty clear that the agency was looking to undermine and access Tor's anonymous internet. It's like a moth to a flame. But now security expert Robert Graham has outlined his reasons for believing that the NSA doesn't even need tricks and paltry exploits to access Tor, because they have the keys to the kingdom. Or can.
Hannah Lee

Knowing When To Fold 'Em: The Science of Poker | Cocktail Party Physics, Scientific Ame... - 0 views

  •  
    This article concerning the science behind poker and its categorization as either skill or luck is particularly well written in that it draws its audience in by presenting a recent event that concerned poker, and then proceeding to present information on the history of poker as well as the statistics that support its argument.  Furthermore, the author establishes credibility throughout her post by referencing credible studies done. Her voice throughout the post continues to be entertaining, keeping the reader's attention for the entirety of her post.
Annie Vreeland

Walking on Eggshells: Anatomy of a Science Story | Cocktail Party Physics, Scientific A... - 0 views

  •  
    I like the way this is written because the author makes it a fun read. It is not a long boring article about the writing process of her story, but rather it breaks down her process into steps. Moreover, her writing is entertaining, which grasped my interest more so than many other posts. 
mackense

The Mysterious Treasure of Thomas Beale - 1 views

  •  
    I found this article and liked it because it gave me a lot of information about the Beale Cipher and treasure, even more information than Singh. I especially was interested in the reasons describing the possibility of it being real or a hoax.
mackense

BBC News - Who is winning the 'crypto-war'? - 0 views

  •  
    In the war over encryption between the NSA and privacy activists, at first it seemed as though the activists had won - but now it's not so clear.
  •  
    This was shared with the group! Did you do anything different this time? Your comment appeared twice, but that's fine.
  •  
    I didn't do anything different! It must have appeared twice because I posted it twice.
Riley Dankovich

Meet the seven people who hold the keys to worldwide internet security | Technology | T... - 1 views

  •  
    This doesn't quite follow the guidelines of the blogging assignment, I don't think, but I found it pretty interesting, so I'll share this one too. This is basically about the people who are going to be holding the keys to the building blocks of the internet. I'm not sure I understand it completely, but it sounds fascinating!
  •  
    Excellent find! I heard about this security system when the author of this piece, James Ball, was interviewed for the "On the Media" podcast: http://www.onthemedia.org/story/so-many-keys/. Great stuff.
Justin Yeh

Getting Slower And Slower: How Slow Can You Go? : Krulwich Wonders... : NPR - 0 views

  •  
    Speed is generally considered exciting, but this blog post takes a different approach. It uses interesting examples, both foreign and familiar, to create a relative scale of speed. It is extremely easy to understand and informative. 
Derek Bruff

Bletchley Park News - 0 views

  •  
    "The remains of a World War Two carrier pigeon which was lost in action 70 years ago while delivering a top secret message over enemy lines has been found in a chimney in Bletchingley, Surrey. The skeleton of the bird has a small red cylinder attached to its foot which contains a mysterious cigarette paper sized coded message. The message is deemed so sensitive, that Codebreakers at GCHQ in Cheltenham are now frantically trying to decipher it."
giordas

http://pages.cpsc.ucalgary.ca/~boyd/papers/biometric-summerschool.pdf - 1 views

  •  
    Essentially, this paper goes through the types of gait recognition software that currently exist as well as the reliability of this software. There are a lot of different elements that influence a persons gait (like terrain, shoes, fatigue, etc.), which effects how well the software works. It's a pretty heavy read but it's really interesting if you want to just jump to a certain section and read in depth. This technology is very much out there and in development, and it is definitely being improved upon. Also, even though this paper is a little bit older, it is still being cited in a lot of more recent research papers and I thought it would give a good enough grasp on the science for our purposes.
giordas

Ada Lovelace, the First Tech Visionary - The New Yorker - 1 views

  •  
    Here's just some more information about Ada Lovelace because she's pretty cool.
  •  
    I thought this article was interesting because it mentioned Ada's childhood imagination and inventions. It's interesting to consider what she could've done if she had grown up in a different place or at a different time. Also, the article mentioned that there was a computer program named "Ada" after her and I thought it was pretty cool that she's beginning to be recognized more and more. (Sorry, I don't know why this comment wasn't here earlier. It's in my original Diigo bookmark.)
eiyanrc

This tool boosts your privacy by opening your WI-FI to strangers - 0 views

  •  
    Getty In an age of surveillance anxiety, the notion of leaving your Wi-Fi network open and unprotected seems dangerously naive. But one group of activists says it can help you open up your wireless internet and not only maintain your privacy, but actually increase it in the process. At the Hackers on Planet Earth conference…
nate_clause

The 5 biggest online privacy threats of 2013 | PCWorld - 6 views

  •  
    This article opened my eyes to many things, such as how many cookies can be stored on your computer from not going to many websites, how easy it is to track ones location, and how Facebook could easily recognize you in real life. It discussed ways that information is gathered and stored about someone online that I hadn't even thought of before and was very eye-opening.
  •  
    Facebook already knew you would feel that way about this news.
lvanryzin

How Government Tracking Works (We Think) and What Average Citizens Can Do About It - 3 views

  •  
    This article may be biased but it is still interesting. It implies that the government is using cell phones to track citizens in the same way bus passes were used in Little Brother.
rmusicant

Credit Card Tokenization 101 - And Why it's Better than Encryption - 1 views

  •  
    This article explains a way that credit card information is stored safely without encryption. Tokenization is a completely different way of securing credit card information than encryption because it completely removes the credit card information and replaces it with a "token" that cannot be retraced to retrieve the credit card information. Encryption has the credit card information hidden somewhere, but tokenization erases it completely which makes it very secure.
Derek Bruff

Barr Pushes Facebook for Access to WhatsApp Messages - The New York Times - 0 views

  •  
    "Attorney General William P. Barr took aim at Facebook's plan to make WhatsApp and its other messaging services more secure, pressing its chief executive, Mark Zuckerberg, to create a loophole to that goal of full encryption."
Riley Dankovich

Deleting Ada Lovelace from the history of computing | Ada Initiative - 2 views

  •  
    This resource is interesting in light of our discussing Babbage and Lovelace, as well as Ada Lovelace Day. This article is particularly interesting to me as it deals with women's contributions to significant advancements in history, many of which are often ignored or excused.
  •  
    Riley, I mentioned in class that October 14th is Ada Lovelace Day, an international day for recognizing the contributions of women in science. Details: http://findingada.com/. I've wanted to organize an Ada Lovelace Day event here at Vanderbilt for a few years now, but never found the time. Let me know if you'd like to cook something up (an event? a blog series? a Wikipedia editing party?) for the 14th.
  •  
    I found it really interesting that people took the fact that Lovelace made a few mistakes as an excuse to try to remove her contribution to computer programming. Male scientists and programmers also make mistakes, but we rarely see those used in an attempt to discredit them. Also, she literally designed a computer program before the computer even existed. I think we can excuse a few past mathematical errors.
masonagrow

A Brief History of Cryptography | Red Hat Security - 0 views

  •  
    Cryptology is a young science. Though it has been used for thousands of years to hide secret messages, systematic study of cryptology as a science (and perhaps an art) just started around one hundr...
  •  
    Cryptology is a young science. Though it has been used for thousands of years to hide secret messages, systematic study of cryptology as a science (and perhaps an art) just started around one hundr...
giordas

Online Privacy: Technical, Political, or Both? When it comes to encryption, there's sol... - 1 views

  •  
    What really stood out to me about this article was that they said the NSA actually pays more attention to those people who use encryption. So, in order to protect ourselves and also avoid prying NSA eyes, we should encourage people to stand in solidarity with encryption. I thought this was really interesting because I always thought that encryption would undoubtedly make everything more secure, but here they're saying that it actually attracts attention (which isn't necessarily a good thing).
  •  
    When I was a kid, I read an issue of Superman in which he faces Batman's villain, the Joker. At one point, the Joker tells Superman that he's kidnapped all of Superman's best friends (Lois Lane, Jimmy Olsen, and so on) and locked them inside lead-lined caskets, hidden throughout Metropolis. Since the caskets are air-tight, they only have an hour to live, and Superman can't find them because his x-ray vision can't see through lead! That's what the Joker said. Actually, since Superman can't see through lead, those caskets *stood out* when he scanned the city with his x-ray vision, and he rescued all his friends in short order. Same basic idea.
mariannas

They Cracked This 250-Year-Old Code, and Found a Secret Society Inside | WIRED - 1 views

  •  
    I'm just going to resubmit the bookmark directly to this page so I'll be sure it ends up publicly in the group. This wasn't mentioned in Singh chapter 2, but it was created around the time period discussed in the chapter. (Plus, it's one of my favorite articles I've read in Wired so I really wanted to use it as a bookmark.) The article discusses the strategies used to break this cipher, some of which, such as frequency analysis, we have talked about in class. It's also just fascinating to read about the Oculists and their history.
1 - 20 of 142 Next › Last »
Showing 20 items per page