Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged Internet

Rss Feed Group items tagged

Derek Bruff

Interactive Wond'ry art installation explores issue of internet privacy | News | Vander... - 0 views

  •  
    This interactive art exhibit will be at the Wondry throughout the fall semester.
kellialove

The NSA Continues to Violate Americans' Internet Privacy Rights | American Civil Libert... - 1 views

  •  
    You are still being watched, and your data being collected, so be careful what you send and to where you send it too. Innocent messages sent out of the country can easily make you become a person of interest for no reason.
Marco Tiburcio

Step 1: Post Elusive Proof. Step 2: Watch Fireworks. - 0 views

  •  
    Online collaboration over the claimed proof "P versus NP" demonstrates the potential of the internet in the field of mathematical and intellectual research alike. The proof "P versus NP," if verified, would make obsolete modern cryptography, which works under the assumption that P does not equal NP.
Derek Bruff

How Joe Biden Accidentally Helped Us All E-Mail in Private | Danger Room | Wired.com - 0 views

  •  
    Nice write-up in Wired's "Danger Room" column on Phil Zimmerman, who was recently inducted into the Internet Hall of Fame.
Abbey Roberts

Edward Snowden | US news | The Guardian - 0 views

  •  
    "Latest on the computer analyst whistleblower who provided the Guardian with top-secret NSA documents leading to revelations about US surveillance on phone and internet communications" - compilation of news sources on Edward Snowden
sareennl

Tools boast easy cracking of Microsoft crypto for businesses - 0 views

  •  
    Summary: Cryptography specialists have developed tools to crack PPTP encryption (based on an algorithm from Microsoft), gaining access to Wi-Fi, passwords, corporate networks and data.
dumessn

Is your Smart TV spying on you? | The Privacy Post | Find out how your Internet connect... - 0 views

  •  
    This was a bit surprising. More and more people are getting smart TVs so this could be a serious problem.
Derek Bruff

Art that shows us what mass surveillance actually looks like | Fusion - 0 views

  •  
    Quote: What you are looking at is one of the many undersea cables that carries inside it, to put it simply, the magic of the Internet. This particular cable, which runs aground on the coast of Florida, has been tapped by the NSA according to Paglen's research. Paglen, an artist who has been documenting the physical footprint of surveillance for years, got scuba-certified in order to go diving "at several locations off the coast of Florida," he says, to find and photograph the cables.
masonagrow

NSA Methodology for Adversary Obstruction - 0 views

  •  
    I really just wonder what kind of decision-making went into creating this document--what they decided to add and take out, etc. This source also has outside sources on the final pages.
colleengill

UK Match.com site hit by malicious adverts - BBC News - 0 views

  •  
    Malicious adverts have been found on the UK version of the Match.com dating website. Anyone caught out by the booby-trapped ads could fall victim to ransomware, said security company Malwarebytes, which spotted the cyber-threat. The malicious ads appeared on pages of the dating site via an ad network that pipes content to Match and many other places.
giordas

Online Privacy: Technical, Political, or Both? When it comes to encryption, there's sol... - 1 views

  •  
    What really stood out to me about this article was that they said the NSA actually pays more attention to those people who use encryption. So, in order to protect ourselves and also avoid prying NSA eyes, we should encourage people to stand in solidarity with encryption. I thought this was really interesting because I always thought that encryption would undoubtedly make everything more secure, but here they're saying that it actually attracts attention (which isn't necessarily a good thing).
  •  
    When I was a kid, I read an issue of Superman in which he faces Batman's villain, the Joker. At one point, the Joker tells Superman that he's kidnapped all of Superman's best friends (Lois Lane, Jimmy Olsen, and so on) and locked them inside lead-lined caskets, hidden throughout Metropolis. Since the caskets are air-tight, they only have an hour to live, and Superman can't find them because his x-ray vision can't see through lead! That's what the Joker said. Actually, since Superman can't see through lead, those caskets *stood out* when he scanned the city with his x-ray vision, and he rescued all his friends in short order. Same basic idea.
nate_clause

Beefing up public-key encryption | MIT News Office - 0 views

  •  
    Interesting article on how public-key encryption is used to keep information safe during financial transactions online. The article discusses weakness in basic public-key encryption schemes and how some of these schemes have been improved.
aconn55

'Black Box' Software Could Be the Future of Cryptography - 2 views

  •  
    Securing data is how we currently operate, securing software could be the future of internet security.
mariannas

Review: Blackphone Trades Some Convenience for Security - 1 views

  •  
    This article is about a smartphone that's designed specifically to help you keep your personal information secure--it lets you easily encrypt your calls and texts and search the internet privately. There's also a video about ways to encrypt your email.
  •  
    Nice find. I'm reminded of DuckDuckGo, https://duckduckgo.com/, the search engine that doesn't track you. At all.
estrutt

What Is SSL (Secure Sockets Layer)? | DigiCert.com - 2 views

  •  
    This website discusses procedure and purpose of encrypting sensitive data over the internet. SSL is a protocol which "determines variables of the encryption" being used to protect information from first names to credit card numbers. This website also tells you how to determine whether or not a website is secure or if your information is vulnerable. In addition, there is another page that delves into the mathematics and actual cryptography procedures behind online encryption like RSA and ECC.
Abbey Roberts

Mental cryptography and good passwords - 4 views

  •  
    This article gives a method for generating secure yet easy to remember passwords for online accounts, using encryption and modular arithmetic (!). It is an interesting use of encryption in everyday life for something we all have, password-protected internet accounts. If you click through to the computer science category, you can find other posts on cryptography, encryption, and privacy.
kims46

EFFECT OF THE USA PATRIOT ACT ON INTERNET PRIVACY - 2 views

  •  
    Super useful!! Talks about the expansion of state power over cyber surveillance with the Patriot Act.
‹ Previous 21 - 40 of 47 Next ›
Showing 20 items per page