Schneier on Security - 2 views
The Crypto Hunt - Derek Bruff - 1 views
How internet encryption works - 0 views
Keurig's K-Cup coffee DRM cracked - Boing Boing - 0 views
-
I think we can count this as cryptography. Keurig (the "K-cup" coffee maker) recently rolled out a new coffee maker that only works on coffee pods with special ink markers on their foil tops, meaning that knock-off coffee pods won't work on the new Keurig systems. (More info here: http://www.theverge.com/2014/6/30/5857030/keurig-digital-rights-management-coffee-pod-pirates.) This DRM-like scheme has now been hacked by competitors.
Tor on Campus | Tor Challenge - 2 views
Cryptography in Network Security - 2 views
Everyday Encryption - 1 views
What Is SSL (Secure Sockets Layer)? | DigiCert.com - 2 views
-
This website discusses procedure and purpose of encrypting sensitive data over the internet. SSL is a protocol which "determines variables of the encryption" being used to protect information from first names to credit card numbers. This website also tells you how to determine whether or not a website is secure or if your information is vulnerable. In addition, there is another page that delves into the mathematics and actual cryptography procedures behind online encryption like RSA and ECC.
WW II Codes and Ciphers - 2 views
-
This is a website introducing codes and ciphers in WW II by Tony Sale. Given this specific war context, is there really a guideline of what an action is ethical and what is not in terms of cryptoanalysis? Would an action be ethical whenever the majority's well-being is satisfied, or there's a line that should not be crossed?
MD5 Hash - 0 views
Hacker Lexicon: What Is Steganography? - 0 views
The End of Privacy - The New York Times - 1 views
« First
‹ Previous
81 - 100 of 126
Next ›
Last »
Showing 20▼ items per page