Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged fywscrypto security privacy

Rss Feed Group items tagged

charlotteneuhoff

The government has protected your security and privacy better than you think - 3 views

  •  
    This article goes over America's security and privacy trade-off, especially after 9/11. The author argues that we have done an excellent job keeping a balance between these two approaches and, while actions such as the Paris attack may make us question if we should add more security, there is no reason to take away the privacy we have as since 9/11 we have been doing a good job of valuing both of these aspects.
j_olsen

The Privacy Blog: Privacy, Security, Cryptography, and Anonymity - 4 views

  •  
    This blog is all about privacy, as the title suggests. The majority of the blog posts use actual examples, such as the Ashley Madison hack, in order to reveal important cybersecurity lessons. One particular blog post explains how Passages, a secure virtual browser, is a lot like hand sanitizer for the web. I thought that this blog was particularly interesting because it had a lot of relevant, unique examples about privacy and cryptography in the modern world.
j_olsen

What happened when a parent fought for his kid's privacy at an all-Chromebook school - 1 views

  •  
    This article, written by the one and only Cory Doctorow, highlights the privacy concerns associated with Google Chromebooks. More and more schools are issuing its students Chromebooks, which exfiltrate all data to Google data-centers and infringe one's privacy. This site also includes other interesting articles related to security and privacy.
ftiet21

After Paris, What We're Getting Wrong In 'Privacy vs. Security' Debate - 5 views

  •  
    This article discusses the faults in former deputy director of the CIA Michael Morell's statement that the use of encrypted apps made it difficult to stop terrorists. Claims that encrypted communications put them out of reach was false - there had been no change in al Qaeda tactics. Also, author Howard points out that there isn't a clear dichotomy between privacy and security.
Derek Bruff

The Learning Analytics Landscape: Tension Between Student Privacy and the Process of Da... - 1 views

  •  
    Here's an example of surveillance vs. privacy that doesn't involve security. Instead, the goal is student learning.
whitnese

3Qs: Password and cloud security - 3 views

  •  
    This article discusses the recent cloud hacks and security questions in general.
estrutt

From Technology-Driven Society to Socially Oriented Technology: The Future of Informati... - 2 views

  •  
    This is a PDF file of a chapter taken from a book that contains essays on many issues that arise from "big data." This chapter specifically pertains to our privacy versus security debate because it provides reasons as to why bulk data collection does not work as well as alternative options to mass surveillance.
charlotteneuhoff

Know how much of your personal info is online? Google's new tool will tell you - 1 views

  •  
    This article provides information for how to make your personal information more private through Google. While Google does have access to a large amount of your information, this allows you to better control what is shared online.
yuthraju

Your Online Reputation Doesn't Take the Holidays Off - 0 views

  •  
    Whether it is on Facebook, Twitter or a text on your cell phone, many will see photos and videos flying through cyberspace over the holiday season. Maybe some of these pictures and videos won't be so joyous; this is when digital decisions may have been made in haste.
Derek Bruff

cryptocat - 1 views

  •  
    "Cryptocat allows you to instantly set up secure conversations. It's an open source encrypted, private alternative to invasive services such as Facebook chat."
  •  
    "Cryptocat allows you to instantly set up secure conversations. It's an open source encrypted, private alternative to invasive services such as Facebook chat."
saraatsai

Schneier on Security - 2 views

  •  
    This is a blog by Bruce Schneier who writes about security in general, under which cryptography falls as a subject.
parker718

Cryptography | Red Hat Security - 0 views

  •  
    A security blog created by a multinational software company.
parker718

Schneier on Security - 1 views

  •  
    A well-reasoned argument from our favorite security blogger, with plenty of links to help us in writing our final paper. It is also an interesting article as it talks about the debate before Snowden, Wikileaks, and other whistleblowers.
kims46

Surveillance Under the Patriot Act - 3 views

  •  
    Focusing on the consequences of the Patriot Act and how the US government upped the security on civilians after 9/11, this is a really nice graphic that gives a scary visual on the expanded powers of the national government in the name of security. It's from the ACLU, so this gives a pretty good perspective of, specifically, curbed liberties.
charlotteneuhoff

Military Embedded Systems - 0 views

  •  
    This resource provides access to articles, news, and blog posts regarding military embedded systems, often using cryptography. One article referenced the cryptography used to secure "Data at Rest" and the length at which this information should be held secure. Is it ethical to keep this information from the public when safety is no longer a concern? At what point should these well-kept secrets become accessible?
Derek Bruff

First Library to Support Tor Anonymous Internet Browsing Effort Stops After DHS Email -... - 1 views

  •  
    A small town library in New Hampshire joins the anonymous Web surfing service Tor. Then the Department of Homeland Security shows up.
Derek Bruff

Apple - Press Info - Apple Media Advisory - 0 views

  •  
    "we have discovered that certain celebrity accounts were compromised by a very targeted attack on user names, passwords and security questions"
1 - 20 of 54 Next › Last »
Showing 20 items per page