Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged information

Rss Feed Group items tagged

Riley Dankovich

How the Government Is Tracking Your Movements | American Civil Liberties Union - 1 views

  •  
    This article, though very clearly biased, describes the ways in which the movements of citizens are being tracked by both technology and the police. The video/information slides are obviously carried out with bias, but the information is still there. The end of the article has some interesting (helpful?) information about what the judicial system is ruling on cases involving location tracking without warrants.
Riley Dankovich

The Murderer's Thumb: A Short History - 0 views

  •  
    I thought this post was well written. It was short and concise but was well organized and polished. I also liked that it wasn't too informal. The pseudo-scientific explanations for the malformation were very interesting.
  •  
    This blog incorporates both researched information and personal anecdote in a well-balanced, entertaining manner. The topic is new information to me, and I would assume most readers, and was presented compellingly. The photo was also a nice addition!
rmusicant

Credit Card Tokenization 101 - And Why it's Better than Encryption - 1 views

  •  
    This article explains a way that credit card information is stored safely without encryption. Tokenization is a completely different way of securing credit card information than encryption because it completely removes the credit card information and replaces it with a "token" that cannot be retraced to retrieve the credit card information. Encryption has the credit card information hidden somewhere, but tokenization erases it completely which makes it very secure.
mackense

The Mysterious Treasure of Thomas Beale - 1 views

  •  
    I found this article and liked it because it gave me a lot of information about the Beale Cipher and treasure, even more information than Singh. I especially was interested in the reasons describing the possibility of it being real or a hoax.
masonagrow

Everyday Encryption - 1 views

  •  
    Gives information on several uses of crypto in life; provides some information on multiple uses
Riley Dankovich

Russian Hackers Behind World’s Biggest Internet Security Breach - NBC News.com - 0 views

  •  
    This video talks about a hack done by a group of Russian hackers that gained access to 1.2 billion records, and discusses the idea that perhaps passwords are no longer the best way to protect our information. It's a quick video, but what was interesting to me was that I hadn't even considered that something other than the current password system could protect our information.
charlotteneuhoff

Know how much of your personal info is online? Google's new tool will tell you - 1 views

  •  
    This article provides information for how to make your personal information more private through Google. While Google does have access to a large amount of your information, this allows you to better control what is shared online.
leahrstr

Setting Up Your Tech on the Assumption You'll Be Hacked - 3 views

  •  
    Advice: Be careful with what information is stored on online devices. Always assume that the information can be leaked so you are never too vulnerable to an attack. Keep a strong password to protect your information
Justin Yeh

Getting Slower And Slower: How Slow Can You Go? : Krulwich Wonders... : NPR - 0 views

  •  
    Speed is generally considered exciting, but this blog post takes a different approach. It uses interesting examples, both foreign and familiar, to create a relative scale of speed. It is extremely easy to understand and informative. 
Emily Dinino

The Smart Scanner That May Put Shampoo Back Into Your Carry-on | Weapons & Security | D... - 0 views

  •  
    I thought this post was incredibly well written, starting with the title. The title is captivating and draws readers in by suggesting a solution to a common annoyance. The article also addresses the bigger scientific achievement: this scanner may be useful for medical purposes such as measuring glucose levels or cancer cell levels at tumor sites. The article provides sufficient, interesting information while creatively tying in witty humor. 
Hannah Lee

BBC News - Privacy project uses cryptography to reduce shared info - 0 views

  •  
    This article describes efforts to create an "electronic wallet" to make sharing confidential information more secure and efficient.
Hannah Lee

Knowing When To Fold 'Em: The Science of Poker | Cocktail Party Physics, Scientific Ame... - 0 views

  •  
    This article concerning the science behind poker and its categorization as either skill or luck is particularly well written in that it draws its audience in by presenting a recent event that concerned poker, and then proceeding to present information on the history of poker as well as the statistics that support its argument.  Furthermore, the author establishes credibility throughout her post by referencing credible studies done. Her voice throughout the post continues to be entertaining, keeping the reader's attention for the entirety of her post.
aconn55

Heathrow to get new facial recognition scanners - 0 views

  •  
    Heathrow is linking biometric information with boarding pass information to create a database.
mackense

Business breaches, celeb photo hack raise online privacy concerns | The Buzz | www.acc... - 0 views

  •  
    The thing I found very interesting about this article is the discussion about ex-NBA owner Donald Sterling. Yes, his comments were horrifying, but he said things in the privacy of his home. I guess what I, and this article, are trying to say is that privacy is dead and all information is vulnerable.
charlotteneuhoff

Military Embedded Systems - 0 views

  •  
    This resource provides access to articles, news, and blog posts regarding military embedded systems, often using cryptography. One article referenced the cryptography used to secure "Data at Rest" and the length at which this information should be held secure. Is it ethical to keep this information from the public when safety is no longer a concern? At what point should these well-kept secrets become accessible?
estrutt

Extreme cryptography paves way to personalized medicine - 0 views

  •  
    Encrypted analysis of data in the cloud would allow secure access to sensitive information.
  •  
    Homomorphic encryption is pretty amazing. What they're proposing in this article is a bit like having a computer analyze an encrypted novel and determining which sentences were grammatically incorrect--without even knowing what the plaintext sentences were!
rmusicant

Report -- FBI investigating St. Louis Cardinals for hacking Houston Astros' database - 2 views

  •  
    The St. Louis Cardinals are being investigated by the FBI for allegedly hacking into networks and trying to steal information about the Houston Astros, The New York Times reported Tuesday.
nate_clause

Beefing up public-key encryption | MIT News Office - 0 views

  •  
    Interesting article on how public-key encryption is used to keep information safe during financial transactions online. The article discusses weakness in basic public-key encryption schemes and how some of these schemes have been improved.
nate_clause

The 5 biggest online privacy threats of 2013 | PCWorld - 6 views

  •  
    This article opened my eyes to many things, such as how many cookies can be stored on your computer from not going to many websites, how easy it is to track ones location, and how Facebook could easily recognize you in real life. It discussed ways that information is gathered and stored about someone online that I hadn't even thought of before and was very eye-opening.
  •  
    Facebook already knew you would feel that way about this news.
1 - 20 of 70 Next › Last »
Showing 20 items per page