Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged of

Rss Feed Group items tagged

Siegfried Schlunk

Adaptation: Why your brain loves to tune out - 0 views

  •  
    Our brains are wired such that we automatically cancel out things that are not changing around us, in a process called adaptation. I really like this article because it not only gives a lot of interesting information about the brain, but it also hooks the reader effectively by providing physical, relatable examples of how our brains tune stuff out. I quickly found myself drawn into the article and interested to learn more.
Collin Jackson

WWII pigeon message stumps GCHQ - 0 views

  •  
    Continuation of a story I posted a while ago. Britain's top code-breakers say they are stumped by a secret code found on the leg of a dead pigeon. .
Kristin Davis

Why encryption would not have saved General Petraeus - 1 views

  •  
    A summary of why encryption wouldn't have prevented General Petraeus from getting caught. Like the quote: "If you think cryptography is the solution to your problem, you either don't understand cryptography or you don't understand your problem."
Tyren Herbst-Ingram

S. Carolina governor admits errors in hacking of tax records - 0 views

  •  
    South Carolina gets hacked due to "outdated" technology
Collin Jackson

Gigapixel Images of Babbage's Difference Engine - 0 views

  •  
    This site has some really neat pictures and a video detailing Babbage's Difference Engine. The pictures are gigapixel, so they are incredibly detailed.
  •  
    Wow. That's a lot of zoom.
Derek Bruff

PETA sues to give monkey the copyright of selfie photos | abc7.com - 1 views

  •  
    The US Copyright Office has issued a statement saying that it would only issue copyrights to humans. PETA objects to this, having just filed a suit to grant that macaque monkey the copyright for the selfies it took back in 2011. The struggle is real.
Ryan McLaughlin

Painkilling chemicals with no side effects found in black mamba venom | Not Exactly Roc... - 0 views

  •  
    Interesting introduction and does a good job of explaining what has been discovered.
Emily Dinino

Early U.S. military cryptography - 0 views

  •  
    A description of the U.S. military's first cryptographic system.
Siegfried Schlunk

Siemens T-43 - 0 views

  •  
    A basic overview of the Siemens T-43 cipher machine used by the Germans, the first mixer machine of its kind.
Derek Bruff

Forget Apple vs. the FBI: WhatsApp Just Switched on Encryption for a Billion People | W... - 1 views

  •  
    "With end-to-end encryption in place, not even WhatsApp's employees can read the data that's sent across its network. In other words, WhatsApp has no way of complying with a court order demanding access to the content of any message, phone call, photo, or video traveling through its service. Like Apple, WhatsApp is, in practice, stonewalling the federal government, but it's doing so on a larger front-one that spans roughly a billion devices."
Siegfried Schlunk

The Bible Codes - 0 views

  •  
    A brief look at the science of cryptology and the simple encryptions found in the Old Testament. Has a couple of examples and explains the three main transformations used.
michaelpollack

Mary Queen of Scots - 0 views

  •  
    A brief history on Mary, Queen of Scots, and her secret plotting against Queen Elizabeth.
Justin Yeh

Caesar Shift Cipher - 0 views

  •  
    An in-depth description of Julius Caesar's shift cipher and how it works. Also shows how to use frequency analysis and chi-square values to quickly break the cipher.
Hannah Lee

Computer Scientists Break Security Token Key in Record Time - NYTimes.com - 0 views

  •  
    A breach in supposedly secure keys given to employees by private companies vindicates previous warnings by cryptographers that companies should use more difficult keys, and that companies have not been cautious enough using such keys because of their assumed security.
sareennl

Tools boast easy cracking of Microsoft crypto for businesses - 0 views

  •  
    Summary: Cryptography specialists have developed tools to crack PPTP encryption (based on an algorithm from Microsoft), gaining access to Wi-Fi, passwords, corporate networks and data.
Ryan McLaughlin

Britain's GCHQ Uses Online Puzzle to Recruit Hackers - NYTimes.com - 0 views

  •  
    Instead of hiring "upper-class twits from Oxford and Cambridge," A government communications agency tried a new angle on recruiting hackers. They decided to combat hackers with other experienced hackers by posting an online puzzle and offering a job interview to those who solved it.
mackense

Business breaches, celeb photo hack raise online privacy concerns | The Buzz | www.acc... - 0 views

  •  
    The thing I found very interesting about this article is the discussion about ex-NBA owner Donald Sterling. Yes, his comments were horrifying, but he said things in the privacy of his home. I guess what I, and this article, are trying to say is that privacy is dead and all information is vulnerable.
Derek Bruff

A Double Agent App Targets Hong Kong's Protesters - The Daily Beast - 0 views

  •  
    This reminds me just a bit of the Mary, Queen of Scots, story. Helpful messages that are actually covers for malicious intent.
« First ‹ Previous 81 - 100 of 294 Next › Last »
Showing 20 items per page