Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged of

Rss Feed Group items tagged

ftiet21

Christos military and intelligence corner - 1 views

  •  
    This blog contains vast amounts of information dealing with military cryptography, both in the past and the present. One of the recent articles discussed the morality of utilizing military level cryptography to ensure complete surveillance of civilians, and whether or not it should be allowed.
mattgu123

Protesters Are Targets of Scrutiny Through Their Phones - 2 views

  •  
    An app circulated among the protesters in Hong Kong that supposedly was for coordinating protest efforts, but was in reality a phishing attack that would track keystrokes, messages, and identity information of devices it was installed on. Many signs point to the Chinese government as the origin of the malware, though. Not the first time a government has done something like planting spies and monitoring protestors. We saw this in Little Brother too, with the DHS spies on the Xnet.
hamzapatel123

Unbreakable encryption comes to the U.S. - 2 views

  •  
    Although it doesn't directly deal with online privacy, I thought this was really cool. It is a new form of encryption involving sending a beam of two photons with only one of them acting as a "key." It could very well be the new method of securing privacy.
nate_clause

The 5 biggest online privacy threats of 2013 | PCWorld - 6 views

  •  
    This article opened my eyes to many things, such as how many cookies can be stored on your computer from not going to many websites, how easy it is to track ones location, and how Facebook could easily recognize you in real life. It discussed ways that information is gathered and stored about someone online that I hadn't even thought of before and was very eye-opening.
  •  
    Facebook already knew you would feel that way about this news.
Riley Dankovich

How the Government Is Tracking Your Movements | American Civil Liberties Union - 1 views

  •  
    This article, though very clearly biased, describes the ways in which the movements of citizens are being tracked by both technology and the police. The video/information slides are obviously carried out with bias, but the information is still there. The end of the article has some interesting (helpful?) information about what the judicial system is ruling on cases involving location tracking without warrants.
Abbey Roberts

Personal Privacy Is Only One of the Costs of NSA Surveillance - 1 views

  •  
    If you're writing about the rhetoric of the debate
Derek Bruff

The Learning Analytics Landscape: Tension Between Student Privacy and the Process of Da... - 1 views

  •  
    Here's an example of surveillance vs. privacy that doesn't involve security. Instead, the goal is student learning.
kims46

Surveillance Under the Patriot Act - 3 views

  •  
    Focusing on the consequences of the Patriot Act and how the US government upped the security on civilians after 9/11, this is a really nice graphic that gives a scary visual on the expanded powers of the national government in the name of security. It's from the ACLU, so this gives a pretty good perspective of, specifically, curbed liberties.
colleengill

Do governments need access to encrypted messages to thwart terrorism? | PBS NewsHour - 4 views

  •  
    PBS interview showing two sides of the security vs. privacy debate as it applies to the recent attacks in Paris, and all current issues of terrorism and a lack of information even with warrants. Gives a lot of good quotes from reputable sources that can be used to strengthen and support arguments.
parker718

Social Networking Privacy: How to be Safe, Secure and Social - 2 views

  •  
    This website provides ample information on not only the ins and outs of public information but it also gives helpful suggestions on how to keep things private and why. One interesting suggestion discussed the risks of posting your birthday as identity thieves can predict your Social Security number based off of your place of birth and birthdate.
eiyanrc

WW II Codes and Ciphers - 2 views

  •  
    This is a website introducing codes and ciphers in WW II by Tony Sale. Given this specific war context, is there really a guideline of what an action is ethical and what is not in terms of cryptoanalysis? Would an action be ethical whenever the majority's well-being is satisfied, or there's a line that should not be crossed?
Derek Bruff

Analysis of Declaraction of Independence Word Frequency in the Beale Ciphers - 0 views

  •  
    Here's the paper that Robert Ward of Maryland shared with me via email last year. The stats look solid to me, although I didn't check his p-values. Let me know if you work this into any of your projects this fall!
Abbey Roberts

Can you keep a secret? The Bletchley codebreakers 70 years on - Telegraph - 4 views

  •  
    Interesting article describing the people who worked at Bletchley Park (UK) during WWII and the secrecy act that kept them silent. The article makes compelling comparisons to people today like Edward Snowden, who are legally bound to secrecy but ignore it. What are the ethical implications of being asked to keep military secrets? Of sharing military secrets? How do the differences between today's generation and the WWII generation affect how these ethics are viewed?
Malak Elmousallamy

Hacked Chamber of Commerce Opposed Cybersecurity Law - 0 views

  •  
    This is another example of the debate on whether security or privacy is more important.
Malak Elmousallamy

Bonanza denied by pickax and jackass - 0 views

  •  
    This particular blog post caught my eye because of its funny, and somewhat goofy, title. Instead of simply listing the facts, the author describes a piece of history in a comedic and entertaining manner.
Marco Tiburcio

Hackers launch assault on Israeli government websites - 0 views

  •  
    Since Israel's bombardment of Gaza, 44 million hacking attempts have been made on Israeli government websites. This article discusses the details of the hacking attempts, and the extent of their success or failure.
Justin Yeh

Al-Qaeda's Embrace of Encryption Technology: 2007-2011 - 0 views

  •  
    An overview of Al-Qaeda's use of encryption technology in their terrorist activities. Relevant to the debate about distributing powerful cryptography to everyone, including those with bad intentions.
Malak Elmousallamy

Quantum code sent on common fibre - 0 views

  •  
    The "uncrackable codes" made by exploiting the branch of physics called quantum mechanics no longer require the use of special "dark fibres" and have been sent down kilometres of standard broadband fibre.
mariannas

2 Ways To Think About Nothing, One Mo' Time - 0 views

  •  
    This article is interesting because the author makes an unusual comparison (between a controversial art piece and the far reaches of space) in order to make his point. Despite the differences between these two topics he melds them together in order to show the reader a new way of thinking about the concept of nothing.
Derek Bruff

Threat-Assessment Teams Face Complex Task of Judging Risk - The Chronicle of Higher Edu... - 0 views

  •  
    No mention of data mining in this piece from 2012, but still a useful follow-up to the Michael Morris essay on keeping college campuses safe.
« First ‹ Previous 41 - 60 of 294 Next › Last »
Showing 20 items per page