Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged phones privacy

Rss Feed Group items tagged

yuthraju

Your Online Reputation Doesn't Take the Holidays Off - 0 views

  •  
    Whether it is on Facebook, Twitter or a text on your cell phone, many will see photos and videos flying through cyberspace over the holiday season. Maybe some of these pictures and videos won't be so joyous; this is when digital decisions may have been made in haste.
Collin Jackson

Cell Phone Data Could Help Clip Malaria Spread - 0 views

  •  
    Using data from cellphone locations in Kenya, analysts are better able to predict how malaria will spread.
Abbey Roberts

Edward Snowden | US news | The Guardian - 0 views

  •  
    "Latest on the computer analyst whistleblower who provided the Guardian with top-secret NSA documents leading to revelations about US surveillance on phone and internet communications" - compilation of news sources on Edward Snowden
Derek Bruff

Forget Apple vs. the FBI: WhatsApp Just Switched on Encryption for a Billion People | W... - 1 views

  •  
    "With end-to-end encryption in place, not even WhatsApp's employees can read the data that's sent across its network. In other words, WhatsApp has no way of complying with a court order demanding access to the content of any message, phone call, photo, or video traveling through its service. Like Apple, WhatsApp is, in practice, stonewalling the federal government, but it's doing so on a larger front-one that spans roughly a billion devices."
Derek Bruff

Disturbing texts in CHP officers' nude-photo 'game,' records show - SFGate - 1 views

  •  
    From @kashhill: "And this is why people get nervous about police officers going through their phones: nude photo collection game in CA"
arnielal

How the modern world depends on encryption - BBC News - 0 views

  •  
    This article discusses how there needs to be advanced cryptography in many facets of life for a person in the modern era from credit cards to phone calls to ATMS. It also describes how encryption uses such a large number of combinations, a brute force attack will never worm
1 - 15 of 15
Showing 20 items per page