Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged system

Rss Feed Group items tagged

andrewhaygood97

Military encryption's going open -- Defense Systems - 2 views

  •  
    This makes me wonder how ethical it is for the NSA to be so heavily involved in cryptography internationally. Are they building a backdoor into these crytographic systems? If so, how ethical could that be?
Derek Bruff

Firesheep Users May Be Breaking the Law - Kashmir Hill - The Not-So Private Parts - Forbes - 0 views

  •  
    "The legality of using Firesheep is less wooly when it comes to the Computer Fraud and Abuse Act, which criminalizes accessing computer systems without authorization."
  •  
    "The legality of using Firesheep is less wooly when it comes to the Computer Fraud and Abuse Act, which criminalizes accessing computer systems without authorization."
Emily Dinino

Early U.S. military cryptography - 0 views

  •  
    A description of the U.S. military's first cryptographic system.
Justin Yeh

SIGSALY - NSA/CSS - 0 views

  •  
    The SIGSALY voice encryption system used during WWII by the Allies.
charlotteneuhoff

Military Embedded Systems - 0 views

  •  
    This resource provides access to articles, news, and blog posts regarding military embedded systems, often using cryptography. One article referenced the cryptography used to secure "Data at Rest" and the length at which this information should be held secure. Is it ethical to keep this information from the public when safety is no longer a concern? At what point should these well-kept secrets become accessible?
Riley Dankovich

How the Government Is Tracking Your Movements | American Civil Liberties Union - 1 views

  •  
    This article, though very clearly biased, describes the ways in which the movements of citizens are being tracked by both technology and the police. The video/information slides are obviously carried out with bias, but the information is still there. The end of the article has some interesting (helpful?) information about what the judicial system is ruling on cases involving location tracking without warrants.
Derek Bruff

Does Europe Need a New Surveillance System? - Room for Debate - NYTimes.com - 1 views

  •  
    Today's New York Times features a debate of sorts over the value of increased surveillance after the Paris attacks. Click through for five different views on this complex issue.
lvanryzin

These Harvard And MIT Kids Say They've Made NSA-Proof Email - 1 views

  •  
    These people were prompted to create a easy, secure email service. They incorporated in Switzerland as it has much more stringent privacy laws than we have in America.
  •  
    Great find! At some point this semester, we're all going to learn how to use encrypted email. We might try out a few different systems, including ProtonMail, and compare them.
Derek Bruff

99% Invisible | A Tiny Radio Show About Design with Roman Mars - 2 views

  •  
    The latest 99% Invisible podcast episode focuses on locks and lockpicking. I think you'll find some nice parallels with cryptography, especially around Kerckhoff's Principle and the idea of not knowing if your security system has been broken.
Derek Bruff

99% Invisible | A Tiny Radio Show About Design with Roman Mars - 0 views

  •  
    This 99% Invisible podcast episode focuses on locks and lockpicking. I think you'll find some nice parallels with cryptography, especially around Kerckhoff's Principle and the idea of not knowing if your security system has been broken.
yuthraju

International Association for Cryptologic Research - 2 views

  •  
    The International Association for Cryptologic Research (IACR) is a non-profit scientific organization whose purpose is to further research in cryptology and related fields. Cryptology is the science and practice of designing computation and communication systems which are secure in the presence of adversaries.
kims46

Matt Blaze / crypto.com - 1 views

  •  
    "Matt Blaze directs the Distributed Systems Lab at the University of Pennsylvania." This site links to his blog and research papers regarding topics of cryptography.
Riley Dankovich

Russian Hackers Behind World’s Biggest Internet Security Breach - NBC News.com - 0 views

  •  
    This video talks about a hack done by a group of Russian hackers that gained access to 1.2 billion records, and discusses the idea that perhaps passwords are no longer the best way to protect our information. It's a quick video, but what was interesting to me was that I hadn't even considered that something other than the current password system could protect our information.
Derek Bruff

Keurig's K-Cup coffee DRM cracked - Boing Boing - 0 views

  •  
    I think we can count this as cryptography. Keurig (the "K-cup" coffee maker) recently rolled out a new coffee maker that only works on coffee pods with special ink markers on their foil tops, meaning that knock-off coffee pods won't work on the new Keurig systems. (More info here: http://www.theverge.com/2014/6/30/5857030/keurig-digital-rights-management-coffee-pod-pirates.) This DRM-like scheme has now been hacked by competitors.
Riley Dankovich

Meet the seven people who hold the keys to worldwide internet security | Technology | T... - 1 views

  •  
    This doesn't quite follow the guidelines of the blogging assignment, I don't think, but I found it pretty interesting, so I'll share this one too. This is basically about the people who are going to be holding the keys to the building blocks of the internet. I'm not sure I understand it completely, but it sounds fascinating!
  •  
    Excellent find! I heard about this security system when the author of this piece, James Ball, was interviewed for the "On the Media" podcast: http://www.onthemedia.org/story/so-many-keys/. Great stuff.
jcs215

Unifying the Global Response to Cybercrime | APWG - 0 views

shared by jcs215 on 12 Nov 14 - Cached
  •  
    The APWG is the global industry, law enforcement, and government coalition focused on unifying the global response to electronic crime through development of data resources, data standards and model response protocols and systems for private and public sectors.
1 - 20 of 25 Next ›
Showing 20 items per page