During one of our classes, we briefly discussed the use of cryptography to protect eyewitness and victim information during the investigation of human rights violations. The individual I mentioned that day was Patrick Ball, who now will lead a new organization focused on "the data-driven and scientific side of analyzing human rights violations around the world."
Not directly involving cryptography, but the implications of this definitely affect the field. Now that we have the capability to generate truly random number strings, our ability to encrypt data will improve.
Malicious adverts have been found on the UK version of the Match.com dating website. Anyone caught out by the booby-trapped ads could fall victim to ransomware, said security company Malwarebytes, which spotted the cyber-threat. The malicious ads appeared on pages of the dating site via an ad network that pipes content to Match and many other places.
Here's a recent piece by security expert Bruce Schneier on quantum computing, which is different than quantum cryptography. (I conflated the two during class today.) Quantum computing is very fast computing that could be used to quickly break modern encryption schemes. Quantum cryptography involves sending messages that can't be read, since "looking" at them changes the message. Schneier offers some conjectures about where the NSA is with regard to both technologies.
Embeddable cryptographic processors are enabling a host of new defense communications applications, such as smartphones and tablet computers for tactical use on the front lines, but should soldiers be using the same object for both secure and insecure communications? Or does this create a conflict of interests?
This article is about a smartphone that's designed specifically to help you keep your personal information secure--it lets you easily encrypt your calls and texts and search the internet privately. There's also a video about ways to encrypt your email.
"A few months ago, an officer for the Byron Police Department in Georgia made a routine traffic stop equipped with an unusual piece of technology: Google Glass."
At a New York state elementary school, teachers can use a behavior-monitoring app to compile information on which children have positive attitudes and which act out. In Georgia, some high school cafeterias are using a biometric identification system to let students pay for lunch by scanning the palms of their hands at the checkout line.
With the shutdown of the silk road, the NSA has proven that it is monitoring even the most anonymous parts of the web. This raises some serious questions. Is anything that we do online really "private?"
It's a little depressing, isn't it? One solution would be stronger oversight for the NSA. We could assume they can see everything, but have stronger assurances that they're using that power responsibly.
Blackberry to stop operating in Pakistan because of government requests to monitor customer data. https://t.co/8kBg6QCEAF #fywscrypto
- Derek Bruff (@derekbruff) December 1, 2015