Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged technology

Rss Feed Group items tagged

Hannah Lee

BBC News - Privacy project uses cryptography to reduce shared info - 0 views

  •  
    This article describes efforts to create an "electronic wallet" to make sharing confidential information more secure and efficient.
Tyren Herbst-Ingram

S. Carolina governor admits errors in hacking of tax records - 0 views

  •  
    South Carolina gets hacked due to "outdated" technology
Derek Bruff

Beneblog: Technology Meets Society: Benetech's Human Rights Spin-off - 0 views

  •  
    During one of our classes, we briefly discussed the use of cryptography to protect eyewitness and victim information during the investigation of human rights violations. The individual I mentioned that day was Patrick Ball, who now will lead a new organization focused on "the data-driven and scientific side of analyzing human rights violations around the world."
Collin Jackson

The Fastest-Ever Random Number Generator Conjures Digits from Subatomic Noise in a Vacuum - 0 views

  •  
    Not directly involving cryptography, but the implications of this definitely affect the field. Now that we have the capability to generate truly random number strings, our ability to encrypt data will improve.
colleengill

UK Match.com site hit by malicious adverts - BBC News - 0 views

  •  
    Malicious adverts have been found on the UK version of the Match.com dating website. Anyone caught out by the booby-trapped ads could fall victim to ransomware, said security company Malwarebytes, which spotted the cyber-threat. The malicious ads appeared on pages of the dating site via an ad network that pipes content to Match and many other places.
Derek Bruff

NSA Plans for a Post-Quantum World - Schneier on Security - 0 views

  •  
    Here's a recent piece by security expert Bruce Schneier on quantum computing, which is different than quantum cryptography. (I conflated the two during class today.) Quantum computing is very fast computing that could be used to quickly break modern encryption schemes. Quantum cryptography involves sending messages that can't be read, since "looking" at them changes the message. Schneier offers some conjectures about where the NSA is with regard to both technologies.
saraatsai

Crypto modernization transforms military communications - 1 views

  •  
    Embeddable cryptographic processors are enabling a host of new defense communications applications, such as smartphones and tablet computers for tactical use on the front lines, but should soldiers be using the same object for both secure and insecure communications? Or does this create a conflict of interests?
  •  
    This is an article about the advancement of technology and how it has affected cryptography and secret-keeping during wartime.
junqing-shi

How internet encryption works - 0 views

  •  
    This is a nice intro to public-key cryptography, and a bit of the math behind the "classic" public-key algorithms.
mariannas

Review: Blackphone Trades Some Convenience for Security - 1 views

  •  
    This article is about a smartphone that's designed specifically to help you keep your personal information secure--it lets you easily encrypt your calls and texts and search the internet privately. There's also a video about ways to encrypt your email.
  •  
    Nice find. I'm reminded of DuckDuckGo, https://duckduckgo.com/, the search engine that doesn't track you. At all.
Derek Bruff

Google Glass Police: NYPD Cops Testing Google Camera | TIME.com - 0 views

  •  
    "A few months ago, an officer for the Byron Police Department in Georgia made a routine traffic stop equipped with an unusual piece of technology: Google Glass."
jcs215

With Tech Taking Over in Schools, Worries Rise - 2 views

  •  
    At a New York state elementary school, teachers can use a behavior-monitoring app to compile information on which children have positive attitudes and which act out. In Georgia, some high school cafeterias are using a biometric identification system to let students pay for lunch by scanning the palms of their hands at the checkout line.
hamzapatel123

Online privacy is dead - 2 views

  •  
    With the shutdown of the silk road, the NSA has proven that it is monitoring even the most anonymous parts of the web. This raises some serious questions. Is anything that we do online really "private?"
  •  
    It's a little depressing, isn't it? One solution would be stronger oversight for the NSA. We could assume they can see everything, but have stronger assurances that they're using that power responsibly.
Abbey Roberts

New America Open Technology Institute - 2 views

  •  
    Many many articles/ papers on security vs. privacy issues
Derek Bruff

Blackberry to 'exit' Pakistan over data-retention row - BBC News - 0 views

  •  
    Blackberry to stop operating in Pakistan because of government requests to monitor customer data. https://t.co/8kBg6QCEAF #fywscrypto - Derek Bruff (@derekbruff) December 1, 2015
‹ Previous 21 - 40 of 67 Next › Last »
Showing 20 items per page