Skip to main content

Home/ Math 1111: Cryptography/ Contents contributed and discussions participated by chrisr22

Contents contributed and discussions participated by chrisr22

chrisr22

How the Deep Web Works - HowStuffWorks - 0 views

  •  
    What a tangled web we weave, indeed. About 40 percent of the world's population uses the Web for news, entertainment, communication and myriad other purposes [source: Internet World Stats]. Yet even as more and more people log on, they are actually finding less of the data that's stored online.
chrisr22

How con artists trick your mind - 1 views

  •  
    This blog post was a very entertaining and read. The concept that the reason people get scammed because of their strengths (trust in authority/desire to follow) and not our weaknesses is a bit mind boggling. It was very well written and kept me interested throughout the entire post.
chrisr22

Laptop-Spying School Accessed Webcams 42 Times; FBI Begins Investigation - 3 views

  •  
    High school student suing Philadelphia's Lower Merion School District for remotely accessing his webcam. And maybe you read the Superintendent's response and thought, "well, maybe this whole business is getting blown out of proportion." It isn't.
chrisr22

Charles Babbage's Failed Computer from 1837 Will Be Built - 2 views

  •  
    Interesting article about Charles Baggage's computer designs finally being put to use! Found it interesting because we read about Charles Babbage and I was surprised to learn that the computer hadn't been built yet.
chrisr22

Facebook Finally Adds HTTPS Support - 5 views

  •  
    I found this article interesting because it actually mentions the "firesheep" add-on we discussed during class as well as the encryption of our data.
chrisr22

The NSA Can Probably Break Tor's Encryption Keys - 0 views

  •  
    When it turned out that the Firefox JavaScript Tor vulnerability shenanigans were originating from the NSA not the FBI, it was pretty clear that the agency was looking to undermine and access Tor's anonymous internet. It's like a moth to a flame. But now security expert Robert Graham has outlined his reasons for believing that the NSA doesn't even need tricks and paltry exploits to access Tor, because they have the keys to the kingdom. Or can.
  •  
    When it turned out that the Firefox JavaScript Tor vulnerability shenanigans were originating from the NSA not the FBI, it was pretty clear that the agency was looking to undermine and access Tor's anonymous internet. It's like a moth to a flame. But now security expert Robert Graham has outlined his reasons for believing that the NSA doesn't even need tricks and paltry exploits to access Tor, because they have the keys to the kingdom. Or can.
1 - 6 of 6
Showing 20 items per page