Skip to main content

Home/ Math 1111: Cryptography/ Contents contributed and discussions participated by nate_clause

Contents contributed and discussions participated by nate_clause

nate_clause

Oppenheimer's Folly: On black holes, fundamental laws and pure and applied science | Th... - 0 views

  •  
    I feel this article is well written for a few reasons. If has the feel of telling a story but remains formal and in the style of academic writing at the same time. The flow of the post is very well done also as each paragraph logically leads into the next. Lastly, the post concludes very well tying in everything the post discusses and how they relate to science in the world today.
nate_clause

You Are Being Tracked: How License Plate Readers Are Being Used to Record Americans' Mo... - 0 views

  •  
    There are already in place many automatic license plate readers on things such as road signs and bridges. This has purposes for helping track vehicles known to be owned by criminals, but simultaneously the tracking information is stored for millions of innocent people as well.
nate_clause

CrypTool-Online / Ciphers / Gronsfeld - 3 views

  •  
    This outlines the gronsfeld cipher, which is a modification of the vigenere cipher. I like and find this cipher interesting because of it using numbers instead of letters, and I like cryptography which uses numbers.
nate_clause

The 5 biggest online privacy threats of 2013 | PCWorld - 6 views

  •  
    This article opened my eyes to many things, such as how many cookies can be stored on your computer from not going to many websites, how easy it is to track ones location, and how Facebook could easily recognize you in real life. It discussed ways that information is gathered and stored about someone online that I hadn't even thought of before and was very eye-opening.
nate_clause

Beefing up public-key encryption | MIT News Office - 0 views

  •  
    Interesting article on how public-key encryption is used to keep information safe during financial transactions online. The article discusses weakness in basic public-key encryption schemes and how some of these schemes have been improved.
1 - 5 of 5
Showing 20 items per page