Skip to main content

Home/ Math 1111: Cryptography/ Group items matching "US" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

Will Fear Change the Internet? Self-Policing Has Already Started - NBC News - 1 views

  •  
    Interesting article about how recent terror events will change how individuals and tech companies monitor/ regulate use on the internet, but not the government
1More

Mental cryptography and good passwords - 4 views

  •  
    This article gives a method for generating secure yet easy to remember passwords for online accounts, using encryption and modular arithmetic (!). It is an interesting use of encryption in everyday life for something we all have, password-protected internet accounts. If you click through to the computer science category, you can find other posts on cryptography, encryption, and privacy.
1More

National Institute of Justice Research Report: Chapter 2-Video Surveillance: Video Came... - 0 views

  •  
    "Signage can be an important legal component in the use of video cameras in schools. As mentioned in the previous section, it is important that the presence of video cameras not lead a person to believe he or she will be rescued if attacked."
1More

Gait Recognition - Science NetLinks - 1 views

  •  
    Researchers at Georgia Tech are currently focusing on using gait recognition to identify people. What is useful about this is that people do not need to be enrolled in a database in order to recognize them.
1More

Gait Recognition with Kinect - 0 views

  •  
    This is a scholarly article from 2012 about how gait recognition is possible using technology based on Microsoft Kinect, a game for the XBOX 360.
1More

Spying on Students: School-Issued Devices and Student Privacy | Electronic Frontier Fou... - 0 views

  •  
    Even when college students use computer or electronic devices that belong to the school, any websites they visit, links they download, and videos they watch can offer behavioral information and data that is directly tied to that student's profile, and thus them too. It's important to be aware of this fact, and realize that whatever privacy you think that Mac in the back of the library offers you is in reality nonexistent. That Mac is uploading your data to the Cloud every minute you use it, and it's important to track and understand that your online information is being sent, without your consent, to other entities. So, be careful with what you search up next time.
2More

Edward Snowden says Facebook is just as untrustworthy as the NSA - Vox - 0 views

  •  
    We need to really pay attention to how many different apps and resources we have connected to big sites like facebook, and google. Heck, Apple as a whole essentially has our entire lives on record. Don't link everything to facebook or google, and maybe consider diversifying your technology.
  •  
    Companies don't require a warrant to conduct data searches of their customers. The safest way to ensure that your data remains private while using services from a company is to use client based end to end encryption.
1More

'Edward Snowden did this country a great service. Let him come home' | US news | The Gu... - 0 views

  •  
    It is important to consider whether Snowden is our enemy or our friend. Disobeying the rule of law and throwing turmoil into our system is harmful, but many still view him as a friend of the people.
2More

The state of privacy in America | Pew Research Center - 1 views

  •  
    To any future college students: Be careful of what you type on the internet or reveal about yourself in an online forum. Despite the shocking revelations of the size and scope of the government's surveillance programs revealed by Edward Snowden, the majority of Americans don't understand the kind of information the government has on them, have taken few steps to protect their online data, and believe that such programs don't go far enough in tackling terrorism. Ironically, these same Americans also overwhelmingly believe that consumers have lost protection of their data to companies who have used their clients' privacy as a commodity. I would advise you to be careful of what you post online, and follow a few steps, such as passwords, encryption, and clearing your cookies, to help protect at least some of your data online and allow you to remain private. These programs continue to this day, and it's important that you protect what little privacy remains.
  •  
    What are the mechanisms behind surveillance? How precisely are people surveilled in the US?
« First ‹ Previous 41 - 60 of 150 Next › Last »
Showing 20 items per page