Skip to main content

Home/ Math 1111: Cryptography/ Group items matching "back" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Emily Dinino

The Smart Scanner That May Put Shampoo Back Into Your Carry-on | Weapons & Security | DISCOVER Magazine - 0 views

  •  
    I thought this post was incredibly well written, starting with the title. The title is captivating and draws readers in by suggesting a solution to a common annoyance. The article also addresses the bigger scientific achievement: this scanner may be useful for medical purposes such as measuring glucose levels or cancer cell levels at tumor sites. The article provides sufficient, interesting information while creatively tying in witty humor. 
giordas

The Golden Spoon - 0 views

  •  
    What really drew me to this article was how interesting the author made the subject sound. They hooked me right away by presenting something we usually consider to be ordinary as extraordinary. Additionally, the authors voice was really present and interesting throughout the whole article which is something that I really need to learn from. Also, once I got to the end I realized how well the article was organized. The title and initial premise wrapped right back up at the end with the experiment with spoons of different metal types. All in all, this article was well written; it was well organized, intriguing, and also concise.
hamzapatel123

The Human Genome Is In Stalemate in the War Against Itself - 0 views

  •  
    I thought this article was very well written because at first it has a nice captivating introduction and title. The author goes on to explain the concepts in the most technical manner, but then he takes a step back and goes back to the reader's level in order to facilitate the reader's understanding if he or she does not have much knowledge on the topic. All in all, the article introduced a very interesting discovery about human evolution.
Derek Bruff

Hospital Forced Back to Pre-Computer Era Shows the Power of Ransomware - 0 views

  •  
    Ransomware shuts down a hospital for more than a week. This time, there's a $3 million demand.
Derek Bruff

After Paris Attacks, Here's What the CIA Director Gets Wrong About Encryption | WIRED - 2 views

  •  
    WIRED's @KimZetter on encryption, back doors, and the #ParisAttacks. #fywscrypto https://t.co/nRgnRIUN64 - Derek Bruff (@derekbruff) November 17, 2015
Derek Bruff

Bletchley Park Trust on Twitter: "Richard, 10, has made this Bombe machine out of Lego, complete with wires on the back. Keep your pics coming! https://t.co/3xTYb7Mmge" - 2 views

  •  
    "Richard, 10, has made this Bombe machine out of Lego, complete with wires on the back."
Derek Bruff

PETA sues to give monkey the copyright of selfie photos | abc7.com - 1 views

  •  
    The US Copyright Office has issued a statement saying that it would only issue copyrights to humans. PETA objects to this, having just filed a suit to grant that macaque monkey the copyright for the selfies it took back in 2011. The struggle is real.
aconn55

The top 10 unsolved cipher texts - 1 views

  •  
    Many interesting ones in this list. I like the Kryptos at the CIA headquarters. 
  •  
    Here's a list of 10 unsolved cipher texts throughout history, #2 is the Beale Papers covered in the chapter, #8 is Kryptos (the background of our website). Some date back as far as 1400 BC and some are more recent like the Zodiac Killer.
Derek Bruff

Cotton squares off against Apple CEO | TheHill - 0 views

  •  
    Apple CEO Tim Cook was on 60 Minutes yesterday, reiterating his company's support for strong encryption. Today, Senator Tom Cotton called on Apple and other companies to install "back doors" for law enforcement agencies. I wonder if Tom Cotton has read the "Keys Under Doormats" report by Schneier, Rivest, Diffie, et al.
Derek Bruff

Encryption: The danger of exceptional access (Opinion) - CNN.com - 0 views

  •  
    Fairly easy to read argument from a crypto expert (Columbia University computer scientist Steven Bellovin) on the dangers of "back doors" in computer systems.
rmusicant

NSA debate takes new turns after Paris attacks - 4 views

  •  
    Privacy advocates are pushing back against arguments from the intelligence community that more surveillance powers would have prevented the deadly Paris terrorist attacks. They're offended at what they see as naked opportunism from supporters of tough surveillance powers and argue the rhetoric - including suggestions that National Security Agency leaker Edward Snowden has blood on his hands - has gone too far.
saraatsai

Paris attacks should be 'wake up call' for more digital surveillance, CIA director says - 2 views

  •  
    This article talks about the want for greater government surveillance after the Paris attacks. It mentions that since Edward Snowden released information about the NSA's digital surveillance power, a lot of measures have been taken to restrict government surveillance. However, since the Paris attacks, the US government is pushing to bring that power back.
Adrian Florea

New Crypto Tool Makes Anonymous Surveys Truly Anonymous - 0 views

  •  
    Advice: Although some school surveys are said to be anonymous, it is there probably is some cryptographic way to retrieve a user's identify from a response and what you say could still be potentially traced back to you.
ckona0130

Spying on Students: School-Issued Devices and Student Privacy | Electronic Frontier Foundation - 0 views

  •  
    Even when college students use computer or electronic devices that belong to the school, any websites they visit, links they download, and videos they watch can offer behavioral information and data that is directly tied to that student's profile, and thus them too. It's important to be aware of this fact, and realize that whatever privacy you think that Mac in the back of the library offers you is in reality nonexistent. That Mac is uploading your data to the Cloud every minute you use it, and it's important to track and understand that your online information is being sent, without your consent, to other entities. So, be careful with what you search up next time.
1 - 18 of 18
Showing 20 items per page