Skip to main content

Home/ Math 1111: Cryptography/ Group items matching "encryption security privacy" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
giordas

Online Privacy: Technical, Political, or Both? When it comes to Privacy, there's solidarity in numbers - News - The Austin Chronicle - 1 views

  •  
    What really stood out to me about this article was that they said the NSA actually pays more attention to those people who use encryption. So, in order to protect ourselves and also avoid prying NSA eyes, we should encourage people to stand in solidarity with encryption. I thought this was really interesting because I always thought that encryption would undoubtedly make everything more secure, but here they're saying that it actually attracts attention (which isn't necessarily a good thing).
  •  
    When I was a kid, I read an issue of Superman in which he faces Batman's villain, the Joker. At one point, the Joker tells Superman that he's kidnapped all of Superman's best friends (Lois Lane, Jimmy Olsen, and so on) and locked them inside lead-lined caskets, hidden throughout Metropolis. Since the caskets are air-tight, they only have an hour to live, and Superman can't find them because his x-ray vision can't see through lead! That's what the Joker said. Actually, since Superman can't see through lead, those caskets *stood out* when he scanned the city with his x-ray vision, and he rescued all his friends in short order. Same basic idea.
ftiet21

After Paris, What We're Getting Wrong In 'Privacy vs. Privacy' Debate - 5 views

  •  
    This article discusses the faults in former deputy director of the CIA Michael Morell's statement that the use of encrypted apps made it difficult to stop terrorists. Claims that encrypted communications put them out of reach was false - there had been no change in al Qaeda tactics. Also, author Howard points out that there isn't a clear dichotomy between privacy and privacy.
j_olsen

The Privacy Blog: Privacy, Privacy, Cryptography, and Anonymity - 4 views

  •  
    This blog is all about privacy, as the title suggests. The majority of the blog posts use actual examples, such as the Ashley Madison hack, in order to reveal important cyberprivacy lessons. One particular blog post explains how Passages, a secure virtual browser, is a lot like hand sanitizer for the web. I thought that this blog was particularly interesting because it had a lot of relevant, unique examples about privacy and cryptography in the modern world.
hamzapatel123

Unbreakable encryption comes to the U.S. - 2 views

  •  
    Although it doesn't directly deal with online privacy, I thought this was really cool. It is a new form of privacy involving sending a beam of two photons with only one of them acting as a "key." It could very well be the new method of securing privacy.
j_olsen

What happened when a parent fought for his kid's privacy at an all-Chromebook school - 1 views

  •  
    This article, written by the one and only Cory Doctorow, highlights the privacy concerns associated with Google Chromebooks. More and more schools are issuing its students Chromebooks, which exfiltrate all data to Google data-centers and infringe one's privacy. This site also includes other interesting articles related to privacy and privacy.
lvanryzin

These Harvard And MIT Kids Say They've Made NSA-Proof Email - 1 views

  •  
    These people were prompted to create a easy, secure email service. They incorporated in Switzerland as it has much more stringent privacy laws than we have in America.
  •  
    Great find! At some point this semester, we're all going to learn how to use encrypted email. We might try out a few different systems, including ProtonMail, and compare them.
colleengill

Do governments need access to encrypted messages to thwart terrorism? | PBS NewsHour - 4 views

  •  
    PBS interview showing two sides of the security vs. security debate as it applies to the recent attacks in Paris, and all current issues of terrorism and a lack of information even with warrants. Gives a lot of good quotes from reputable sources that can be used to strengthen and support arguments.
mariannas

Review: Blackphone Trades Some Convenience for Security - 1 views

  •  
    This article is about a smartphone that's designed specifically to help you keep your personal information secure--it lets you easily encrypt your calls and texts and search the internet privately. There's also a video about ways to encrypt your email.
  •  
    Nice find. I'm reminded of DuckDuckGo, https://duckduckgo.com/, the search engine that doesn't track you. At all.
Abbey Roberts

Mental cryptography and good passwords - 4 views

  •  
    This article gives a method for generating secure yet easy to remember passwords for online accounts, using encryption and modular arithmetic (!). It is an interesting use of encryption in everyday life for something we all have, password-protected internet accounts. If you click through to the computer science category, you can find other posts on cryptography, encryption, and encryption.
Derek Bruff

cryptocat - 1 views

  •  
    "Cryptocat allows you to instantly set up secure conversations. It's an open source encrypted, private alternative to invasive services such as Facebook chat."
  •  
    "Cryptocat allows you to instantly set up secure conversations. It's an open source encrypted, private alternative to invasive services such as Facebook chat."
stone_edwards

Bypassing encryption: 'Lawful hacking' is the next frontier of law enforcement technology - 1 views

  •  
    Good article about lawful deciphers for "better" security
Derek Bruff

Encryption Has Foiled Wiretaps for First Time Ever, Feds Say | Threat Level | Wired.com - 0 views

  •  
    First official confirmation that strong encryption is foiling government wiretaps.
Derek Bruff

Forget Apple vs. the FBI: WhatsApp Just Switched on Encryption for a Billion People | WIRED - 1 views

  •  
    "With end-to-end encryption in place, not even WhatsApp's employees can read the data that's sent across its network. In other words, WhatsApp has no way of complying with a court order demanding access to the content of any message, phone call, photo, or video traveling through its service. Like Apple, WhatsApp is, in practice, stonewalling the federal government, but it's doing so on a larger front-one that spans roughly a billion devices."
krschroeder9

The Importance of Understanding Encryption in CyberEncryption - 0 views

  •  
    Any sensitive information that could be accessed by hackers should be encrypted, especially when communicating over wireless networks. Make sure to keep your private key confidential.
1 - 20 of 42 Next › Last »
Showing 20 items per page