Skip to main content

Home/ Math 1111: Cryptography/ Group items matching "secrets" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
deeekayy

Why Whistleblower Edward Snowden Revealed Secret U.S. Information - The Daily Vox - 0 views

  •  
    Taking care of yourself nowadays extends out to the Internet world. So take care of yourself. Whatever that means for you and your circumstances.
andrewhaygood97

Google Is Powering A New Search Engine That Digs Internet's Dirty Secrets - 1 views

  •  
    I think it's pretty interesting that one of the world's largest internet corporations is going to find the security vulnerabilities of our modems and routers. Will they just be helping us fix them, or using the errors for their own gain?
  •  
    I think it's pretty interesting that one of the world's largest internet corporations is going to find the security vulnerabilities of our modems and routers. Will they just be helping us fix them, or using the errors for their own gain?
Abbey Roberts

Edward Snowden | US news | The Guardian - 0 views

  •  
    "Latest on the computer analyst whistleblower who provided the Guardian with top-secret NSA documents leading to revelations about US surveillance on phone and internet communications" - compilation of news sources on Edward Snowden
saraatsai

Crypto modernization transforms military communications - 1 views

  •  
    Embeddable cryptographic processors are enabling a host of new defense communications applications, such as smartphones and tablet computers for tactical use on the front lines, but should soldiers be using the same object for both secure and insecure communications? Or does this create a conflict of interests?
  •  
    This is an article about the advancement of technology and how it has affected cryptography and secret-keeping during wartime.
charlotteneuhoff

Military Embedded Systems - 0 views

  •  
    This resource provides access to articles, news, and blog posts regarding military embedded systems, often using cryptography. One article referenced the cryptography used to secure "Data at Rest" and the length at which this information should be held secure. Is it ethical to keep this information from the public when safety is no longer a concern? At what point should these well-kept secrets become accessible?
kims46

Kerckhoffs' history and principles of military cryptography, translated and adnotated. | Contravex: A blog by Pete Dushenski - 1 views

  •  
    This is a cryptography blogger's translation of Kerckhoff's article about military cryptography. He denotes that secret methods of communication are limited to higher officers due to potential leakage; but by limiting cryptographic use, are they potentially putting at risk the safety of lesser positions in order to keep the secrecy of their cipher methods? Is this just the inevitable nature of cryptography in general?
Abbey Roberts

Can you keep a secret? The Bletchley codebreakers 70 years on - Telegraph - 4 views

  •  
    Interesting article describing the people who worked at Bletchley Park (UK) during WWII and the secrecy act that kept them silent. The article makes compelling comparisons to people today like Edward Snowden, who are legally bound to secrecy but ignore it. What are the ethical implications of being asked to keep military secrets? Of sharing military secrets? How do the differences between today's generation and the WWII generation affect how these ethics are viewed?
Ling Shi

Advanced Military Cryptography - 3 views

  •  
    A pre-WWII NSA document on advanced military cryptography which was declassified in 2014. This leads to the question of what impact disclosing these military secrets has on encryption and decryption of messages in future wars, and also why were these documents released in the first place.
rmusicant

Journey Into Cryptography - 1 views

  •  
    How have humans protected their secret messages through history? What has changed today?
Abbey Roberts

IBM Security TV Commercial, 'Threat Intelligence and Behavioral Analytics' - iSpot.tv - 0 views

  •  
    Interesting perspective how it's only in the news if someone's secrets are compromised, but not if their secrets are actually kept secret
masonagrow

A Brief History of Cryptography | Red Hat Security - 0 views

  •  
    Cryptology is a young science. Though it has been used for thousands of years to hide secret messages, systematic study of cryptology as a science (and perhaps an art) just started around one hundr...
  •  
    Cryptology is a young science. Though it has been used for thousands of years to hide secret messages, systematic study of cryptology as a science (and perhaps an art) just started around one hundr...
mariannas

They Cracked This 250-Year-Old Code, and Found a Secret Society Inside | WIRED - 1 views

  •  
    I'm just going to resubmit the bookmark directly to this page so I'll be sure it ends up publicly in the group. This wasn't mentioned in Singh chapter 2, but it was created around the time period discussed in the chapter. (Plus, it's one of my favorite articles I've read in Wired so I really wanted to use it as a bookmark.) The article discusses the strategies used to break this cipher, some of which, such as frequency analysis, we have talked about in class. It's also just fascinating to read about the Oculists and their history.
Derek Bruff

GCHQ taps fibre-optic cables for secret access to world's communications | UK news | guardian.co.uk - 0 views

  •  
    Hey, look, the British are reading our emails, too...
Derek Bruff

U.S. intelligence mining data from nine U.S. Internet companies in broad secret program - The Washington Post - 0 views

  •  
    Has the government been reading your email, Facebook posts, tweets, etc.? Yes, yes they have.
1 - 20 of 29 Next ›
Showing 20 items per page