Skip to main content

Home/ Math 1111: Cryptography/ Group items matching "security privacy" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Derek Bruff

Security In A Box | Tools and tactics for your digital Security - 2 views

shared by Derek Bruff on 12 Nov 14 - No Cached
    Security in-a-box is a collection of guides and free tools to secure your computer, protect your information or maintain the Security of your Internet communication. It was created to meet the digital Security and Security needs of advocates and human rights defenders.

The government has protected your security and security better than you think - 3 views

    This article goes over America's security and security trade-off, especially after 9/11. The author argues that we have done an excellent job keeping a balance between these two approaches and, while actions such as the Paris attack may make us question if we should add more security, there is no reason to take away the security we have as since 9/11 we have been doing a good job of valuing both of these aspects.

The Privacy Blog: Privacy, Privacy, Cryptography, and Anonymity - 4 views

    This blog is all about privacy, as the title suggests. The majority of the blog posts use actual examples, such as the Ashley Madison hack, in order to reveal important cyberprivacy lessons. One particular blog post explains how Passages, a secure virtual browser, is a lot like hand sanitizer for the web. I thought that this blog was particularly interesting because it had a lot of relevant, unique examples about privacy and cryptography in the modern world.
Abbey Roberts

What Americans think about NSA surveillance, national security and security - 4 views

    This is the results of a Pew Research survey in May (of 2015) regarding Americans' opinions of the NSA, surveillance, national security, etc. This could be useful in the security vs. security paper, to look at the public opinion on these issues.

What happened when a parent fought for his kid's privacy at an all-Chromebook school - 1 views

    This article, written by the one and only Cory Doctorow, highlights the privacy concerns associated with Google Chromebooks. More and more schools are issuing its students Chromebooks, which exfiltrate all data to Google data-centers and infringe one's privacy. This site also includes other interesting articles related to privacy and privacy.

After Paris, What We're Getting Wrong In 'Privacy vs. Privacy' Debate - 5 views

    This article discusses the faults in former deputy director of the CIA Michael Morell's statement that the use of encrypted apps made it difficult to stop terrorists. Claims that encrypted communications put them out of reach was false - there had been no change in al Qaeda tactics. Also, author Howard points out that there isn't a clear dichotomy between privacy and privacy.

These Harvard And MIT Kids Say They've Made NSA-Proof Email - 1 views

    These people were prompted to create a easy, secure email service. They incorporated in Switzerland as it has much more stringent privacy laws than we have in America.
    Great find! At some point this semester, we're all going to learn how to use encrypted email. We might try out a few different systems, including ProtonMail, and compare them.
Derek Bruff

The Learning Analytics Landscape: Tension Between Student Privacy and the Process of Data Mining - Carnegie Foundation for the Advancement of Teaching - 1 views

    Here's an example of surveillance vs. privacy that doesn't involve privacy. Instead, the goal is student learning.

Social Networking Privacy: How to be Safe, Secure and Social - 2 views

    This website provides ample information on not only the ins and outs of public information but it also gives helpful suggestions on how to keep things private and why. One interesting suggestion discussed the risks of posting your birthday as identity thieves can predict your Social Security number based off of your place of birth and birthdate.

Online Privacy: Technical, Political, or Both? When it comes to encryption, there's solidarity in numbers - News - The Austin Chronicle - 1 views

    What really stood out to me about this article was that they said the NSA actually pays more attention to those people who use encryption. So, in order to protect ourselves and also avoid prying NSA eyes, we should encourage people to stand in solidarity with encryption. I thought this was really interesting because I always thought that encryption would undoubtedly make everything more secure, but here they're saying that it actually attracts attention (which isn't necessarily a good thing).
    When I was a kid, I read an issue of Superman in which he faces Batman's villain, the Joker. At one point, the Joker tells Superman that he's kidnapped all of Superman's best friends (Lois Lane, Jimmy Olsen, and so on) and locked them inside lead-lined caskets, hidden throughout Metropolis. Since the caskets are air-tight, they only have an hour to live, and Superman can't find them because his x-ray vision can't see through lead! That's what the Joker said. Actually, since Superman can't see through lead, those caskets *stood out* when he scanned the city with his x-ray vision, and he rescued all his friends in short order. Same basic idea.
Annie Vreeland

Why "security" keeps winning out over security - - 0 views

    Discusses how the security side wins, however unfairly because many reasons are often flawed. 

Security Cameras In School: Protective Or Invasive? - 1 views

    More and more schools are installing security cameras in halls, classrooms and buses. Administrators say it helps protect students and staff, but some argue the practice is invasive. Guests discuss the use of surveillance cameras in schools and where to draw the line between safety and security.
1 - 20 of 159 Next › Last »
Showing 20 items per page