Skip to main content

Home/ Groups/ Math 1111: Cryptography
Derek Bruff

Girl Talk ­- All Day - Mashupbreakdown - YouTube - 0 views

  •  
    And here's that visualization of Girl Talk's 2010 album, All Day, that I showed in class.
Derek Bruff

Steal This Hook? Girl Talk Flouts Copyright Law - NYTimes.com - 0 views

  •  
    Here's a 2008 New York Times piece on Girl Talk. Whether or not his fair use argument would hold up in court, it seems clear that music labels aren't particularly interested in suing him for his all-sample approach to music creation.
Abbey Roberts

IBM Security TV Commercial, 'Threat Intelligence and Behavioral Analytics' - iSpot.tv - 0 views

  •  
    Interesting perspective how it's only in the news if someone's secrets are compromised, but not if their secrets are actually kept secret
Derek Bruff

Another Salvo in the Second Crypto War (of Words) - Schneier on Security - 0 views

  •  
    And here's Bruce Schneier on that story about Apple's encryption policies thwarting justice. If you read the first piece, you should also read this one.
Derek Bruff

NSA Plans for a Post-Quantum World - Schneier on Security - 0 views

  •  
    Here's a recent piece by security expert Bruce Schneier on quantum computing, which is different than quantum cryptography. (I conflated the two during class today.) Quantum computing is very fast computing that could be used to quickly break modern encryption schemes. Quantum cryptography involves sending messages that can't be read, since "looking" at them changes the message. Schneier offers some conjectures about where the NSA is with regard to both technologies.
estrutt

Extreme cryptography paves way to personalized medicine - 0 views

  •  
    Encrypted analysis of data in the cloud would allow secure access to sensitive information.
  •  
    Homomorphic encryption is pretty amazing. What they're proposing in this article is a bit like having a computer analyze an encrypted novel and determining which sentences were grammatically incorrect--without even knowing what the plaintext sentences were!
colleengill

UK Match.com site hit by malicious adverts - BBC News - 0 views

  •  
    Malicious adverts have been found on the UK version of the Match.com dating website. Anyone caught out by the booby-trapped ads could fall victim to ransomware, said security company Malwarebytes, which spotted the cyber-threat. The malicious ads appeared on pages of the dating site via an ad network that pipes content to Match and many other places.
Derek Bruff

99% Invisible | A Tiny Radio Show About Design with Roman Mars - 0 views

  •  
    This 99% Invisible podcast episode focuses on locks and lockpicking. I think you'll find some nice parallels with cryptography, especially around Kerckhoff's Principle and the idea of not knowing if your security system has been broken.
eiyanrc

This tool boosts your privacy by opening your WI-FI to strangers - 0 views

  •  
    Getty In an age of surveillance anxiety, the notion of leaving your Wi-Fi network open and unprotected seems dangerously naive. But one group of activists says it can help you open up your wireless internet and not only maintain your privacy, but actually increase it in the process. At the Hackers on Planet Earth conference…
rmusicant

Report -- FBI investigating St. Louis Cardinals for hacking Houston Astros' database - 2 views

  •  
    The St. Louis Cardinals are being investigated by the FBI for allegedly hacking into networks and trying to steal information about the Houston Astros, The New York Times reported Tuesday.
ftiet21

China to launch hack-proof quantum communication network in 2016 - 2 views

  •  
    China will complete and put into service the world's longest quantum communication network stretching 2,000km from Beijing to Shanghai by 2016. By 2030, the Chinese network would be extended worldwide, Xinhua reported.
masonagrow

A Brief History of Cryptography | Red Hat Security - 0 views

  •  
    Cryptology is a young science. Though it has been used for thousands of years to hide secret messages, systematic study of cryptology as a science (and perhaps an art) just started around one hundr...
  •  
    Cryptology is a young science. Though it has been used for thousands of years to hide secret messages, systematic study of cryptology as a science (and perhaps an art) just started around one hundr...
Abbey Roberts

Dying cipher suites are stinking up TLS with man-in-the-middle vulns - 0 views

  •  
    Example of how improving technology requires new encryption that hasn't yet been cracked
Abbey Roberts

Lincoln and the cipher operators - 1 views

  •  
    Describes the personal relationship between President Abraham Lincoln and those who encoded military telegraph messages during the Civil War
« First ‹ Previous 521 - 540 of 791 Next › Last »
Showing 20 items per page