Skip to main content

Home/ Groups/ Math 1111: Cryptography
masonagrow

Everyday Encryption - 1 views

  •  
    Gives information on several uses of crypto in life; provides some information on multiple uses
ftiet21

Modern Cryptography: Theory and Practice - 0 views

  •  
    E-text for a book detailing the fundamentals behind modern cryptography and how they are applied in practice. Lots of detailed information about various underlying theorems and mathematical properties and how they work, as well as various encryption techniques and cryptographic processes.
colleengill

Tips for Downloading Safe Apps | Norton - 1 views

  •  
    This website provides a few instructions on how to increase your safety downloading apps from the app store. It also provides links to other websites which show the safety score of an app. Since most people (including myself) don't think twice about downloading any app that looks interesting, this is useful information to have.
charlotteneuhoff

Know how much of your personal info is online? Google's new tool will tell you - 1 views

  •  
    This article provides information for how to make your personal information more private through Google. While Google does have access to a large amount of your information, this allows you to better control what is shared online.
estrutt

What Is SSL (Secure Sockets Layer)? | DigiCert.com - 2 views

  •  
    This website discusses procedure and purpose of encrypting sensitive data over the internet. SSL is a protocol which "determines variables of the encryption" being used to protect information from first names to credit card numbers. This website also tells you how to determine whether or not a website is secure or if your information is vulnerable. In addition, there is another page that delves into the mathematics and actual cryptography procedures behind online encryption like RSA and ECC.
Derek Bruff

Security or Surveillance (with image, tweets) · derekbruff · Storify - 0 views

  •  
    And here's the collection of tweets from me, @maddagaska, and Cory Doctor about the choice of terms "security" and "surveillance."
Derek Bruff

How a mathematician teaches "Little Brother" to a first-year seminar / Boing Boing - 0 views

  •  
    Here's Cory Doctorow's blog post about my blog post about our debate mapping activity.
masonagrow

General School Security Measures - 0 views

  •  
    Basic list of school security measures taken from NCES government website
Abbey Roberts

Edward Snowden | US news | The Guardian - 0 views

  •  
    "Latest on the computer analyst whistleblower who provided the Guardian with top-secret NSA documents leading to revelations about US surveillance on phone and internet communications" - compilation of news sources on Edward Snowden
Derek Bruff

cryptocat - 1 views

  •  
    "Cryptocat allows you to instantly set up secure conversations. It's an open source encrypted, private alternative to invasive services such as Facebook chat."
  •  
    "Cryptocat allows you to instantly set up secure conversations. It's an open source encrypted, private alternative to invasive services such as Facebook chat."
Derek Bruff

What's in a Boarding Pass Barcode? A Lot - Krebs on Security - 0 views

  •  
    "More worrisome, Cory now had the ability to view all future flights tied to that frequent flyer account, change seats for the ticketed passengers, and even cancel any future flights."
  •  
    "More worrisome, Cory now had the ability to view all future flights tied to that frequent flyer account, change seats for the ticketed passengers, and even cancel any future flights."
Derek Bruff

Threat-Assessment Teams Face Complex Task of Judging Risk - The Chronicle of Higher Edu... - 0 views

  •  
    No mention of data mining in this piece from 2012, but still a useful follow-up to the Michael Morris essay on keeping college campuses safe.
colleengill

How NSA and GCHQ spied on the Cold War world - BBC News - 0 views

  •  
    This article describes how, during the Cold War, the major distributor of cryptography machines (Crypto AG) worked with the NSA. This professional relationship provided the NSA with shortcuts on how to break ciphers created from the different machines. Also, Crypto AG was revealed as not having given the most up to date models to all countries, probably through deception. This raises the question of morality involving basic warfare. How is it moral for this supposedly trusted third party company to have special allegiances with the United States?Would the United States have the same opinion on this actions morality if they were the ones being sold out of date equipment? Or if one of their opponents had shortcuts?
saraatsai

Video surveillance in public schools - 2 views

shared by saraatsai on 21 Oct 15 - No Cached
  •  
    Discusses the growth and legal rights of video surveillance in schools. This article contains multiple instances where court cases ruled that there was not a reasonable expectation of privacy.
  •  
    by Christy Hickman, staff counsel Members often ask whether a school district violates their right to privacy by using video camera surveillance or video recordings of evaluative observations. It is easy to understand the growth of video surveillance in schools, especially with the onslaught of on-campus criminal behavior and the horrendous episodes of violence that we hear of all too frequently.
Abbey Roberts

arphid / Boing Boing - 0 views

  •  
    Cory Doctorow's blog posts concerning RFID tags and arphid technology; especially several posts on its usage in schools
« First ‹ Previous 621 - 640 Next › Last »
Showing 20 items per page