E-text for a book detailing the fundamentals behind modern cryptography and how they are applied in practice. Lots of detailed information about various underlying theorems and mathematical properties and how they work, as well as various encryption techniques and cryptographic processes.
This website provides a few instructions on how to increase your safety downloading apps from the app store. It also provides links to other websites which show the safety score of an app. Since most people (including myself) don't think twice about downloading any app that looks interesting, this is useful information to have.
This article provides information for how to make your personal information more private through Google. While Google does have access to a large amount of your information, this allows you to better control what is shared online.
This website discusses procedure and purpose of encrypting sensitive data over the internet. SSL is a protocol which "determines variables of the encryption" being used to protect information from first names to credit card numbers. This website also tells you how to determine whether or not a website is secure or if your information is vulnerable. In addition, there is another page that delves into the mathematics and actual cryptography procedures behind online encryption like RSA and ECC.
"Latest on the computer analyst whistleblower who provided the Guardian with top-secret NSA documents leading to revelations about US surveillance on phone and internet communications" - compilation of news sources on Edward Snowden
"Cryptocat allows you to instantly set up secure conversations. It's an open source encrypted, private alternative to invasive services such as Facebook chat."
"Cryptocat allows you to instantly set up secure conversations. It's an open source encrypted, private alternative to invasive services such as Facebook chat."
"More worrisome, Cory now had the ability to view all future flights tied to that frequent flyer account, change seats for the ticketed passengers, and even cancel any future flights."
"More worrisome, Cory now had the ability to view all future flights tied to that frequent flyer account, change seats for the ticketed passengers, and even cancel any future flights."
This article describes how, during the Cold War, the major distributor of cryptography machines (Crypto AG) worked with the NSA. This professional relationship provided the NSA with shortcuts on how to break ciphers created from the different machines. Also, Crypto AG was revealed as not having given the most up to date models to all countries, probably through deception. This raises the question of morality involving basic warfare. How is it moral for this supposedly trusted third party company to have special allegiances with the United States?Would the United States have the same opinion on this actions morality if they were the ones being sold out of date equipment? Or if one of their opponents had shortcuts?
Discusses the growth and legal rights of video surveillance in schools. This article contains multiple instances where court cases ruled that there was not a reasonable expectation of privacy.
by Christy Hickman, staff counsel Members often ask whether a school district violates their right to privacy by using video camera surveillance or video recordings of evaluative observations. It is easy to understand the growth of video surveillance in schools, especially with the onslaught of on-campus criminal behavior and the horrendous episodes of violence that we hear of all too frequently.