Skip to main content

Home/ Groups/ Math 1111: Cryptography
Derek Bruff

untitled - 0 views

  •  
    Ladar Levison and William Binney each paid the price for a moral stand against the U.S. government. And your digital privacy is slightly better for it.
mariannas

How to Access the BBC iPlayer (and TV Like Doctor Who) from Outside the U.K. - 0 views

  •  
    Non-U.S. users frequently encounter the annoyance of geo-blocked content when trying to access popular sites like Hulu, but every now and then we feel the burn in the States, too. Reader hengehog details how to access BBC's iPlayer from outside the U.K.
mariannas

Online Shopping | StaySafeOnline.org - 0 views

  •  
    Keep a paper trail: Print and save records of your online transactions, including the product description, price, online receipt, terms of the sale, and copies of any email exchange with the seller. Read your credit card statements as soon as you get them to make sure there aren't any unauthorized charges.
whitnese

How Secure Is My Password? - 1 views

  •  
    This site could be stealing your password... it's not, but it easily could be. Be careful where you type your password.
eiyanrc

WW II Codes and Ciphers - 2 views

  •  
    This is a website introducing codes and ciphers in WW II by Tony Sale. Given this specific war context, is there really a guideline of what an action is ethical and what is not in terms of cryptoanalysis? Would an action be ethical whenever the majority's well-being is satisfied, or there's a line that should not be crossed?
Derek Bruff

Art that shows us what mass surveillance actually looks like | Fusion - 0 views

  •  
    Quote: What you are looking at is one of the many undersea cables that carries inside it, to put it simply, the magic of the Internet. This particular cable, which runs aground on the coast of Florida, has been tapped by the NSA according to Paglen's research. Paglen, an artist who has been documenting the physical footprint of surveillance for years, got scuba-certified in order to go diving "at several locations off the coast of Florida," he says, to find and photograph the cables.
Derek Bruff

PETA sues to give monkey the copyright of selfie photos | abc7.com - 1 views

  •  
    The US Copyright Office has issued a statement saying that it would only issue copyrights to humans. PETA objects to this, having just filed a suit to grant that macaque monkey the copyright for the selfies it took back in 2011. The struggle is real.
Derek Bruff

Andy Greenberg (@a_greenberg) | Twitter - 0 views

  •  
    Andy Greenberg covers cybersecurity and hacking for Wired magazine.
Derek Bruff

Nicole Perlroth (@nicoleperlroth) | Twitter - 0 views

  •  
    Nicole Perlroth covers cybersecurity for the New York Times.
Derek Bruff

Kashmir Hill (@kashhill) | Twitter - 0 views

  •  
    Kashmir Hill is a journalist who covers digital privacy, among other topics.
Derek Bruff

President Obama on Twitter: "Cool clock, Ahmed. Want to bring it to the White House? We... - 0 views

  •  
    About the same time we talked about the Ahmed Mohamed story during class yesterday, this happened.
ftiet21

ellipticnews - 1 views

  •  
    A blog, by multiple authors, about new results in elliptic curve cryptography.
parker718

Cryptography | Red Hat Security - 0 views

  •  
    A security blog created by a multinational software company.
Derek Bruff

Yet another pre-installed spyware app discovered on Lenovo computers / Boing Boing - 1 views

  •  
    "A factory refurbished Thinkpad shipped with Windows 7 and a scheduler app that ran once a day, collecting usage data about what you do with your computer and exfiltrating it to an analytics company. "
Ling Shi

Advanced Military Cryptography - 3 views

  •  
    A pre-WWII NSA document on advanced military cryptography which was declassified in 2014. This leads to the question of what impact disclosing these military secrets has on encryption and decryption of messages in future wars, and also why were these documents released in the first place.
saraatsai

Crypto modernization transforms military communications - 1 views

  •  
    Embeddable cryptographic processors are enabling a host of new defense communications applications, such as smartphones and tablet computers for tactical use on the front lines, but should soldiers be using the same object for both secure and insecure communications? Or does this create a conflict of interests?
  •  
    This is an article about the advancement of technology and how it has affected cryptography and secret-keeping during wartime.
« First ‹ Previous 741 - 760 Next › Last »
Showing 20 items per page