Skip to main content

Home/ Groups/ Math 1111: Cryptography
parker718

Social Networking Privacy: How to be Safe, Secure and Social - 2 views

  •  
    This website provides ample information on not only the ins and outs of public information but it also gives helpful suggestions on how to keep things private and why. One interesting suggestion discussed the risks of posting your birthday as identity thieves can predict your Social Security number based off of your place of birth and birthdate.
Abbey Roberts

Mental cryptography and good passwords - 4 views

  •  
    This article gives a method for generating secure yet easy to remember passwords for online accounts, using encryption and modular arithmetic (!). It is an interesting use of encryption in everyday life for something we all have, password-protected internet accounts. If you click through to the computer science category, you can find other posts on cryptography, encryption, and privacy.
rmusicant

Credit Card Tokenization 101 - And Why it's Better than Encryption - 1 views

  •  
    This article explains a way that credit card information is stored safely without encryption. Tokenization is a completely different way of securing credit card information than encryption because it completely removes the credit card information and replaces it with a "token" that cannot be retraced to retrieve the credit card information. Encryption has the credit card information hidden somewhere, but tokenization erases it completely which makes it very secure.
kims46

Everyday Uses of Encryption -CodeIdol - 1 views

  •  
    This source gives a variety of examples in which encryption is used for security everyday, like ATM machines and DVD players. It seems like this is a pretty useful list because it goes into sufficient enough depth to describing the different examples, and specifically explains how encryption comes into play - without making it too long or hard to understand.
Ling Shi

Cryptography in Network Security - 2 views

  •  
    This is the e-text of a book that discusses online network encryption and application. The chapters cover various encryption methods for the transfer of data online, as well as the application of wireless, email, IP network security
j_olsen

The Privacy Blog: Privacy, Security, Cryptography, and Anonymity - 4 views

  •  
    This blog is all about privacy, as the title suggests. The majority of the blog posts use actual examples, such as the Ashley Madison hack, in order to reveal important cybersecurity lessons. One particular blog post explains how Passages, a secure virtual browser, is a lot like hand sanitizer for the web. I thought that this blog was particularly interesting because it had a lot of relevant, unique examples about privacy and cryptography in the modern world.
saraatsai

Cryptography in Everyday Life - 3 views

  •  
    This page is from the University of Texas, and it describes different aspects of cryptography in everyday life. For instance, it explains how cryptography plays a large role in authentication, digital money, and time stamping. I liked this webpage because it had a lot of different examples with clear explanations.
Derek Bruff

Timothy Boostrom is Not Real - Medium - 0 views

  •  
    Here's a case study for someone's practical crypto paper...
Derek Bruff

5 Gmail lessons from Petraeus affair - POLITICO - 1 views

  •  
    I got the General Petraeus story a bit wrong. He and his friend weren't using Google docs to communicate, they used a shared Gmail account. They would sometimes draft, but not send emails, as an extra measure of security, but, as this article points out, that doesn't work.
Derek Bruff

The Learning Analytics Landscape: Tension Between Student Privacy and the Process of Da... - 1 views

  •  
    Here's an example of surveillance vs. privacy that doesn't involve security. Instead, the goal is student learning.
Abbey Roberts

FCC: We Can't Force Google and Facebook to Stop Tracking You Online - NBC News - 1 views

  •  
    The FCC decided Friday that it can't force Internet companies like Google, Facebook and ad providers from tracking users online.
Derek Bruff

xkcd: Alice and Bob - 0 views

  •  
    "Alice is the attacker, not me." - Eve
yuthraju

The New Sandy Hook Elementary School Is All About Invisible Security - 1 views

  •  
    When the 2016 school year starts, students and faculty will return to Sandy Hook Elementary School for the first time since a gunman killed 20 students and six adults. They will return to a new building and landscape thoughtfully, but subtly, outfitted with security measures designed by local architecture firm Svigals + Partners.
Derek Bruff

Security or Surveillance (with image, tweets) · derekbruff · Storify - 0 views

  •  
    And here's the collection of tweets from me, @maddagaska, and Cory Doctor about the choice of terms "security" and "surveillance."
Derek Bruff

How a mathematician teaches "Little Brother" to a first-year seminar / Boing Boing - 0 views

  •  
    Here's Cory Doctorow's blog post about my blog post about our debate mapping activity.
j_olsen

Technology Turns to Tracking People Offline - 0 views

  •  
    Some retailers use Euclid Analytics, which uses the Wi-Fi antennas inside stores to see how many people are coming into a store, how long they stay and even which aisles they walk. It does this by using signals from each smartphone that comes near the store.
rmusicant

Security Cameras In School: Protective Or Invasive? - 1 views

  •  
    More and more schools are installing security cameras in halls, classrooms and buses. Administrators say it helps protect students and staff, but some argue the practice is invasive. Guests discuss the use of surveillance cameras in schools and where to draw the line between safety and privacy.
masonagrow

Don't Let Schools Chip Your Kids | American Civil Liberties Union - 2 views

  •  
    This article discusses the use of RFIDs to track students, and the benefits of this practice, especially with small children.
ftiet21

Class of 1984: surveillance tech creeps into the classroom (Wired UK) - 0 views

  •  
    Video camera surveillance, Biometric data collection (fingerprints), RFID Tags (monitors movement to within centimeters), Galvanic Skin Response Bracelet (monitors a child's physiological responses)
« First ‹ Previous 441 - 460 of 793 Next › Last »
Showing 20 items per page