Skip to main content

Home/ Groups/ Math 1111: Cryptography
estrutt

The Domestic Surveillance Directorate - 1 views

  •  
    "The Domestic Surveillance Directorate - If you have nothing to hide, you have nothing to fear." Should the government have such free reign over our personal information, or should we be able to keep our data encrypted and hidden from the government to respect our personal rights?
charlotteneuhoff

Military Embedded Systems - 0 views

  •  
    This resource provides access to articles, news, and blog posts regarding military embedded systems, often using cryptography. One article referenced the cryptography used to secure "Data at Rest" and the length at which this information should be held secure. Is it ethical to keep this information from the public when safety is no longer a concern? At what point should these well-kept secrets become accessible?
kims46

Kerckhoffs' history and principles of military cryptography, translated and adnotated. ... - 1 views

  •  
    This is a cryptography blogger's translation of Kerckhoff's article about military cryptography. He denotes that secret methods of communication are limited to higher officers due to potential leakage; but by limiting cryptographic use, are they potentially putting at risk the safety of lesser positions in order to keep the secrecy of their cipher methods? Is this just the inevitable nature of cryptography in general?
yuthraju

Military Cryptanalysis- NSA/CSS - 3 views

  •  
    Now that the NSA has declassified this information about cryptanalysis, either they can no longer utilize these methods of cryptography, or must do so with caution, knowing that anyone has the resources to crack them. Was it ethical of the NSA to release this information, especially if other countries still use these methods to create ciphers?
j_olsen

Zimmermann Telegram - illegal UK interception of US cable in 1917 to aid war effort - 1 views

  •  
    This blog has information about military cryptography and privacy in general, including this post about the Zimmermann Telegram. Is it ethical to lie to an ally if it is in their best interest? What are the ethics behind spying on one's allies? Do ethics hinder one's ability to win a war, and if so, should ethics be disregarded in times of war? Another interesting post examines how Snowden should be viewed as a patriot, not a traitor. This made me question where one's loyalty should remain- to the government or to the people?
ftiet21

Christos military and intelligence corner - 1 views

  •  
    This blog contains vast amounts of information dealing with military cryptography, both in the past and the present. One of the recent articles discussed the morality of utilizing military level cryptography to ensure complete surveillance of civilians, and whether or not it should be allowed.
Abbey Roberts

Can you keep a secret? The Bletchley codebreakers 70 years on - Telegraph - 4 views

  •  
    Interesting article describing the people who worked at Bletchley Park (UK) during WWII and the secrecy act that kept them silent. The article makes compelling comparisons to people today like Edward Snowden, who are legally bound to secrecy but ignore it. What are the ethical implications of being asked to keep military secrets? Of sharing military secrets? How do the differences between today's generation and the WWII generation affect how these ethics are viewed?
andrewhaygood97

Military encryption's going open -- Defense Systems - 2 views

  •  
    This makes me wonder how ethical it is for the NSA to be so heavily involved in cryptography internationally. Are they building a backdoor into these crytographic systems? If so, how ethical could that be?
Ling Shi

Advanced Military Cryptography - 3 views

  •  
    A pre-WWII NSA document on advanced military cryptography which was declassified in 2014. This leads to the question of what impact disclosing these military secrets has on encryption and decryption of messages in future wars, and also why were these documents released in the first place.
Derek Bruff

Yet another pre-installed spyware app discovered on Lenovo computers / Boing Boing - 1 views

  •  
    "A factory refurbished Thinkpad shipped with Windows 7 and a scheduler app that ran once a day, collecting usage data about what you do with your computer and exfiltrating it to an analytics company. "
Derek Bruff

Art that shows us what mass surveillance actually looks like | Fusion - 0 views

  •  
    Quote: What you are looking at is one of the many undersea cables that carries inside it, to put it simply, the magic of the Internet. This particular cable, which runs aground on the coast of Florida, has been tapped by the NSA according to Paglen's research. Paglen, an artist who has been documenting the physical footprint of surveillance for years, got scuba-certified in order to go diving "at several locations off the coast of Florida," he says, to find and photograph the cables.
Derek Bruff

PETA sues to give monkey the copyright of selfie photos | abc7.com - 1 views

  •  
    The US Copyright Office has issued a statement saying that it would only issue copyrights to humans. PETA objects to this, having just filed a suit to grant that macaque monkey the copyright for the selfies it took back in 2011. The struggle is real.
Derek Bruff

Andy Greenberg (@a_greenberg) | Twitter - 0 views

  •  
    Andy Greenberg covers cybersecurity and hacking for Wired magazine.
Derek Bruff

Nicole Perlroth (@nicoleperlroth) | Twitter - 0 views

  •  
    Nicole Perlroth covers cybersecurity for the New York Times.
Derek Bruff

Kashmir Hill (@kashhill) | Twitter - 0 views

  •  
    Kashmir Hill is a journalist who covers digital privacy, among other topics.
Derek Bruff

President Obama on Twitter: "Cool clock, Ahmed. Want to bring it to the White House? We... - 0 views

  •  
    About the same time we talked about the Ahmed Mohamed story during class yesterday, this happened.
j_olsen

A Few Thoughts on Cryptographic Engineering - 4 views

  •  
    This is an interesting cryptography blog by Matthew Green, a cryptographer and professor at Johns Hopkins University.
rmusicant

Journey Into Cryptography - 1 views

  •  
    How have humans protected their secret messages through history? What has changed today?
« First ‹ Previous 481 - 500 of 793 Next › Last »
Showing 20 items per page