Skip to main content

Home/ Groups/ Math 1111: Cryptography
Derek Bruff

Hello Future Pastebin Readers - The Message - Medium - 0 views

  •  
    "Over time, all data approaches deleted, or public."
Derek Bruff

99% Invisible | A Tiny Radio Show About Design with Roman Mars - 2 views

  •  
    The latest 99% Invisible podcast episode focuses on locks and lockpicking. I think you'll find some nice parallels with cryptography, especially around Kerckhoff's Principle and the idea of not knowing if your security system has been broken.
mattgu123

Alan Turing Article in Time Magazine - 0 views

Like the title says, the December 1/8 issue of Time has a pretty interesting article on the life of Alan Turing, with some discussion of the Enigma machine and Colossus.

fywscrypto AlanTuring TimeMagazine

started by mattgu123 on 18 Dec 14 no follow-up yet
mattgu123

Protesters Are Targets of Scrutiny Through Their Phones - 2 views

  •  
    An app circulated among the protesters in Hong Kong that supposedly was for coordinating protest efforts, but was in reality a phishing attack that would track keystrokes, messages, and identity information of devices it was installed on. Many signs point to the Chinese government as the origin of the malware, though. Not the first time a government has done something like planting spies and monitoring protestors. We saw this in Little Brother too, with the DHS spies on the Xnet.
chrisr22

Laptop-Spying School Accessed Webcams 42 Times; FBI Begins Investigation - 3 views

  •  
    High school student suing Philadelphia's Lower Merion School District for remotely accessing his webcam. And maybe you read the Superintendent's response and thought, "well, maybe this whole business is getting blown out of proportion." It isn't.
mariannas

They Cracked This 250-Year-Old Code, and Found a Secret Society Inside | WIRED - 1 views

  •  
    I'm just going to resubmit the bookmark directly to this page so I'll be sure it ends up publicly in the group. This wasn't mentioned in Singh chapter 2, but it was created around the time period discussed in the chapter. (Plus, it's one of my favorite articles I've read in Wired so I really wanted to use it as a bookmark.) The article discusses the strategies used to break this cipher, some of which, such as frequency analysis, we have talked about in class. It's also just fascinating to read about the Oculists and their history.
Derek Bruff

About | Blockstream - 0 views

  •  
    I was just followed on Twitter by someone from Blockstream, which looks like a start-up based on crypto currencies like Bitcoin. Fascinating.
Derek Bruff

Google Glass Police: NYPD Cops Testing Google Camera | TIME.com - 0 views

  •  
    "A few months ago, an officer for the Byron Police Department in Georgia made a routine traffic stop equipped with an unusual piece of technology: Google Glass."
Derek Bruff

How to Encrypt Your Email and Keep Your Conversations Private - 0 views

  •  
    We'll give Mailvelope (the webmail encryption tool) a try in class tomorrow. See Step Three for instructions.
Derek Bruff

Researchers crack the world's toughest encryption by listening to the tiny sounds made ... - 0 views

  •  
    Security researchers have successfully broken one of the most secure encryption algorithms, 4096-bit RSA, by listening - yes, with a microphone - to a computer as it decrypts some encrypted data.
Derek Bruff

Little Brother | Book Poster | Litographs - 0 views

  •  
    Little Brother, the entire book, on a poster.
Derek Bruff

New Tech City: Bill Binney and Ladar Levison Talk Cryptography - WNYC - 0 views

  •  
    Here's a podcast interview with Bill Binney and Ladar Levison, both featured in Citizenfour. Binney was the former NSA crypto expert we saw testifying in the film a couple of times, and Levison was the guy who ran the secure email service Lavabit that he felt compelled to shut down.
Derek Bruff

mozaiq - 0 views

« First ‹ Previous 541 - 560 of 793 Next › Last »
Showing 20 items per page