SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Author Archives: Christian
In writing my paper, a guide on Tor and the Dark Web and a their role in the future of privacy, I have had to research the technology behind Tor and how the encryption and routing scheme works to enable anonymity of origination of user data. Along with the mechanics of Tor, most of my […] Continue reading
The United State government should not be allowed to surveil its citizens and invade privacy in the interest of national security. The right to privacy was declared a basic human right. Taking that right away will weaken the voice of … Continue reading → Continue reading
One of the main factors that contributed to the success of the Allied cryptanalysts over the German cryptographers was the secrecy that surrounded the Allied code breaking efforts. The Allies were able to keep their code breaking efforts shrouded under … Continue reading → Continue reading
Cory Doctorow’s Little Brother is a great read that makes the reader question whether privacy is worth giving up for security. In the third chapter, Marcus is detained and told to unlock his phone and decrypt the files for the … Continue reading → Continue reading
Why do you think that the advent of the telegraph motivated the use of a more secure cipher like the Vigenère cipher? Prior to the telegraph, much of the communication was done so through hand written or typed correspondence. There … Continue reading → Continue reading
One thing college students can do to protect their online privacy would be to use a VPN (Virtual Private Network). In short, a VPN encrypts a users’ data so third parties are unable to view it. They are particularly useful … Continue reading → Continue reading
After the class discussion, I began thinking about the concept that cryptography and cryptanalysis is dependent on exceptional resources. Upon first reading the chapter, I had considered the cryptanalysis that was done at the time as super basic due to … Continue reading → Continue reading