Author Archives: Colleen Gill

What Do I Have to Hide?

By focusing on what to keep private rather than what to publicize, teens often inadvertently play into another common rhetorical crutch – the notion that privacy is only necessary for those who have something to hide (boyd, 63). When social media first began to crop up in my household, my parents weren’t sure how to […] Continue reading

Posted in "social media, internet privacy, safety, Student Posts | Comments Off on What Do I Have to Hide?

Inaccurate Accuracy

Though there were a lot of interesting insights made throughout the novel regarding cryptographic security, the point that most stood out to me had to do with the “paradox of the false positive.”  In chapter eight of the novel, Marcus comes up with the idea to clone arphids in order to create a high number of unusual travel patterns and […] Continue reading

Posted in data mining, little brother, Student Posts, testing | Comments Off on Inaccurate Accuracy

Not Quite Like the Movies

For as long as I can remember, there’s always been one thing about action movies that has bothered me above all else: while the bad guys can do whatever they want, without worrying about who they hurt, the good guys have to catch up to the bad guys while also attempting to contain collateral damage. It […] Continue reading

Posted in enigma machine, ethics, Student Posts, World War II | Comments Off on Not Quite Like the Movies

Cryptographic Creativity

What I was struck most by throughout Ms. Dunin’s talk was the fact that she had such a vast amount of knowledge in such a wide array of categories. She is not only an expert code breaker, but a professional code maker. She talked about her experience in the gaming industry, her understanding of steganography, […] Continue reading

Posted in cryptanalysis, Elonka Dunin, knowledge, Student Posts | Comments Off on Cryptographic Creativity

Morality v. Pragmatism

The question of ethics comes up a lot in regards to cryptography. At its core, things tend to only require encryption if, for some reason, someone doesn’t want them seen. More often than not people do not mind others seeing their good, moral deeds. What’s interesting about the Zimmerman deciphering is that the morals in […] Continue reading

Posted in Morality, Student Posts, World War I, Zimmermann message | Comments Off on Morality v. Pragmatism

You Say "Paranoia," Mom Says "Preparation"

My first email address was a very big milestone in my young life. Finally I was able to send my friends massive chain emails with instructions to pass the message on to 10 of their closest friends (of course including me). However, this email account did not come without its fair share of lectures. My […] Continue reading

Posted in internet, privacy, safety measures, Student Posts | Comments Off on You Say "Paranoia," Mom Says "Preparation"

The Correlation Between Technology and Self-Taught Cryptography

When the frequency analysis first emerged as a tool to decrypt substitution cyphers, it was the epitome of modern technology at the time.  Under the growing Islamic rule of the Arab nations there was, for the first time in history, the opportunity for the collection of mass amounts of diverse knowledge in one place and one time. Revolutionary at […] Continue reading

Posted in amateur cryptography, education, internet, Student Posts | Comments Off on The Correlation Between Technology and Self-Taught Cryptography