Author Archives: edwardsc

Technological Revolution of Teenage Privacy

“Every teenager wants privacy. Every single last one of them, whether they tell you or not, wants privacy.” – Waffle I strongly agree with this statement for a multitude of reasons. One of the main reasons I agree with it is because I used to be like Waffle; Playing video games behind another personality and […] Continue reading

Posted in "social media, Blog Assignments, parents, privacy, scandalous, social norms, Student Posts | Comments Off on Technological Revolution of Teenage Privacy

From Voxcoder to SIGSALY

The Voxcoder was one of the most interesting things I have ever heard of. The origin of the machine, being just a voice changer/imitator, really made me wonder what the creator had in mind when he made the machine. Being able to replicate a human or animal voice opens up so many pathways such as […] Continue reading

Posted in Crypotgraphy, cryptanalysis, Crypto wars, SIGSALY, Student Posts, Voxcoder, WWII | Comments Off on From Voxcoder to SIGSALY

Navajo Code Talkers — Beyond Encryption

Though German Overconfidence in Enigma was a key factor to their loss, another major impact was the Navajo Code Talkers. The Navajo Code Talkers success can be considered just as important and the code breaking of the Enigma. Without secure communications it is hard for the Allies to fight back in an organised manor. With […] Continue reading

Posted in Crypotgraphy, cryptanalysis, Navajo Code Talkers, Singh, Student Posts, WWII | Comments Off on Navajo Code Talkers — Beyond Encryption

Feeling Safe is not Being Safe

I value my privacy greatly but I also value my own security. If I were to give up a little of one to get a lot of the other, I would obviously choose privacy in terms of what to sacrifice but the post does not talk about security but the “feeling” of being secure. Depending […] Continue reading

Posted in false security, liberty, privacy, sacrifice, Student Posts | Comments Off on Feeling Safe is not Being Safe

Technologies Effect on Cryptography

The advent of the telegraph was a major factor in the use of the Vigenère Cipher. Due to the Vigenère Cipher having 60 cipher alphabets, the methods of encrypted methods not only increased but became ideal for technology such as the telegraph.  What makes the telegraph go well with the Vigenère cipher is that it brought more security […] Continue reading

Posted in ciphers, Crypotgraphy, Student Posts, telegraph, Vigenere Cipher | Comments Off on Technologies Effect on Cryptography

Security vs Privacy: The Dangers of too much Authority

Chapter four of Little Brother really made me mad due to the abuse of basic human rights the American government was willing to surpass in order to receive more legalized power. Expanding on this problem, I am going to address how the governments abuse of Marcus and other captives basic human rights directly relate to […] Continue reading

Posted in cryptography, data analysis, data mining, false security, Homeland Security, safety, Student Posts | Comments Off on Security vs Privacy: The Dangers of too much Authority