Author Archives: floreaa

Surveillance and Freedom of Speech: Should the U.S succumb to an 1984 type of Society?

Put simply, surveillance is a systematic way of searching for a flaw in a pool of data and when a camera is pointed at somebody, they knowingly change the ways that they act and even think while they are being watched. The idea that you are being watched is suggestive that you are already guilty […] Continue reading

Posted in "social media, China, freedom, Student Posts | Comments Off on Surveillance and Freedom of Speech: Should the U.S succumb to an 1984 type of Society?

Is cyber crime a worthwhile reason to keep the internet more secure?

One of the most surprising aspects of the radiolab episodes was the concept of the Botnet. Essentially these botnets are pieces of software that connect and can control groups of hacked or infected computers. Smaller botnets would control over 1000 computers, while larger ones could dominate over millions of computers. It’s hard to imagine that […] Continue reading

Posted in botnet, cyber crime, internet privacy, Student Posts | Comments Off on Is cyber crime a worthwhile reason to keep the internet more secure?

Teens, like adults, Make Their Own Choices Reguarding Privacy

In the section, Privacy as Process, boyd identifies a new argument that,  “In a world in which posting updates is common, purposeful, and performative, sharing often allows teens to control a social situation more than simply opting out. It also guarantees that others can’t define the social situation.” She introduces the idea of the choice […] Continue reading

Posted in "social media, choices, parental surveillance, Student Posts | Comments Off on Teens, like adults, Make Their Own Choices Reguarding Privacy

Digital Encyption: Modern Day’s Most Important Luxuries

Strong public encryption greatly benefits the general public. The ability to send all your messages with the knowledge that it is secure and will only be read by the recipient is a modern day luxury. One of the arguments against strong encryption points out that if you don’t have any secrets to hide then your […] Continue reading

Posted in digital encryption, freedom, PGP, Student Posts, zimmerman | Comments Off on Digital Encyption: Modern Day’s Most Important Luxuries

Podcast Issues: Manuvering Through Describing the Topic of Stenography.

The podcast, Something Out of Nothing, discussed theories that believe that Shakespeare did not any of his sonnets, poems, or even plays. The speaker dives into the presence of cryptography in a lot of Shakespeare’s writing; the speaker gathered information about a unique cipher that utilized a substitute key and a form of stenography to […] Continue reading

Posted in Bilieral cipher, francis bacon, podcast, Shakespeare, Stenography, Student Posts | Comments Off on Podcast Issues: Manuvering Through Describing the Topic of Stenography.

Admiral Hall’s Choice to Consider the Long Term Threats to a Nation.

Admiral William Hall decided to keep the information that the English broke the enciphered Zimmerman telegram a secret because he believed that the knowledge for decrypting the telegram would be an asset to the them in the near future. Those who were thoughtful of the future such as Admiral Hall would believe this choice to […] Continue reading

Posted in decryption, ethics, secrecy, Student Posts, zimmerman telegram | Comments Off on Admiral Hall’s Choice to Consider the Long Term Threats to a Nation.

Security vs Privacy: The Level of Surveillance Divides Advocates of Pro Security

When I looked closely at the various responses on the whiteboard I noticed that the people who advocated for surveillance held different opinions about the intensity that our surveillance has on people’s data. Some people in this pro surveillance group believed in a strong surveillance systems and wrote things such as “text messages and phone […] Continue reading

Posted in phone record, privacy, security, Student Posts, text messaging | Comments Off on Security vs Privacy: The Level of Surveillance Divides Advocates of Pro Security

Encryption Strengthens as Human Technology Improves

By the mid 19th century, the skills and techniques used to break simple monoalphabetic substitution ciphers or keyword ciphers were well known between coder breakers. Tools such as frequency analysis were vital to decoding messages, encrypted messages intercepted through Morse code had no chance of staying secure. Messages needed to be encrypted with a stronger […] Continue reading

Posted in AES, email, Morse code, polyalphabetic substitution, Student Posts | Comments Off on Encryption Strengthens as Human Technology Improves

Little Brother Data Mining Exaggeration?

Not long after Marcus is released, he was followed by two police officers and was arrested for taking unusual trips at unusual times using the BART.  Because Marcus’s fast pass was able to collect data on where and when he took trips, a computer algorithm incorrectly marked him down as a possible criminal. When he […] Continue reading

Posted in data mining, fruad, Google, little brother, Student Posts | Comments Off on Little Brother Data Mining Exaggeration?

Message Strenght Beyond Decryption

In his idea that Mary Queen of Scots would have been better off without her relatively weak cipher,  Singh acknowledges the crucial relationship between the strength of a cipher and the level of accountable knowledge that encrypted messages contain. Mary Queen of Scots and Babington where often trading highly sensitive messages that outlined the plot […] Continue reading

Posted in code words, Mary Queen of Scots, sensive information, Student Posts | Comments Off on Message Strenght Beyond Decryption