Author Archives: gundamy

Pardon?

While the President could pardon Snowden, doing so would insinuate that the Espionage Act and other, similar policies are irrelevant in a modern context. It would also diminish the government’s credibility in the eyes of the American public, because granting Snowden a pardon would essentially equate to admitting that everything the government has been saying about […] Continue reading

Posted in citizenfour, ed, edward snowden, pardon, president, Snowden, Student Posts | Comments Off on Pardon?

Semantics, Semantics

In It’s Complicated, by danah boyd, the author remarks that “Journalists, parents, and technologists seem to believe that a willingness to share in public spaces—and, most certainly, any act of exhibitionism and publicity—is incompatible with a desire for privacy” (56). This observation comes in the middle of a discussion about social media and the complicated […] Continue reading

Posted in "social media, danah boyd, it's complicated, privacy, Student Posts | Comments Off on Semantics, Semantics

A Uniquely American Code

One of the foremost advantages the Allies had during the Second World War was the United States’ Navajo Code Talkers. Because Native American tribes developed language and culture separately from Europe and Asia, there was no basis for the German cryptographers to begin to decrypt their codes. An extra layer of encryption was that the […] Continue reading

Posted in enigma, navajo code talkeres, Student Posts, World War II | Comments Off on A Uniquely American Code

The Smithy Code: A Look Into Multiple Encryption

On Elonka’s website, there is an explanation and solution to the Smithy Code. The Smithy Code was embedded in the ruling for a plagiarism trial concerning Dan Brown’s The Da Vinci Code. Justice Peter Smith italicized several letters which spelled out “S m i t h y c o d e J a e i e […] Continue reading

Posted in caesar shift, Elonka Dunin, polyalphabetic substitution, Student Posts, the da vinci code, the smithy code, Vigenere Cipher | Comments Off on The Smithy Code: A Look Into Multiple Encryption

Contextual Ethics

Ethics in times of war must be thought of differently from ethics in times of peace, however much we may want it to be otherwise. The focus of ethics during wartimes turns to utilitarianism. Utilitarianism is sacrificing the wellbeing of a few for the good of the many. It is “big-picture” thinking, striving to benefit […] Continue reading

Posted in Singh, Student Posts, The Code Book, World War I, zimmerman telegram | Comments Off on Contextual Ethics

Opposing Views on Safety

I plan to respond to the essay by Michael Morris, titled “Mining Student Data Could Save Lives.” This essay discusses the potential disasters that could be avoided if universities monitored their students’ data. I find this essay especially compelling because of the relevant nature of its subject matter. As a college student, knowing that my […] Continue reading

Posted in censorship, privacy, safety, Student Posts, violence | Comments Off on Opposing Views on Safety

Standing on the Shoulders of Giants

It is curious to think of how the world was just one hundred years ago. So many things that are now obvious were unknown or shrouded in mystery. In 1915, barely anything was known about heredity and the cellular functions that were involved in it. Now, we have mapped the entire human genome and can […] Continue reading

Posted in amateur cryptography, cryptanalysis, cryptography, FYWS, history, internet, knowledge, Student Posts | Comments Off on Standing on the Shoulders of Giants