Author Archives: Jojo

Who Defines the Boundary between Surveillance and Privacy

When I first entered this class, I was very pro-privacy. But after hearing arguments from both sides, I have come to understand that surveillance is necessary. And the argument on our side is not against surveillance, but rather focusing on the word “wide latitude”. What is considered a wide enough latitude? Who is the one […] Continue reading

Posted in privacy, security vs. privacy, Student Posts, surveillance | Comments Off on Who Defines the Boundary between Surveillance and Privacy

In Public but Unpublic

In It’s Complicated, boyd wrote: “there’s  a big difference between being in public and being public… mere participation in social media can blur these two dynamics.” I especially like the author’s analogy between a subway conversation and a social media post online. While both contents are in public, neither is being public. A subway conversation, while audible to those around, is meant to be […] Continue reading

Posted in "social media, boyd, public, Student Posts | Comments Off on In Public but Unpublic

Why Strong Encryption to General Public

In the age of digital technology, access to encryption is of similar importance as the access to free speech. While the arguments against public encryption technology are certainly valid considering public security, it’s unreasonable to deny the public access to such a critical element of online communication, especially since most communications using encryption don’t concern […] Continue reading

Posted in Encryption, security, Singh, Student Posts | Comments Off on Why Strong Encryption to General Public

Numbers Station Podcast

Numbers Stations is particularly interesting for me for many reasons. In the intro part, the author starts by talking about his personal connection with the topic, thus making his listeners more engaged in the subject. And then, the author uses a mixtape of different radio waves to create a context for the listeners. The author […] Continue reading

Posted in background music, numbers stations, podcast, Student Posts | Comments Off on Numbers Station Podcast

The Allies’ Resource Allocation

In his blog post (http://derekbruff.org/blogs/fywscrypto/2017/10/09/not-a-single-factor-is-responsible-for-the-allied-success/), the student argued that besides the overconfidence of the German, the strength of the Allies’ code itself contributed to the breaking of the Enigma code. I thought this was a very interesting viewpoint and never considered this before. The surprising usage of the Navajo language as military encryption proved to be […] Continue reading

Posted in Allies, enigma machine, navajo code talkeres, Student Posts | Comments Off on The Allies’ Resource Allocation

Why Cryptanalysis Seems Easier Than It Actually Is

Singh’s examples in book seem easy to comprehend. The methods are relatively straightforward and codes were broken within few pages of the book. However, in practice the process of cryptanalysis is usually much more complicated. I believe there are three reasons for that. First of all, the cryptanalyst has no idea what type of code […] Continue reading

Posted in cryptanalysis, difficulty, Student Posts, types of encryption | Comments Off on Why Cryptanalysis Seems Easier Than It Actually Is

The Hidden Meaning Behind Words

The display in Newseum raised the matter of privacy v. security, with a special focus on FBI and its increased security measures after the 9/11 attack. The issue posed striking similarities with the story of the Little Brother, as the DHS increased the scale of its surveillance after a terrorist attack on the Bay bridge. What […] Continue reading

Posted in FBI, privacy, security, Student Posts | Comments Off on The Hidden Meaning Behind Words

Telegraph and Modern Day Technology on Cryptography

I believe the advent of the telegraph motivated the use of more secure cipher due to three reasons. Firstly, telegraph workers were gaining access to all messages being communicated through telegraph. While they were “sworn to secrecy”, people might still seek ways to encrypt their messages from the eyes of telegraph workers. Secondly, communication was […] Continue reading

Posted in Modern Cryptography, snapchat, Student Posts, telegraph | Comments Off on Telegraph and Modern Day Technology on Cryptography

When Marcus Read a Quote from On the Road

In Chapter 14, Marcus read Ange an excerpt from the book On the Road, a semi-bioautography portraying Jack Kerouac hitchhiking around America and the incidents and people he encountered along the way (221). The scene took place right after Marcus got suspended from school and before he and Ange decided to launch an online press […] Continue reading

Posted in character, on the road, quote, Student Posts | Comments Off on When Marcus Read a Quote from On the Road

The Alluring Concept of Surveillance

In his essay “Mining Student Data Could Save Lives”, Michael Morris argues that universities should take actions to threat-assess their students’ online activities as well as mental states, thus maximizing the protection of campus safety and preventing large-scale assaults. In his article, Morris argues that since universities already have access to almost all students’ online […] Continue reading

Posted in Blog Assignments, security vs. privacy, Student Posts, surveillance, university | Comments Off on The Alluring Concept of Surveillance