Author Archives: Julius Tabery

Social Media Is Basically Spy Training

“Rather than finding privacy by controlling access to content, many teens are instead controlling access to meaning.” (Boyd, 76) Discussing this quote leads to some of the key differences between cryptography and steganography. While teens are openly publishing messages, only those with the requisite information and context required to decipher what the messages are saying […] Continue reading

Posted in "social media, boyd, privacy, Student Posts | Comments Off on Social Media Is Basically Spy Training

Unintentional Facilitation Is Not Complicity

When Phil Zimmerman made PGP available to the world, he gave everyone with a computer access to secure and private communication with anyone else with a computer. His goal in doing this was to give the public a way to communicate with the assurance that the contents of their messages were private, an assurance that […] Continue reading

Posted in PGP, privacy, Singh, Student Posts | Comments Off on Unintentional Facilitation Is Not Complicity

How Darwin’s Theory of Evolution Applies to Cryptography

Public key cryptography was invented by the academic researchers Diffie, Hellman, Merkle, Rivest, Shamir, and Adleman. They’re the ones who came up with the idea, and they’re the ones who created functions that could work with it. Here’s the issue: British GCHQ researchers Ellis, Cocks, and Williamson did all of those things too. The only […] Continue reading

Posted in DES, GCHW, Independent Invention, Student Posts | Comments Off on How Darwin’s Theory of Evolution Applies to Cryptography

Codebreaking Wins Wars

Hiroshi Oshima, the Japanese ambassador to Germany, played a big part in losing World War Two for the Axis. He had sent a series of messages home to Tokyo, describing seemingly every military secret that Hitler could possibly have wanted to keep a secret. Detailing the strengths and weaknesses of the German defenses along the […] Continue reading

Posted in Code Girls, Hiroshi Oshhima, Student Posts, WWII | Comments Off on Codebreaking Wins Wars

For Lack of a Better Title

Listening to these podcasts, I was intrigued by the 99% Invisible episode, Vox Ex Machina.  I think Roman Mars does an excellent job of holding his listener’s attention. This is not to say that the subject matter is boring or would be uninteresting but for its presentation, but his ability to establish an idea, get the […] Continue reading

Posted in 99% invisible, podcasting, Student Posts, WWII | Comments Off on For Lack of a Better Title

The Walls Are Very Porous

Jeremy Bentham’s great theory was the Panopticon: a hypothetical prison design in which all inmates could be seen and observed by those in charge, but the inmates themselves could not see the observers, nor could they see any other inmates. It’s an interesting concept to think about in theory, but it is not useful as […] Continue reading

Posted in Jeremy Bentham, Panopticon, Student Posts, surveillance | Comments Off on The Walls Are Very Porous

Nothing to Fear but Fear Itself

In Little Brother, Marcus, the main character, frequently argues with his father over the matter of whether we should give up some of our personal freedoms and privacies in order to grant more power to those seeking to prevent harm from threats like terrorism. It’s a difficult debate that I have occasionally had with myself, and I’ve […] Continue reading

Posted in government surveillance, little brother, security vs. privacy, Student Posts, terrorism | Comments Off on Nothing to Fear but Fear Itself

Student Posts – Cryptography 2019-09-02 04:03:49

Michael Morris makes the argument that, through mining student data, examining the digital footprints left by students in their day-to-day lives, universities could prevent violence from occurring on campus. This belief is founded on the idea that students intending to commit violence might leave some evidence of their bad intentions in their online actions. Morris […] Continue reading

Posted in data mining, privacy, safety, Student Posts | Comments Off on Student Posts – Cryptography 2019-09-02 04:03:49