Author Archives: Ling

Teen Privacy

In It’s Complicated, Emily Nussbaum states “Kids today…have no sense of shame. They have no sense of privacy” (boyd 55). She continues with a series of eloquent terms that describe how the “kids” publicly defame themselves with indecent pictures, and how they are “little loons who post…their stupid poetry” and thoughts “online” (boyd 55).   […] Continue reading

Posted in internet, privacy, security, Student Posts | Comments Off on Teen Privacy

It’s What We Make of It

For this blog post I would like to introduce a rather grim prospect that I’ve been pondering about the human knowledge threshold. I was reminded of the thought after reading Marcus’ discussion on how we can wield computers and other tools of such sophistication and power with just a few “lines of code” (Doctorow 119). The […] Continue reading

Posted in knowledge, knowledge threshold, little brother, Student Posts | Comments Off on It’s What We Make of It

Rejewski and Turing

One of the main reasons for the success of the Allied cryptanalysts at Bletchley Park over German cryptographers is the acquisition of the previous work of the Polish on the German Enigma. Polish cryptanalyst, Marian Rejewski, led the polish to first break Enigma in 1932, and kept up with breaking any new security the Germans […] Continue reading

Posted in cryptanalysis, cryptography, enigma, Student Posts, WWII | Comments Off on Rejewski and Turing

The Morality of Admiral Hall’s Actions

Upon learning the intended plans of the Germans from deciphering the Zimmerman telegram, it was ethical of Admiral Hall to withhold such information from the President.   One may argue that Admiral Hall should morally concede the information to the President so that Britain may be subsequently informed, and lives could be potentially saved during […] Continue reading

Posted in cryptography, Singh, Student Posts, WWII | Comments Off on The Morality of Admiral Hall’s Actions

Cryptography » Student Posts 2015-09-16 21:58:04

In response to the reading question: “The Great Cipher used by Louis XIV remained unbroken for 200 years.  What were the factors that led to such a secure cipher?” CONNA described how the death of the father and son duo led to the collapse of breaking the code due to the fact that there was […] Continue reading

Posted in Louis XIV, Rossignol, Singh, Student Posts | Comments Off on Cryptography » Student Posts 2015-09-16 21:58:04

The New Normal

In Hello Future Pastebin Readers, Quinn Norton talks about how everyone who has access to technology is essentially the same in that none of their personal information and data, no matter how securely uploaded or downloaded, is actually private. This particularly interests me because today’s society is so heavily centered around the distribution of information […] Continue reading

Posted in Blog Assignments, cryptography, internet, Student Posts, technology | Comments Off on The New Normal