Author Archives: mukhinme

Trusting the Trade-Off

It is important to look at surveillance in the correct way, as an inanimate idea. Surveillance is but a tool used by entities in order to collect data about whoever is being surveilled. Thus a mistrust of surveillance lies fundamentally in the mistrust of authority and the powers delegated to it. My first primary argument […] Continue reading

Posted in government surveillance, privacy, society, Student Posts | Comments Off on Trusting the Trade-Off

Picture Privacy

At around the 16th minute in the podcast, Professor Bruff brings up the FaceApp. The FaceApp was a smartphone application in which users uploaded photos and the app modified them in creative ways. It was later discovered that FaceApp was taking the data of the faces and potentially storing it in some servers. With an […] Continue reading

Posted in data mining, privacy, smartphone, Student Posts | Comments Off on Picture Privacy

Student Posts – Cryptography 2019-11-11 00:04:29

“When inmates believe they are being watched, they conform to what they believe to be the norms of the prison and the expectations of their jailors. Surveillance is a mechanism by which powerful entities assert their power over less powerful individuals.” (74) This immediately reminds me of the panopticon, a completely surveilled prison design of […] Continue reading

Posted in Panopticon, privacy, Student Posts, surveillance | Comments Off on Student Posts – Cryptography 2019-11-11 00:04:29

The NSA is okay … Technically.

The NSA seeks to act in its best interests. Therefore the release of the DES should come as no surprise to anyone. Though technically created by IBM, NSA was heavily involved in the creation process. At the center of the encryption are the substitution S-tables, the part where the NSA had the most involvement. Naturally […] Continue reading

Posted in backdoor, DES, NSA, Student Posts | Comments Off on The NSA is okay … Technically.

Britain’s Fallacy

The conclusion of World War I brought a sense of elation and confidence for Allies, as they brought upon the defeat of the Central Powers. Utterly convinced that the reparations burdened upon Germany would be sufficient from ever causing such blatant militarism again, the Allies embraced peace. A common phrase that was uttered to describe […] Continue reading

Posted in enigma machine, military crypto, Student Posts, World War I | Comments Off on Britain’s Fallacy

The Prison Metaphor

Jeremy Bentham’s invention, the panopticon, should never have become a metaphor. The panopticon at its core remains a prison. When Jeremy Bentham introduced it, the majority of its benefits that he presented came as a direct consequence of the isolation that prisoners faced. Bentham brings up the inability of prisoners to communicate with each other […] Continue reading

Posted in Bentham, metaphor, Panopticon, Student Posts | Comments Off on The Prison Metaphor

Mount Everest

George Mallory was a British mountaineer who was the first person to climb Mount Everest. Famously when he was asked why he decided to climb Mount Everest he replied “Because it’s there.” The sake of discovery for the sake of discovery. Humanity is incredibly advanced and throughout the long history of civilization, countless hours have […] Continue reading

Posted in Beale Cipher, mathematics, Student Posts, unsolved | Comments Off on Mount Everest

Strict or Loose Construction?

Marcus argues during class with both Charles and Mrs. Anderson about the Constitution and the Bill of Rights. Though both sides in the book are represented by extreme views for the sensationalism of attempting to tell a good story, the actual debate is a valid case of differing opinions. The question of when to suspend […] Continue reading

Posted in Constitution, debate, privacy, Student Posts | Comments Off on Strict or Loose Construction?

Maximizing Both Security and Privacy

Morris argues that universities should mine student’s data to identify and prevent potentially threatening behaviors which could cause harm to other students of faculty. He compares data mining with a crystal ball, that universities could use to ensure the safety of those on campus. Additionally he brings up a potential objection, that FERPA could prevent […] Continue reading

Posted in algorithm, crystal ball, privacy, Student Posts | Comments Off on Maximizing Both Security and Privacy

The Cryptographic Needs of the Common Man

It is said that history is written by the winners, but many forget the second part of of that statement, that history is also written about only the powerful and important. The examples of cryptography that survived throughout the ages were those that caused great uproar, such as the beheading of Mary Queen of Scots. […] Continue reading

Posted in internet privacy, Mary Queen of Scots, Student Posts, technology | Comments Off on The Cryptographic Needs of the Common Man