Author Archives: Nathan

Writing Process

For this project, I chose to write about the Internet of Things (IoT) and smart devices. My system was to first create an outline of how I wanted to structure my paper. Here I got into detail about what specific … Continue reading Continue reading

Posted in Internet of Things, IoT, Practical Cryptography, Smart Devices, Student Posts | Comments Off on Writing Process

Privacy in Moderation

The debate over privacy and government surveillance seems to present opposite ends of the spectrum. The government does not necessarily need to have “wide latitude” but it still needs some latitude to use surveillance for the benefit of our nation’s … Continue reading Continue reading

Posted in Infocalypse, moderation, privacy, Singh chapter 7, Student Posts, surveillance | Comments Off on Privacy in Moderation

A Boost of Motivation

The mindset for the Allies had changed between the First World War and the Second World War. After their success in cracking Germany’s ciphers in the First World War, the Allies felt like that could crack anything Germany tries to … Continue reading Continue reading

Posted in Allies, enigma, Rejewski, Student Posts, WWII | Comments Off on A Boost of Motivation

Taking control

In chapter 4 of Little Brother, there’s a passage where Marcus talks about the idea of privacy. He says that it is a feeling of liberation when you have an aspect of your life that is completely under your control. … Continue reading Continue reading

Posted in marcus yallow, privacy, psychology, Student Posts | Comments Off on Taking control

Unbreakable Cipher

The Great Cipher used by Louis XIV remained unbroken for 200 years.  What were the factors that led to such a secure cipher? The Great Cipher, invented by Antoine and Bonaventure Rossignol, was one of the toughest codes to decipher. … Continue reading Continue reading

Posted in Antoine, bazeries, Student Posts, The Great Cipher | Comments Off on Unbreakable Cipher

Watch what you post

After reading the article “The 5 biggest online privacy threats of 2013,” you should be aware of how little privacy you have, in case you were not aware of it already. One of the main things you can do, which … Continue reading Continue reading

Posted in "social media, geotagging, privacy, Student Posts | Comments Off on Watch what you post

Cryptography in History

After our discussion in class on chapter 1 of The Code Book, I was able to look at the history of cryptography with a new perspective. It was interesting to read about how a society would not be able to … Continue reading Continue reading

Posted in cryptanalysis, cryptography, scholarship, Student Posts, The Code Book | Comments Off on Cryptography in History