Author Archives: overtocm

The Essence of the Security vs. Privacy Debate

When we talk about the battle between security and privacy, most of the discussion from both sides has to do with one of two topics: the effectiveness of electronic mass surveillance in deterring and stopping crime, or the effect that surveillance has on individual freedoms e.g. freedom of speech/expression. These are the most important questions […] Continue reading

Posted in National Security, privacy vs. security, Student Posts, surveillance | Comments Off on The Essence of the Security vs. Privacy Debate

Pretty Good Anonymity

In Darkode, the hosts tell the story of a ransomware victim who was forced to buy 500 dollars worth of Bitcoin to gain access back to her files that had been stolen and encrypted. In the process, she came in contact with TOR which has as its central mission to provide anonymous communication between people through […] Continue reading

Posted in anonymity, Bitcoin, cryptocurrency, privacy, security vs. privacy, Student Posts, ZCash | Comments Off on Pretty Good Anonymity

The Case for Strong Encryption

In my opinion, strong encryption should be available to the public, even terrorists and criminals, for two primary reasons, one theoretical and the other more practical. The theoretical reason is the one that Singh identified as the primary argument in favor of strong encryption: privacy rights. As Singh notes, the Declaration of Human Rights protects […] Continue reading

Posted in digital encryption, internet privacy, Student Posts, surveillance | Comments Off on The Case for Strong Encryption

Mysterious Numbers

The 99% Invisible episode about numbers stations was interesting to me because radio is a unique form of communication as it relates to cryptography. Since radio is publicly broadcast, anyone can tune in, so while sending an encrypted message, you have to assume that your enemies are listening at all times. Because of this, using […] Continue reading

Posted in Student Posts | Comments Off on Mysterious Numbers

Breaking (Almost) Unbreakable Ciphers

The strength of the Vigenère Cipher depends largely on the length of the keyword. If the keyword is just one letter, then it is nothing more than a simple shift cipher; if the keyword is the same length as the plain text, there will be little to no discernable pattern. However, Singh clearly demonstrates that even with […] Continue reading

Posted in cryptanalysis, Student Posts, Unbreakable cipher, Vigenere Cipher | Comments Off on Breaking (Almost) Unbreakable Ciphers

Compromising: The Best Solution to a Difficult Problem

On the privacy versus security display at the Newseum, the responses to “What would you give up to feel safer?” run the gamut from those who feel that they have nothing to hide, to those who believe that privacy is too important to sacrifice. However, the Benjamin Franklin quote in particular caught my eye since […] Continue reading

Posted in Benjamin Franklin, newseum, Privacy versus security, security vs. privacy, Student Posts | Comments Off on Compromising: The Best Solution to a Difficult Problem

The Appeal of an Unbreakable Cipher

The unbroken Beale ciphers, likely enciphered using a book cipher, will remain nearly impossible to break until we figure out what key text was used to encipher them. Despite this, cryptanalysts have been trying to decipher the messages using various key texts, essentially guessing and checking in the hopes that they stumble upon the correct […] Continue reading

Posted in Beale Cipher, cryptanalysis, Student Posts, Unbreakable cipher | Comments Off on The Appeal of an Unbreakable Cipher

Same Evidence, Different Arguments: Value Conflicts in Little Brother

During the class discussion led by Ms. Galvez, Marcus cited a short passage from the Declaration of Independence to explain his attitude toward the DHA’s extensive surveillance techniques and invasion of privacy, stating that the primary role of the government is to ensure the safety and happiness of the people, and that it derives its […] Continue reading

Posted in government surveillance, personal values, Student Posts, value conflict | Comments Off on Same Evidence, Different Arguments: Value Conflicts in Little Brother

Mining Student Data Could Save Lives – or Make Life Harder

In his essay, “Mining Student Data Could Save Lives”, Michael Morris argues that universities should implement data mining algorithms to detect patterns in student activities on their networks (e.g. any activity occurring on the WiFi network, school computers, or communications through university email accounts). According to Morris, the implementation of these algorithms could potentially prevent […] Continue reading

Posted in internet privacy, privacy, Privacy versus security, Student Posts, surveillance | Comments Off on Mining Student Data Could Save Lives – or Make Life Harder

Cryptography in the Modern World: Keeping a Information Secret in the Age of Computing

In the first chapter, the examples of cryptography Singh selected were confined to the upper echelons of society: nobles, scholars, religious and military leaders. But perhaps more telling is the affluence of cryptanalysts such as Thomas Phelippes, a linguist fluent in five languages and an accomplished code-breaker; knowing five languages is a feat even in […] Continue reading

Posted in Computer Cryptography, education, Modern Cryptography, security, Student Posts | Comments Off on Cryptography in the Modern World: Keeping a Information Secret in the Age of Computing