Author Archives: patelhg1

Protection of Privacy

Citizen Four opened my eyes to the many different ways the government invades privacy in order to protect its citizens. The government uses many devices to spy on its citizens, including location tracking and following people online with tracking cookies. This invasion of privacy can easily be avoided by any citizen. This is the topic […] Continue reading

Posted in Citizen Four, privacy, Snowden, Student Posts | Comments Off on Protection of Privacy

9/11 Changed Everything

At the time Singh wrote the novel, there was no blatant reason for the government to use surveillance for the interest of national security. Then September 11, 2001 happened. This day completely changed the interests of both the American citizens … Continue reading Continue reading

Posted in NSA, security, Student Posts, The Code Book | Comments Off on 9/11 Changed Everything

Espionage is the Key

One of the main reasons the Allied code breakers were able to crack the German Enigma cipher was espionage. Both stealing code books and obtaining documents from Schmidt gave the Allies the edge they needed to crack the Enigma machine … Continue reading Continue reading

Posted in cryptanalysis, enigma, espionage, Student Posts | Comments Off on Espionage is the Key

Persistence is the "key"

New things can seem very challenging at first. For example, a question seems so much simpler when we already have an answer to it. However, the question without the answer can seem very daunting, making it seem too difficult to … Continue reading Continue reading

Posted in Babbage, Student Posts, Unbreakable, Vigenere Cipher | Comments Off on Persistence is the "key"

Is anything really secure?

There are several ways a college student can protect his or her online privacy. College students today accept terms of agreement without reading them and even save passwords onto their computer and phone without thinking about what would happen if … Continue reading Continue reading

Posted in college student, privacy, Student Posts | Comments Off on Is anything really secure?

The Pattern of Cryptography

Cryptography is full of patterns. Patterns are evident in code-making, code-breaking, and even the history of cryptography itself. Code makers must use some sort of pattern when encrypting any message. Maybe the pattern is as simple as one in a … Continue reading Continue reading

Posted in Babington Plot, cryptographic pattern, Student Posts, The Code Book | Comments Off on The Pattern of Cryptography