Author Archives: peinrm

Learning from your pre-teen angst posts

“In other words, when participating in networked publics, many participants embrace a widespread public by default, private through effort mentality.” – (boyd 62) I think this quote sums up the unofficial “terms of agreement” teens subconsciously accept when participating in social media. In the chapter, boyd argues that the amount of effort required to constantly […] Continue reading

Posted in agreement, privacy, reflection, Student Posts | Comments Off on Learning from your pre-teen angst posts

From the perspective of the losing side

I listened to Cipher, or Greenhow girls The Memory Palace episode 111 and I thought it was so interesting how they started first from older Rose’s perspective and then transitioned to trying to empathize with little Rose after her mother passed. The chronological way the podcast was delivered made it very easy to follow and the music […] Continue reading

Posted in music, Rose, spies, Student Posts | Comments Off on From the perspective of the losing side

Human intellect vs. Machine power

The deciphering of Enigma remains as one of the most significant cryptanalyst achievements of all time. One of the main reasons the Allies were successful in cracking the code was due to their ability to look beyond the microcosm of the daily messages they received and focus on tackling the code at the highest level. […] Continue reading

Posted in engineering, machinery, patterns, Student Posts | Comments Off on Human intellect vs. Machine power

Timelessness of personal liberty

The display demonstrated that most people would settle for a balance of privacy and safety, which is understandable as I feel most people lie somewhere in the middle of the spectrum. However, the Ben Franklin quote really caught my eye because he would not have lived in a time of data-mining, internet surveillance, etc. so […] Continue reading

Posted in benfranklin, Opinion, securityspectrum, Student Posts | Comments Off on Timelessness of personal liberty

The Great Cipher: Coding in a primitive form

Great Cipher used by Louis XIV was such a successful cipher because it incorporated many types of cryptography, but also “foolproofed” itself by creating almost a ciphertext keyboard. For example, certain numbers created sounds, similar to how computer code can prompt a computer to emit audio. Similarly, certain groups of numbers deleted the previous letter/cluster, […] Continue reading

Posted in Programming, Student Posts, success, syllables | Comments Off on The Great Cipher: Coding in a primitive form

Absolution of the Constitution

On page 208 of Little Brother, Marcus gets into a heated argument with his replacement social studies teacher and Charles. The teacher and Charles are arguing that rights provided to the people in the Constitution/Bill of Rights can be suspended under certain circumstances. Marcus is arguing that the rights are absolute, and that the teacher’s way […] Continue reading

Posted in absolutism, little brother, outdated ideas, Student Posts | Comments Off on Absolution of the Constitution

At the mercy of campus surveillance

In “Mining Student Data Could Save Lives” by Michael Morris, the main argument is that if campuses use data mining to detect possible violence, it will be beneficial to the safety of the students. While I agree that this tactic may be very effective, it does make me wonder about the extent to which universities […] Continue reading

Posted in individual, safety, Student Posts, surveillance | Comments Off on At the mercy of campus surveillance

At the mercy of campus surveillance

In “Mining Student Data Could Save Lives” by Michael Morris, the main argument is that if campuses use data mining to detect possible violence, it will be beneficial to the safety of the students. While I agree that this tactic may be very effective, it does make me wonder about the extent to which universities […] Continue reading

Posted in individual, safety, Student Posts, surveillance | Comments Off on At the mercy of campus surveillance

Duty of the Government to divulge sensitive information

In response to question 3, I believe that examples of cryptography noted in Singh chapter 1 were mainly of monarchs and leaders because the information they trade is far more dangerous and powerful than information traded by those who weren’t involved in the politics of the world. For example, when the Greeks defended themselves against […] Continue reading

Posted in consequences, global politics, Student Posts | Comments Off on Duty of the Government to divulge sensitive information