Author Archives: Sandra

Worry is a misuse of your imagination

“Teens often grow frustrated with adult assumptions that suggest that they are part of a generation that has eschewed privacy in order to participate in social media.” I would agree that there definitely is a social pressure to “post nice pictures” on Instagram or Facebook or VSCO because there’s a recurring saying among users that […] Continue reading

Posted in boyd, likes, parents, privacy, social pressure, Student Posts, teenagers | Comments Off on Worry is a misuse of your imagination

You don’t realize how often secret messages are still being transmitted

In the “Number Stations” podcast, I enjoyed learning about the fact that actual secret messages that nobody knows the reason or meaning of is actually being constantly transmitted on certain radio frequencies and generally accessible to pretty much anyone who has a radio and a knack for tuning to every possible station. Their message itself […] Continue reading

Posted in 99% invisible, number stations, podcast, radio, Student Posts | Comments Off on You don’t realize how often secret messages are still being transmitted

-Insert Title Here-

One overlooked important contribution to Allied success in cracking Enigma was that the Allies had knowledge of the structure of Enigma machines; had the Germans kept Scherbius’s invention as classified as possible—including exactly how many scramblers were used and the plugboard—efforts on the Allied side would have been much more stymied by pure bafflement of […] Continue reading

Posted in blog post 7, enigma, knowledge, military structure, scramblers, structure, Student Posts, Weather, WWII | Comments Off on -Insert Title Here-

Privacy vs Secur–does it even have to be something versus something?

On the Newseum board, there are a lot of arguments for pro-privacy. At the same time, there is another compelling argument to take as much as it has to in order to make people feel safe.  I feel like people come from many different sides when they are voicing their opinions; their personal experiences in their […] Continue reading

Posted in argument, debate, freedom, newseum, polarized, privacy, safety, security vs. privacy, Student Posts | Comments Off on Privacy vs Secur–does it even have to be something versus something?

The Greatness of the Great Cipher

I see The Great Cipher is synonymous to the simple monoalphabetic substitution cipher, just on steroids. The concept is the same—one cipher letter or multiple cipher numbers represent a number of plaintext letters. However, what makes the two so different in their difficulty to be cracked lies in the sheer possibility of combinations that could be created from […] Continue reading

Posted in cipher, decipher, King Louis XIV, monoalphabetic subsitution, Rossignols, Student Posts, syllables, The Great Cipher | Comments Off on The Greatness of the Great Cipher

How can we make security more “secure”?

On page 99 of Little Brother by Cory Doctorow, Marcus delineates the flaws of cryptology and how ultimately cracking the Enigma led to the victory against the Nazis in WWII. One of the flaws was secrecy; after Alan Turing cracked the Enigma, any Nazi message could be deciphered because “Turning was smarter than the guy […] Continue reading

Posted in Alan Turing, collaboration, enigma, little brother, security flaws, security systems, Student Posts, vulnerability | Comments Off on How can we make security more “secure”?

Crossing the Line?

In the article “Mining Student Data Could Save Lives” by Michael Morris, I believe Morris argues that in order to mitigate or even repel completely the threat of student violence, an option lies in “data mining”–the process of collecting massive amounts of data from students using their emails, computer use in the university, and other […] Continue reading

Posted in compromise, consequences, data mining, security, Student Posts, vulnerability | Comments Off on Crossing the Line?

None>Something

[Response to question #1] When Singh says that “a weak encryption can be worse than no encryption at all,” it makes me want to equate it to a devastating mistake of leaving an unmistakable trace because with that, all of the evidence of enciphering a message to plot to kill Queen Elizabeth falls completely onto […] Continue reading

Posted in Babington, Blog Assignments, Queen Mary, Student Posts, weakness | Comments Off on None>Something