Category Archives: Singh

Unintentional Facilitation Is Not Complicity

When Phil Zimmerman made PGP available to the world, he gave everyone with a computer access to secure and private communication with anyone else with a computer. His goal in doing this was to give the public a way to communicate with the assurance that the contents of their messages were private, an assurance that […] Continue reading

Posted in PGP, privacy, Singh, Student Posts | Comments Off on Unintentional Facilitation Is Not Complicity

What Singh Couldn’t Have Predicted

Simon Singh makes many predictions about evident trends in the increasingly digital world. 20 years later, he got a lot of things right, although from our digitally oversaturated viewpoint, they seem obvious now.  Singh was definitely correct in his prediction that soon email would overtake normal mail, and this rang true for the early 2000s […] Continue reading

Posted in email, gps, Singh, Student Posts | Comments Off on What Singh Couldn’t Have Predicted

Choosing Between Right and Wrong

If a person was to make a piece of software available on the Internet that was used for malicious reasons by criminals or foreign governments, I do not think that they would be responsible. The person who created it just came up with the technology. They did not force people to use that technology in […] Continue reading

Posted in choices, Singh, software, Student Posts, terrorism | Comments Off on Choosing Between Right and Wrong

Intent – What’s the Big Deal?

I do not believe that anyone should be held accountable for the actions of others if they choose to make their software public. Before I explain why, I want to open with this opinion being contingent on one caveat: intent. Unfortunately, intent can be hard to quantify, but I will preface this condition with an […] Continue reading

Posted in Intent, PGP, privacy, security, Singh, Student Posts, terrorism, zimmerman | Comments Off on Intent – What’s the Big Deal?

Why Strong Encryption to General Public

In the age of digital technology, access to encryption is of similar importance as the access to free speech. While the arguments against public encryption technology are certainly valid considering public security, it’s unreasonable to deny the public access to such a critical element of online communication, especially since most communications using encryption don’t concern […] Continue reading

Posted in Encryption, security, Singh, Student Posts | Comments Off on Why Strong Encryption to General Public

Diversifying to Succeed

In the post Not a Single Factor is Responsible for the Allied Success (http://derekbruff.org/blogs/fywscrypto/2017/10/09/not-a-single-factor-is-responsible-for-the-allied-success/), the author argues that simply reducing the intelligence victory of the Allies to German false confidence is a great mistake. I agree with the authors assessment as it is fact that a war is won on many fronts, not just one. […] Continue reading

Posted in enigma, navajo code talkeres, Singh, Student Posts | Comments Off on Diversifying to Succeed

Ethics Versus Strategy

I believe that the decision taken by Admiral William Hall was the right one, even though it was unethical. While it was morally wrong for him to let civilians die for a strategic gain, it was the right course of action to take for a man in his position. He was responsible for winning the […] Continue reading

Posted in ethics, Singh, Student Posts, World War | Comments Off on Ethics Versus Strategy

The Problem with Weak Encryption

In Chapter 1 of The Code Book, author Simon Singh states, “The cipher of Mary Queen of Scots clearly demonstrates that a weak encryption can be worse than no encryption at all.”  What this essentially means is that overconfidence with a cipher, especially a relatively weak one, can be dangerous in that it creates an illusion […] Continue reading

Posted in privacy, security, Singh, Student Posts, The Code Book, weak cryptography | Comments Off on The Problem with Weak Encryption

The Dangers of Weak Cryptography

For one who is not well-versed in “cryptography,” hearing the word might simply bring to mind the language game Pig Latin. However, Singh is trying to convey, in layman’s terms, that cryptography is not a child’s game for all; in Mary Queen of Scots’ case, it was literally an instance of life or death. The […] Continue reading

Posted in amateur cryptography, cryptanalysis, security, Singh, Student Posts, The Code Book, weak cryptography | Comments Off on The Dangers of Weak Cryptography

The Dangers of Weak Cryptography

For one who is not well-versed in “cryptography,” hearing the word might simply bring to mind the language game Pig Latin. However, Singh is trying to convey, in layman’s terms, that cryptography is not a child’s game for all; in Mary Queen of Scots’ case, it was literally an instance of life or death. The […] Continue reading

Posted in amateur cryptography, cryptanalysis, security, Singh, Student Posts, The Code Book, weak cryptography | Comments Off on The Dangers of Weak Cryptography