The History and Mathematics of Codes and Code Breaking

Tag: Passwords

Careful Campus

After recently watching Citizenfour, I feel myself being much more cautious about what I search on the web. I do not do this because I have anything to hide, but because people do not act the same when they believe, or in this case know, they are being surveilled. These podcast episodes did not exactly put my mind at ease either. With problems such as ransomware and botnet, it seems a lack of knowledge could cost the average citizen a lot more than a few lost files. Therefor, the question remains, how do we protect ourselves from these cyber attacks?

College students around the world use their devices for primarily social media. Some of that content is private in the sense that you only want a select amount of people to be able to view it. So, how do we protect our accounts? The best way also is the most simple: long and complicated passwords. The more random and lengthy the password is, the harder for an attacker to gain access. Another caution to hold in your mind brings me back to the video we watched about the reporter who visited “hacker-con” in Russia. To show the ease and speed with which an attacker can infiltrate a device, the interviewees set up a fake wifi account under the hotels name. The reporter logged on to the wifi and the attackers were then able to snake-hole their way through the rest of her passwords and locks with ease. If I could offer two pieces of substantial advice for fellow college students I would offer: use strong passwords and always be vigilant of what you connect with your device.


More Data, More Leaks

I am currently planning to write my first essay about the essay “Hello Future Pastebin Readers” by Quinn Norton. This essay is mainly intriguing to me because it is an important reminder that the publication of most people’s private information is nearly inevitable. It is interesting to realize how much of our information we make freely available without any concern about the repercussions. From Snapchatting our locations to checking in on Facebook, we constantly broadcast our information to everyone who can listen without any hesitation.

It’s also important to me that I had never considered the concept of “Over time, all data approaches deleted, or public.” This is a ‘law of data’ penned by the author, Quinn Norton. He claims that this rule has always been applicable to data, but it is only with the internet that the rule became so important to recall. The point of this rule is to remember that data often ends up in locations where it wasn’t intended to end.

I’m excited to write an essay about this topic specifically, because it is an issue which I believe is important and needs to be brought to light for modern society. It’s compelling to me that this topic is so obscure to most people. I hope that my essay will help change everyone’s opinion about public data.

Powered by WordPress & Theme by Anders Norén