Tags » Cryptography

Articles on High End Hacking

A couple of useful article s at wired.com this week, putting some technical flesh on the bones of the reports about spyware.

Kim Zetter gives a nice explanation of the “firmware hack” as… 730 more words

Sociotechnical

Cryptography in .NET talk at the Derbyshire.Net User Group

I will be doing a talk at the Derbyshire Dot Net user group on March 26th 2015 in Derby. The talk will be on Cryptography in .NET.   203 more words

Cryptography

Revengeance Data Storage - #10 Cryptography, The Scientist’s Morality, and Bad Writing

Some disjointed observations before the big reveal.

There are a couple of things worth mentioning in Raiden’s codec conversation with Boris, and in the next one with Doktor, aside from themes we have already explored. 684 more words

Metal Gear Rising

OPEN SYSTEMS and CONDITIONAL MIXING

When we think of encryption schemes, from Claude Shannon’s perspective, it is a reversible mixing process between the MESSAGE (which must be protected) and a KEY (a randomly generated string or password). 552 more words

Cryptography

“You can’t have privacy without security, and I think we have glaring failures in computer security in problems that we’ve been working on for 40 years. 98 more words

Infosec

Nature Message

Each patrol must find natural items and arrange them so that the initial letters form a message.  After each patrol has completed their message, have the patrols switch and try to read the message. 27 more words

Games