Linkmarks
Items waiting in the Pocket queue: 3527
Public-private key system... Take a public key based on a huge number which is the result of two prime numbers multiplied together (a prime number being one which can be divided only by itself or by one). You use this number to encode your message but you do not need to know the two original prime numbers. Only the person decoding the message needs to know, because the text was encoded using an equation and both numbers are needed to...
2004-06-15
cryptographyIn 1952 Turing was prosecuted for gross indecency after admitting a sexual relationship with a man. Two years later he killed himself.
2009-08-31
Alan Turing gay mathematics cryptography artificial intelligenceAttrition.org is a computer security Web site dedicated to the collection, dissemination and distribution of information about the industry for anyone interested in the subject. They maintain one of the largest catalogs of security advisories, text files, and humorous image galleries. They are also known for the largest mirror of Web site defacements and their crusade to expose industry frauds and inform the public about incorrect...
Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux
Scientists have found that by varying the voltage to key parts of a computer's processor, the ability to keep this data secret is compromised.
2010-04-26
security cryptography CPU encryption chip voltage hackingA science historian in Manchester claims to have deciphered secret messages hidden in the ancient writings of the philosopher Plato.
2010-06-29
history Plato philosophy Pythagoras cryptography mathematics science hiding music sonificationA novel use of encryption by whistle-blowing website Wikileaks could "challenge the legal system for years to come," according to an influential observer of the hacking community.
2010-08-19
WikiLeaks cryptography politics insurance fileA project that could radically reduce the amount of personal information we share in our dealings has been revealed by IBM researchers.
2010-12-09
privacy cryptography identificationThe National Museum of Computing has finished restoring a Tunny machine - a key part of Allied code-cracking during World War II.
2011-05-27
encryption WWII cryptography hacking history computer