Overview of Encryption II

Describing how to obtain a shared key without prior trusted contact.

Overview of Encryption I

Codes and ciphers are important when securing communications. This is a quick primer on several methods.

Data Mining 101: Finding Subversives with Amazon Wishlists

This article describes how anybody in the world can develop sophisticated profiles of hundreds of thousands of U.S. citizens, using only free and publicly available resources.
Syndicate content