Security

Overview of Encryption II

[inline:1]
Describing how to obtain a shared key without prior trusted contact.

Overview of Encryption I

[inline:1]
Codes and ciphers are important when securing communications. This is a quick primer on several methods.

Data Mining 101: Finding Subversives with Amazon Wishlists

[inline:1]
This article describes how anybody in the world can develop sophisticated profiles of hundreds of thousands of U.S. citizens, using only free and publicly available resources.
Syndicate content