Sun Microsystems, Scott McNealy admitted that the public has no privacy (Carr 530). Google CEO, Eric Schmidt stated that algorithms can be used to predict where a person is headed based on their past cellphone messages and locations (Carr 531). Bruce Schneier, a computer security expert, remarks, similarly to Carr’s thesis, that privacy is essential to our civil liberties (Carr 531). Along with those other reliable sources, the reader can find the author himself is a credible source. Carr…
The first Macintosh computer was released by Apple, Inc. in 1984 (“Apple”), following the first personal computer, or PC, released by IBM in 1981 (Sahoo). Since then, computers and laptops have evolved a lot, and have come a long way from what they once were. Now, in this modern era, there is an ongoing debate between the Mac and the PC. The question is: which is better? The obvious answer is the Mac because they are not susceptible to viruses like PCs, are rated highest in customer satisfaction…
the information of Ukrainian leaders. Non affiliated hackers potentially could have exploited the flaw for the time it was available. (Yardon) Similar events can happen when the NSA installs backdoors. A cryptography writer and technologist, Bruce Schneier, spoke on the subject: “We have examples of the NSA going in and deliberately weakening security of things that we use so they can eavesdrop on particular targets.” He also posed the question: “Should we compromise the security of everybody…
In her persuasive essay “Your E-Book Is Reading You,” Alexandra Alter claims that through the use of digital books, reading books is no longer a private act by consumers. According to Alter, personal reading habits can now be tracked by the publishing world; used to improve book and e-book sales; and shared semi-publicly. Alter contends that in the pre-e-book era, the literature business could not know a person’s unique reading habits (for instance, whether a consumer even finished a book he or…
Recent information leaks from whistle blowers, such as Edward Snowden, and Julian Assange, revealed that the NSA had increased its mass surveillance, specifically with regards to the collection of ‘big data’. While some commentators, say that mass surveillance is a necessary evil (Monk, 2013), and that “you have nothing to fear if you have nothing to hide”, others say that state mass surveillance is a gross misuse of power (Suleman, 2013). This essay will seek to critically discuss both the…
Giving illegal immigrants driver’s license would help law enforcement catch terrorist faster; As Bruce Schneier, Security technologist and prolific author on security-related issues informs “The state driver’s license databases are . . . more complete, and contain more information . . . than the IRS database, the Social Security database, or state birth…
Abstract— the focus in this paper is on the symmetric encryption. There are some basic information about this type of cryptography will be reviewed. Then, symmetric cryptography advantages and problems will be covered. After that, comparison on several symmetric algorithms are discussed. These algorithms are DES, Triple DES, AES, RC2, RC4, RC6, and Blowfish. Keywords—Cryptography, Symmetric Encryption, Encryption, Decryption, DES, Triple DES, AES, RC2, RC4, RC6, Blowfish. I. INTRODUCTION…
Imagine this. You walk out of your house, grab the newspaper, look at the newspaper while you walk to your car, and finally get into your car. You start the car and drive to the bank. You were staring at the newspaper for so long that you weren’t paying attention to the person parked behind you. Now they know where your house is and what kind of car you drive. You drop your kids off at daycare. They now know what your kids look like and where they are during the day. This person follows you and…