When you think about the Raspberry Pi board you probably don’t think about GCHQ, but you might well think about computing clusters. In this instance, clusters of Pi.Continue Reading
Their wiki page also includes a brief history of paper enigma models that traces the origins of this method back to Alan Turing’s hypothetical “comic strips” model from his 1942 Treatise on the Enigma. To make it, download the PDFs, print them out, cut them out, and apply them to a 75mm diameter cardboard tube.Continue Reading
The 50-cent word here is “steganography,” which per Wikipedia is “the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.” You may have heard, for instance, that you can encode a hidden message in, say, an image file, in such a way that no one who wasn’t looking for it would know that it’s there.
Well, this morning Danger Room linked to a post at IEEE Spectrum to the effect that Voice Over Internet Protocol (VOIP) is particularly susceptible to steganographic hijinks. Wired’s David Pierce put it this way:Continue Reading
Those inspired crazies at Mythbusters, Adam Savage and Jamie Hyneman, built a giant, working coding cryptex. The device was built for a demo at the RSA Conference, held at the Mascone Center in SF, in April. Now the pair is auctioning it off on eBay. Proceeds from the sale will go to the EFF. You […]Continue Reading