0
7

[–] glUniform4fv 0 points 7 points (+7|-0) ago 

Skimming over some of the articles, they feel a bit rushed. It's very daring to have one article titled What is encryption with just a few paragraphs and already include asymmetric encryption. I would think that the importance of that distinction goes a bit over the head of people confronted with it for the first time and to get a grasp of how incredibly important and revolutionary the idea of public key encryption is for our modern society requires more context.

But I guess it's a work in progress and for those who already have a basic understanding it might be useful.

0
3

[–] ChaoticNeutral [S] 0 points 3 points (+3|-0) ago 

I haven't gone through the site much. I thought if nothing else it would give people a place to start and pique their interest. It seemed to make things approachable.

0
1

[–] Kiwibomb 0 points 1 points (+1|-0) ago 

Thank you

0
3

[–] Interface 0 points 3 points (+3|-0) ago 

Thank you, bookmarking this for later use.

1
2

[–] FuttsMcButts 1 points 2 points (+3|-1) ago  (edited ago)

Check out Steganography!* It's insanely hard to reverse if you don't have the original carrier to compare the one carrying the payload with and if you have a large enough carrier; you wont see clear degradation of quality with the human eye and any imperfections are negligible unless compared to the pixel with the original photo.

When using carriers off the internet; Apply a filter and mess around with some pixels. This way while they can still most likely reverse lookup your carrier. they cant use the original to compare to your stegged file.

I'm only really on here at work so I can't help too much; but for those interested lookup a program called OpenPuff and youtube some tutorials!

0
3

[–] TrayFly 0 points 3 points (+3|-0) ago 

I think you mean steganography. It's as if they tried to hide a message in there.. But it's very cool! If cryptography ever becomes infeasible this is the new way to go.

0
2

[–] ChaoticNeutral [S] 0 points 2 points (+2|-0) ago 

I've been wanting to learn more about this! Do you have any resources to point me to?

0
3

[–] TrayFly 0 points 3 points (+3|-0) ago 

I've found this paper to be really interesting with many examples.

0
1

[–] Tera_GX 0 points 1 points (+1|-0) ago 

Is this focused on cryptography as it applies to digital security, or the broader idea that also applies to classic puzzles?

0
1

[–] ChaoticNeutral [S] 0 points 1 points (+1|-0) ago 

Not entirely sure. I've been studying crypto for a while now but I wanted to help other people get started. I just found this site and thought new people might like it.

You may also like this book. I read it some time ago and it got me going.

0
1

[–] piplupturtwig 0 points 1 points (+1|-0) ago 

Thanks, I'm going to learn this.

0
1

[–] thuglas 0 points 1 points (+1|-0) ago 

This is super helpful to teach people who don't understand how to protect and obscure themselves from rogue authority.

0
0

[–] ILoveCookies 0 points 0 points (+0|-0) ago 

I think a better place to learn cryptography would be khanacademy. They have a really good section here. They have how cryptography became essential from the Roman empire to the German's enigma machine all the way to the bank transactions.

0
0

[–] ChaoticNeutral [S] 0 points 0 points (+0|-0) ago 

That sounds like the Code Book by Singh that I linked elsewhere. The more resources the better.

0
0

[–] Atarian 0 points 0 points (+0|-0) ago 

It's funny, I've been trying to re-implement the MD5 hashing algorithm in C so I can port it to Atari TOS.

These articles could do with a lot more detail.

0
1

[–] ChaoticNeutral [S] 0 points 1 points (+1|-0) ago 

You're right. I think the point was to teach people some basics and get them looking at more.

load more comments ▼ (1 remaining)