Hash blogs

Hash is a prominent term in computing and cryptography, according to the OED, “so called because it consists of small pieces of code arranged in an apparently jumbled and fragmented way.” See posts tagged hash. To hash is to chop up, to hack, a term applied readily to food (recooked and chopped meat), narcotic dried…More

Hiding messages in DNA

DNA origami is predicated on various tropes of hiddenness: nano-scale locked “boxes” made of folded DNA strands to conceal active molecular agents (enzymes, drugs, active DNA material) from their immediate environments where they may be harmed or cause harm. Nano-objects are in any case hidden from direct view, detected via sensing apparatus such as electron…More

Nano-origami

Using techniques I alluded to (briefly) in my previous post, genetic engineers fabricate, isolate and deploy a class of short DNA strands (20 or so DNA base-pairs) known as staples (oligonucleotides). There are techniques for inserting these staples into long DNA strands at specific locations to cause the strand structures to fold. So the double…More

DNA cryptography

Developments in biotech impact on the spatial implications of cryptography. DNA involves sequences of just 4 molecules connected in pairs in a double helix configuration. These nucleotide molecules are adenine (A), cytosine (C), guanine (G), and thymine (T). The DNA in a human cell is made up of about 3.2×109 of these pairs, normally tangled…More

How to make up words

ETAOINS are the 7 most commonly used letters in the English language. See post: Counting letters. Perhaps we could communicate with just those seven letters. https://unscramblex.com is a website that provides all anagrams of up to 15 characters. There are 178 anagrams of ETAOINS. If you want include words where letters occur together (EE, TT,…More

Codes and legals

Code is a useful term, not least as it has several meanings: rules, laws, computer programs, hidden messages. You can code and decode messages. The terminology around cryptographic ciphers is more restricted. It invokes meanings related to hidden writing. According to Simon Singh in The Code Book, “A cipher is the name given to any…More

Greening the blockchain

While the 2021 United Nations Climate Change Conference COP26 takes place in Glasgow this week, attention turns to the energy waste of cryptocurrency transactions. A substantial part of the cost resides with the “proof of work” (PoW) process by which validating nodes on a blockchain compete to solve a numerical puzzle the solution to which…More

“Smart city” claims

A “smart” public transportation network is one where schedules and real-time data are delivered on demand to smartphone users. Such an effective and “smart” system enables a traveller to transition from bus to train to tram without having to wait due to missed connections. The system adapts its information flows to the traveller’s changing needs…More

Cities as media

I’ve been searching for a way to transition from alien communications (as an exercise in cryptography) back to earth-bound cities. (See previous post.) Shannon Mattern’s interesting book Code and Clay, Data and Dirt: Five Thousand Years of Urban Media helps. It includes an aerial image of a geoglyph figure in the Nazca Desert (Peru) of…More

Alien moods

The quest for communication with extraterrestrial intelligences teaches us more about human culture than we are likely to learn from putative aliens. Inquiry into alien communication leads inevitably to speculations about such communications as presented in plays, films, sound works and video games. Alien movies The composer John Williams has scored several films about aliens.…More