Hash blogs

Hash is a prominent term in computing and cryptography, according to the OED, “so called because it consists of small pieces of code arranged in an apparently jumbled and fragmented way.” See posts tagged hash. To hash is to chop up, to hack, a term applied readily to food (recooked and chopped meat), narcotic dried…More

Less is more: Signatures, cities and hash codes

In 1997, the Hubble Space Telescope’s Imaging Spectrograph (STIS) picked up the signature of a black hole. Instead of a vertical straight scan line, the STIS showed an S shape. Signatures point to the presence of something (a referent). But you see the thing only indirectly, i.e. you get to know that the referent exists,…More

Sign here ……………………

How do signatures function? A signature is a sign, seal, or mark on a document indicating its authenticity, as when a painter signs a painting, or someone signs a letter or legal document. The signature and the thing it marks is meant to be a one-off. The signature marks an original document, before the thing…More

An anti-hacker puzzle

Following on from my previous post … Here’s a simple puzzle challenge. The SHA256 hashing algorithm (see earlier post: Immutable data) converts any string of text (integers or letters) into a (near) unique 64 character long string of numbers and letters. Using this algorithm the string “301253” (someone’s birthdate) translates to the string of characters…More

Why hackers have to work hard

A 4 digit mechanical combination lock is designed so that a person trying to break into your locker (a padlock hacker) would have to try on average 5,000 combinations (104/2). That’s about 2-5 hours work, which is a big investment in time, and before the hacker exhausts all iterations he or she may well be…More