//
archives

security

This tag is associated with 3 posts

An anti-hacker puzzle

Following on from my previous post … Here’s a simple puzzle challenge. The SHA256 hashing algorithm (see earlier post: Immutable data) converts any string of text (integers or letters) into a (near) unique 64 character long string of numbers and letters. Using this algorithm the string “301253” (someone’s birthdate) translates to the string of characters … Continue reading

Why hackers have to work hard

A 4 digit mechanical combination lock is designed so that a person trying to break into your locker (a padlock hacker) would have to try on average 5,000 combinations (104/2). That’s about 2-5 hours work, which is a big investment in time, and before the hacker exhausts all iterations he or she may well be … Continue reading

Mastering the universe

The Guardian newspaper recently ran a cover story on GCHQ’s top-secret project Mastering the Internet. According to a helpful summary from wired.co.uk, it seems that the UK and US intelligence services have invoked a legal workaround that avoids domestic restrictions on intelligence gathering. The NSA in the USA can check up on UK citizens and GCHQ … Continue reading

University of Edinburgh logo

Richard on Facebook

Latest FB image
Or "like" my Facebook page for blog updates.

Try a one year research degree

book cover
book cover

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 510 other followers