Sublime
An inspiration engine for ideas
On Technology
Sriya Sridhar • 4 cards
digital surveillance - private entities
The correct use of a strong cipher is a clear boon to sender and receiver, but the misuse of a weak cipher can generate a very false sense of security.
Simon Singh • The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Ronald Fry’s Hammerhead Six: How Green
David Tucker • United States Special Operations Forces
In fact, Britain had captured thousands of Enigma machines, and distributed them among its former colonies, who believed that the cipher was as secure as it had seemed to the Germans. The British did nothing to disabuse them of this belief, and routinely deciphered their secret communications in the years that followed.
Simon Singh • The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Richard Marcinko’s Rogue Warrior is most notable for its controversial author, who helped pioneer SOF special mission units and then was one of the first to also write about them (Marcinko 1992).
David Tucker • United States Special Operations Forces
This marvelous Theorem, grasped in a once-in-a-lifetime flash of intuition by Tom Rohe of Bremerton, Washington[xli], will serve as our introduction to the grim topic of Systems-exploitation: DESIGNERS OF SYSTEMS TEND TO DESIGN WAYS FOR THEMSELVES TO BYPASS THE SYSTEM We pause only briefly to validate it with a well-known example from Government: E
... See more