View allAll Photos Tagged cryptography
My 10yo's Girl Scout troop has asked parents to take turns teaching the girls something interesting. My turn was yesterday, and I spent a very noisy hour and half teaching them about cryptography. Did you know that fourth grade girls have LOTS of energy? The troop leader managed to find a patch for the session, a "mystery" patch. I'm pretty sure the Girl Scouts have a patch for everything...
bodley30.bodley.ox.ac.uk:8180/luna/servlet/detail/ODLodl~... Collection:
Masterpieces of the non-Western book
filename:
oulis2006-agv0063
Folio or page:
fol. 25b
Caption:
Astrology: the children of the planets (1). Astrological - astronomical image. From a 15th-century Arabic collectaneous manuscript known as Kitab al-bulhan.
Detail (Materials and Techniques):
watercolour on paper
Detail (dimensions):
245 x 160 mm. (page)
Detail (date of creation):
15th century AD
Conditions of Access for Image:
By permission of The Bodleian Library, University of Oxford
sort order:
120
Detail (style or culture of origin):
Arabic
Shelfmark:
MS. Bodl. Or. 133
Description:
Composite manuscript, dating principally from the late 14th century A.D., containing astrological, astronomical and divinatory texts compiled by Abd al-Hasan Al-Isfahani, with paintings of the constellations of the zodiac, of demons, illustrations of stories, and geomantic illustrations of the prophets, and a cryptographic inscription in 17th-century English hand. Fol. 81a is in Turkish.
Title:
Kitab al-Bulhān ... [etc.]
Type of Object:
Ms. codex
Material:
oriental paper
Number of leaves:
ff. vi ii 176 iv
Dimensions:
245 x 160 mm.
Layout:
Various page formats
Decoration:
Illustrations, miniatures
Date of Origin:
1390-1450
Country or culture of origin:
Arabic
Class:
illuminated manuscript
Class:
Arabic
Language:
Arabic
Catalogue Reference:
Stefano Carboni, Il Kitab al-bulhan di Oxford (Torino, 1988)
SEVEN SECRET ALPHABETS
Anthony Earnshaw
A very remarkable book. The replacement of a conventional capital letter at the beginning of a chapter by some kind of visual pun is as old as the illuminated book, but Earnshaw has succeeded in divorcing it from its customary aesthetic role, stripped it of any scene-setting function. His letters, comic or sinister, exist in their own right. Each image hides its secret until it finds its place. Even then it may prove evasive. The alphabets suggest an alternative reality where humour and disaster are interchangeable and the laws which govern nature are bent certainly, but only very little. An imagination in no way forced selects an apparently arbitrary image at a precise moment . . . Letters, those haphazardly invented signs, those abstract shapes we hear as sounds, take on a concrete meaning of their own.
Guardian
It is fair to say th at the author explores a landscape which suggests Magritte and Monty Python. The humour is austere, bleak and if not black, at least charcoal grey. As a feat of imagination the work is outstanding.
The Times Educational Supplement
Earnshaw has a devious, allusive, surrealist interest in letters. His imagination is full of wit; each image is a humorous vignette, an unlikely collusion of images in the form of a letter. Such shifting of context is the source of all humour. By providing a main-line to the unconscious and suggesting a revaluation of the essential symbols of which language is constituted, he makes his work compulsive and compulsory viewing.
Arts Review
JONATHAN CAPE
THIRTY BEDFORD SQUARE LONDON
by Eric Thacker and Anthony Earnshaw
MUSRUM
WINTERSOL
Corrigendum
THE ISBN FOR THE PAPERBACK EDITION OF
SEVEN SECRET ALPHABETS
BY ANTHONY EARNSHAW
SHOULD READ ISBN 022401383 I
FIRST PUBLISHED 1972
© 1972 BY ANTHONY EARNSHAW
JONATHAN CAPE LTD, 30 BEDFORD SQUARE, LONDON, WCI
ISBN 022400795 5
PRINTED AND BOUND IN GREAT BRITAIN BY
W & J MACKAY LIMITED, CHATHAM
Geheimschreiber
Although the ENIGMA remains the best know German cryptographic machine of World War II, in the early 1940's the German military introduced several new cryptographic teletypewriters known under the name Geheimschreiber - sometimes translated as "private secretary", sometimes as "secret writer".
These machines offered on-line encryption and decryption, that is plain test could be typed directly into the machine, automatically converted to encrypted text, and sent directly to the transmitter. In addtion to security, these "secret writers" provided the Germans with the ability to encrypt large volumes of test at high speed.
Learning that the Germans had named an early version of these machines SWORDFISH, the British and Americans bestowed nicknames associated with fish on the machines and the communications links in which they were used. The two most famous are TUNNY and STURGEON.
Just as they developed the Bombe to assist decryption of ENIGMA , the British developed data processing to attack the fish family of machine ciphers. (I must add: This was a whale of a job!) This led to the construction of the COLOSSUS which British historian F. H. Hinsley is "justly claimed as a pioneer programmable electronic digital computer."
STURGEON Siemens and Halske T52
The German Air Force began using the Siemens T-52 in 1942. The British nicknamed the machine STURGEON. Prototypes of this machine were developed at the request of the German Navy and were first manufactured in 1932.
Like the TUNNY machine, the STURGEON provided the German military with on-line cryptographic encryption decryption with high speed for large volumes of messages. The STURGEON added encryption capability to a standard teleprinter, although some models of STURGEON were later adapted for direct radio transmission.
There is a great report concerning TUNNY and COLOSSUS at www.alanturing.net/tunny_report/
Source: National Cryptologic Museum 13 February 2009 with some hyperlinks added
i09_0214 090
Misc, Foreign, Computer 'stories', Technical Computer stuff, MAKE
Falling Up
The Lorax
Spanish Pocket Dictionary
Japan (The Story of a Nation)
Sushi
The Book of Tea
Steve Jobs: Thinks Different
Fire in The Valley (The Making of The Personal Computer)
The Second Coming of Steve Jobs
Apple Confidential 2.0
PHP 2nd Edition
Learning XML
Visualizing Data
Javascript Pocket Reference
CSS Pocket Reference
XSLT
Just For Fun
Nightwork
The Art of Deception
The Art of Intrusion
Crypto Anarchy, Cyberstates, and Pirate Utopias
Internet Cryptography
Make: Magazine, 01, 03, 04, 05, 06, 07, 08, 08, 10, 11, 12, 13 (WHERE IS 02?!)
Craft: 03
Feltron Annual Report 2007 (On top of everything)
Bitcoin (₿) is a cryptocurrency, a form of electronic cash. It is a decentralized digital currency without a central bank or single administrator that can be sent from user-to-user on the peer-to-peer bitcoin network without the need for intermediaries. Transactions are verified by network nodes through cryptography and recorded in a public distributed ledger called a blockchain. Bitcoin was invented by an unknown person or group of people using the name Satoshi Nakamoto and released as open-source software in 2009. Bitcoins are created as a reward for a process known as mining. They can be exchanged for other currencies, products, and services. Research produced by the University of Cambridge estimates that in 2017, there were 2.9 to 5.8 million unique users using a cryptocurrency wallet, most of them using bitcoin. Bitcoin has been criticized for its use in illegal transactions, its high electricity consumption, price volatility, thefts from exchanges, and the possibility that bitcoin is an economic bubble.Bitcoin has also been used as an investment, although several regulatory agencies have issued investor alerts about bitcoin.
The Postcard
A Double L Comic postcard published by Leslie Lester Ltd. of Hurstpierpoint Sussex. The artwork was by H. Lime, and the card was printed in Great Britain.
The card was posted in Newport, Isle of Wight on Tuesday the 3rd. July 1951 to:
Mr. & Mrs. Blackford,
'Trevone',
Fifth Road,
Newbury,
Berks.
The message on the divided back of the card was as follows:
"Just a card to let you
know we are having
wonderful weather and
a wonderful time.
We can't keep Queenie
out of the water.
John has continually
been up to his knees as
well.
Love from Ruth, John, &
Queenie".
Diana Dors
So what else happened on the day that the card was posted?
Well, on the 3rd. July 1951, Diana Dors married Dennis Hamilton Gittins at Caxton Hall. She had met Dennis in May 1951 while filming 'Lady Godiva Rides Again', a film which has uncredited appearances by Joan Collins, and a four-months pregnant Ruth Ellis who was subsequently hung for murder.
Dors described herself as:
"The only sex symbol Britain has
produced since Lady Godiva".
Diana Dors (born Diana Mary Fluck on the 23rd. October 1931) was an English film actress and singer. Diana claimed that the producers of her first film required her to change her name:
'They asked me to change my name.
I suppose they were afraid that if my
real name Diana Fluck was in lights
and one of the lights blew ......."
Diana first came to public notice as a blonde bombshell in the style of American Marilyn Monroe, as promoted by her first husband, Dennis Hamilton, mostly via raunchy film comedies and risqué modelling.
After it turned out that Hamilton had been defrauding her, she continued to play up to her established image, and she made tabloid headlines with the parties held at her house.
Later, she showed a genuine talent for TV, recordings, and cabaret, and gained new popularity as a regular chat-show guest.
Death of Diana Dors
Dors died on the 4th. May 1984, aged 52, at the Princess Margaret Hospital in Windsor from a recurrence of ovarian cancer, first diagnosed two years before.
She had converted to Catholicism in early 1973; hence, her funeral service was held at the Sacred Heart Church in Sunningdale on the 11th. May 1984. She was buried in Sunningdale Catholic Cemetery.
Alan Lake
After her death, her third husband Alan Lake burned all of Dors' remaining clothes and fell into a depression.
On the 10th. October 1984, Lake did a telephone interview with Daily Express journalist Jean Rook, and then he walked into their son's bedroom and took his own life by firing a shotgun into his mouth. He was 43. This was five months after Diana's death from cancer, and 16 years to the day since they had first met.
The Secret Code
Dors claimed to have left a large fortune to her son in her will, via a secret code in the possession of her third husband, actor Alan Lake.
In 2003 cryptography firm Inforenz cracked the code, revealing a list of names and towns. It is thought that a second encrypted sheet exists which contains bank account numbers. So far this second sheet has never been found.
Taken at the National Cryptologic Museum, NSA.
Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.
Geheimschreiber
Although the ENIGMA remains the best know German cryptographic machine of World War II, in the early 1940's the German military introduced several new cryptographic teletypewriters known under the name Geheimschreiber - sometimes translated as "private secretary", sometimes as "secret writer".
These machines offered on-line encryption and decryption, that is plain test could be typed directly into the machine, automatically converted to encrypted text, and sent directly to the transmitter. In addtion to security, these "secret writers" provided the Germans with the ability to encrypt large volumes of test at high speed.
Learning that the Germans had named an early version of these machines SWORDFISH, the British and Americans bestowed nicknames associated with fish on the machines and the communications links in which they were used. The two most famous are TUNNY and STURGEON.
Just as they developed the Bombe to assist decryption of ENIGMA , the British developed data processing to attack the fish family of machine ciphers. (I must add: This was a whale of a job!) This led to the construction of the COLOSSUS which British historian F. H. Hinsley is "justly claimed as a pioneer programmable electronic digital computer."
The 40 (SZ40) when first encountered in 1940 was nicknamed TUNNY by the British - after a fish better known to Americans as TUNA.
The Schlüsselzusatz SZ40, manufactured by the German firm Lorenz, was used by the German Army for high-level communications, generally between Army groups. It provided on-line encryption and decryption and was capable of handling large volumes f traffic at high speed. The TUNNY depended on wheels for encryption and decryption but unlike ENIGMA it did nut substitute letters but insted encrypted elements of the electrically generated Baudot code used in normal telegraphic transmissions.
Source: National Cryptologic Museum 13 February 2009 with some hyperlinks added
i09_0214 085
Taken at the National Cryptologic Museum, NSA.
Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.
Quadratic Voting (QV) aims to bring the efficiency of markets to collective decision making by pricing rather than rationing votes. The proposal has attracted substantial interest and controversy in economics, law, philosophy and beyond. The goal of this conference is to evaluate the promise of Quadratic Voting and to stimulate research on QV from a broad range of perspectives. Leading scholars from disciplines ranging from classics to cryptography will present their work on diverse issues related to QV, including the history of the ideas behind it, practical implementation for market research surveys, objections to the use of money in politics and how QV might have averted political disasters in history. The conference papers will be published in a special issue of Public Choice in 2017, following up on a parallel special issue forty years prior on the use of the Vickrey-Clarke-Groves mechanism for collective decisions.
Friedman, known as the father of cryptography, had an ability to choose people with special talents to attack the problems faced during World War II. One of those people was John B. Hurt from Viginia. He was the nephew of a congressman, which might have played a role in the decision to hire hime, but he had an amazing mind, perfrectly suited to the job.
On one occasion, Solomon Kullback, Frank Rowlett, and Abraham Sinkov (true greats in American cryptology) were pondering over an SIS (Signal Intelligence Service) message from a prisoner in Columbus, Ohio. It had been written in invented symbols and they were looking a letter frequencies. As Hurt passed by, he looked over their shoulders and started reading the message almost immediately. His uncanny ability to recognize linguistic patterns also led to a major cryptanalytic breakthrough in solving the Japanese diplomatic cipher system known as PURPLE.
He taught himself Japanese without going to school or having any formal training. He had a Japanese neighbor and some Japanese roomates at the University of Virginia and managed to absorb his knowledge of the language from them.
Friedman decided to take a risk with Hurt. Originally, he was looking for a person who knew Japanese and mathematics, but Hurt had no penchant for mathematics. He disliked formal analytical procedures, finding them tedious, but had a knack for just throwing himself into a cipher problem and recognizing patterns of words.
Frank Rowlett says:
Sinkov, Kullback, and I were hired because we had all studied math and foreign languages-Sinkov had taken French; Kullback, Spanish; and I, German. Friedman's efforts to round out the team with a combination mathematician and Japanese linguist had so far failed: the Civil Service Commission, Military Intelligence, and the State Department had all been unable to produce anyone with that rather unusual combination of talents. Soon, however, through the good offices of Congressman Schaeffer of Virginia, Friedman learned of a young man named John Hurt, the congressman's nephew, who, though lacking an extensive math background, was unusually fluent in Japanese. The Army major who interviewed him told Friedman that he had never met an American so proficient in that difficult language.
www.nsa.gov/public_info/_files/cryptologic_spectrum/frank...
i09_0214 071
In the 1940s, there were two main schools of practical research into computers: there was the military camp, designing hardware for applications such as ballistics research, military cryptography, and planning the movements of men and machines across a newly imagined notional cold-war battlefield; and then there was the confectionery, baked-goods and frozen deserts camp, which recognised the tremendous potential of these new electronic brains for improving the effectiveness of our tasty tea-time treats. LEO--Lyon's Electronic Office--falls into the latter of these two camps.
In the fantastic new Museum of London galleries they have both a later-model LEO III, as used by the stock-jobbing firm of Wedd Durlacher Mordaunt and Co, and a recreation of the window from the Lyon's Corner House on Coventry Street, filled with Vorticist-styled "Lyon's Petits Fours" tins and the like. Both exhibits are in separate parts of the gallery--one in an area looking at how technology and new media have changed working London, the other looking at modernity in everyday London life in the 1920s.
But the breakneck journey towards the Lord Mayor's Carriage and the gift shop leaves us no opportunity to ask or to answer the big questions. How did Lyon's come to have it's fingers in so many pies (beyond their once-famous Individual Fruit Pies--boom boom!)?
Telecomix Crypto Munitions Bureau works for the benefit of cipherspace. Cipherspace is the state of crypto anarchy. This means that your identity is anonymous as long as you stay protected. There are no identities or authorities in cipherspace, and it is not possible to enforce laws where there is no identity, or where there are no authorities.
Today there are several threats to the inhabitants of the internet. The politicians of oppressive regimes in the east and in the west, in north and south, are imposing surveillance. Surveillance of the entire networks. What people say to each other, what information is transmitted between bots and humans alike.
This aggression must be met with the strongest encryption algorithms available to modern computers. With onion and garlic routing it is possible to erect the fractal cipherspace. With distributed hash tables it is possible to create networks that has no central node. There is no one that controls the fractal cipherspace. Internet as we know it, turns into darknet.
Telecomix Crypto Munitions Bureau recommends that you use the following software: i2p, for anonymous and secure communications, Gnu Privacy Guard, for direct and verified communication. The onion router, TOR, to access the internets.
Telecomix Munitions is a defense bureau.
You can change the future of the internets by joining us in defending the networks and creating cipherspace.
You can help defending yourself and your friends, yes, all inhabitants of the networks.
By learning a few skills you can take control over technology.
Telecomix munitions are currently developing and promoting advanced security devices, which can endure even the harshest forms of government or corporation surveillance.
Your personal computer is an encryption device. Modern hardware can transform plain text to ciphertext with ease. So rapidly you barely notice the difference between unencrypted and encrypted data.
The laws of mathematics are infinitely stronger than the laws of nations and corporations, as the human laws are really only ink on paper. The laws of mathematics, on the other hand, are the laws that define our very universe. With the use of modern crypto algorithms we can use this fact to defend free speech and the integrity of both bots and humans. Information is nothing but numbers, numbers governed not by human laws, but by the laws of mathematics.
Networks that utilize the power of cryptography already exist. It will not be possible to stop the spread of the fractal cipherspace.
To find out more, come to telecomix.org or visit us in cipherspace on telecomix.i2p.
Feel free to visit my works on Deviant Art: xp0s3.deviantart.com/
Daguerreotype New York (1845).
P. 202 in: Shrapnel 3 (1985 - 1989/1990).
---
Edgar Allan Poe (Edgar Poe; January 19, 1809 – October 7, 1849) was an American writer, editor, and literary critic. Poe is best known for his poetry and short stories, particularly his tales of mystery and the macabre. He is widely regarded as a central figure of Romanticism in the United States and American literature as a whole, and he was one of the country's earliest practitioners of the short story. Poe is generally considered the inventor of the detective fiction genre and is further credited with contributing to the emerging genre of science fiction. He was the first well-known American writer to try to earn a living through writing alone, resulting in a financially difficult life and career.
Poe was born in Boston, the second child of two actors. His father abandoned the family in 1810, and his mother died the following year. Thus orphaned, the child was taken in by John and Frances Allan of Richmond, Virginia. They never formally adopted him, but Poe was with them well into young adulthood. Tension developed later as John Allan and Edgar repeatedly clashed over debts, including those incurred by gambling, and the cost of secondary education for the young man. Poe attended the University of Virginia for one semester but left due to lack of money. Poe quarreled with Allan over the funds for his education and enlisted in the Army in 1827 under an assumed name. It was at this time that his publishing career began, albeit humbly, with the anonymous collection Tamerlane and Other Poems (1827), credited only to "a Bostonian". With the death of Frances Allan in 1829, Poe and Allan reached a temporary rapprochement. However, Poe later failed as an officer cadet at West Point, declaring a firm wish to be a poet and writer, and he ultimately parted ways with John Allan.
Poe switched his focus to prose and spent the next several years working for literary journals and periodicals, becoming known for his own style of literary criticism. His work forced him to move among several cities, including Baltimore, Philadelphia, and New York City. In Richmond in 1836, he married Virginia Clemm, his 13-year-old cousin. In January 1845, Poe published his poem "The Raven" to instant success. His wife died of tuberculosis two years after its publication. For years, he had been planning to produce his own journal The Penn (later renamed The Stylus), though he died before it could be produced. Poe died in Baltimore on October 7, 1849, at age 40; the cause of his death is unknown and has been variously attributed to alcohol, brain congestion, cholera, drugs, heart disease, rabies, suicide, tuberculosis, and other agents.
Poe and his works influenced literature in the United States and around the world, as well as in specialized fields such as cosmology and cryptography. Poe and his work appear throughout popular culture in literature, music, films, and television. A number of his homes are dedicated museums today. The Mystery Writers of America present an annual award known as the Edgar Award for distinguished work in the mystery genre (Wikipedia).
Geheimschreiber
Although the ENIGMA remains the best know German cryptographic machine of World War II, in the early 1940's the German military introduced several new cryptographic teletypewriters known under the name Geheimschreiber - sometimes translated as "private secretary", sometimes as "secret writer".
These machines offered on-line encryption and decryption, that is plain test could be typed directly into the machine, automatically converted to encrypted text, and sent directly to the transmitter. In addtion to security, these "secret writers" provided the Germans with the ability to encrypt large volumes of test at high speed.
Learning that the Germans had named an early version of these machines SWORDFISH, the British and Americans bestowed nicknames associated with fish on the machines and the communications links in which they were used. The two most famous are TUNNY and STURGEON.
Just as they developed the Bombe to assist decryption of ENIGMA , the British developed data processing to attack the fish family of machine ciphers. (I must add: This was a whale of a job!) This led to the construction of the COLOSSUS which British historian F. H. Hinsley is "justly claimed as a pioneer programmable electronic digital computer."
STURGEON Siemens and Halske T52
The German Air Force began using the Siemens T-52 in 1942. The British nicknamed the machine STURGEON. Prototypes of this machine were developed at the request of the German Navy and were first manufactured in 1932.
Like the TUNNY machine, the STURGEON provided the German military with on-line cryptographic encryption decryption with high speed for large volumes of messages. The STURGEON added encryption capability to a standard teleprinter, although some models of STURGEON were later adapted for direct radio transmission.
Source: National Cryptologic Museum 13 February 2009 with some hyperlinks added
Interesting T52 link www.quadibloc.com/crypto/te0302.htm
i09_0214 083
Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but
Certainly!
Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.
The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.
In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.
In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.
Royal Holloway University of London (Information Security Group) lecture.
Blog: makaylalewis.co.uk/2013/10/02/sketchnotes-intro-to-crypto1/
©ALL RIGHTS RESERVED.
These photographs are presented here for viewing purposes ONLY. They are NOT royalty free images and may not be used for commercial or private use. Any such use of these images is strictly prohibited. Specifically, these images may not be copied, manipulated, be reproduced by any other means nor sold without prior written consent by the author.
The Codebreakers by David Kahn
Because The Codebreakers dealt with several potentially sensitive subjects, like the National Security Agency, the US Intelligence and defense communities asked to review the manuscript prior to publication. After its review, the Department of Defense stated they "deplored the book" and "it would not be in the national interest to publish it." Kahn deleted certain portions related to NSA and the book was published without further incidence.
Source of material : National Cryptologic Museum
The Codebreakers (from Wikipedia article on David Kahn)
The Codebreakers comprehensively chronicles the history of cryptography from ancient Egypt to the time of its writing. It is widely regarded as the best account of the history of cryptography up to its publication. William Crowell, the former deputy director of the National Security Agency, was quoted in Newsday as saying "Before he (Kahn) came along, the best you could do was buy an explanatory book that usually was too technical and terribly dull." Kahn, then a journalist, was contracted to write a book on cryptology in 1961. He began writing it part-time, at one point quitting his regular job to work on it full time. The book was to include information on the National Security Agency (NSA), and according to the author James Bamford writing in 1982, the agency attempted to stop its publication, and considered various options, including publishing a negative review of Kahn's work in the press to discredit him. A committee of the United States Intelligence Board concluded that the book was "a possibly valuable support to foreign COMSEC authorities" and recommended "further low-key actions as possible, but short of legal action, to discourage Mr. Kahn or his prospective publishers". Kahn's publisher, the Macmillan company, handed over the manuscript to the Federal government for review without Kahn's permission on 4 March 1966. Kahn and Macmillan eventually agreed to remove some material from the manuscript, particularly concerning the relationship between the NSA and its British counterpart, the GCHQ.
The Codebreakers did not cover most of the history concerning the breaking of the German Enigma machine (which became public knowledge only in the 1970s). Nor did it cover the advent of strong cryptography in the public domain, beginning with the invention of public key cryptography and the specification of the Data Encryption Standard in the mid-1970s. This book was republished in 1996, and this new edition includes an additional chapter briefly covering the events since the original publication.
i09_0214 184
Software Freedom Day organizer Paul Nijjar created this stunning tinfoil hat complete with satellite dish for Bob Jonkman's Cryptography Workshop at the 2014 #SFD celebration held at The Working Centre in Kitchener.
Telecomix Crypto Munitions Bureau works for the benefit of cipherspace. Cipherspace is the state of crypto anarchy. This means that your identity is anonymous as long as you stay protected. There are no identities or authorities in cipherspace, and it is not possible to enforce laws where there is no identity, or where there are no authorities.
Today there are several threats to the inhabitants of the internet. The politicians of oppressive regimes in the east and in the west, in north and south, are imposing surveillance. Surveillance of the entire networks. What people say to each other, what information is transmitted between bots and humans alike.
This aggression must be met with the strongest encryption algorithms available to modern computers. With onion and garlic routing it is possible to erect the fractal cipherspace. With distributed hash tables it is possible to create networks that has no central node. There is no one that controls the fractal cipherspace. Internet as we know it, turns into darknet.
Telecomix Crypto Munitions Bureau recommends that you use the following software: i2p, for anonymous and secure communications, Gnu Privacy Guard, for direct and verified communication. The onion router, TOR, to access the internets.
Telecomix Munitions is a defense bureau.
You can change the future of the internets by joining us in defending the networks and creating cipherspace.
You can help defending yourself and your friends, yes, all inhabitants of the networks.
By learning a few skills you can take control over technology.
Telecomix munitions are currently developing and promoting advanced security devices, which can endure even the harshest forms of government or corporation surveillance.
Your personal computer is an encryption device. Modern hardware can transform plain text to ciphertext with ease. So rapidly you barely notice the difference between unencrypted and encrypted data.
The laws of mathematics are infinitely stronger than the laws of nations and corporations, as the human laws are really only ink on paper. The laws of mathematics, on the other hand, are the laws that define our very universe. With the use of modern crypto algorithms we can use this fact to defend free speech and the integrity of both bots and humans. Information is nothing but numbers, numbers governed not by human laws, but by the laws of mathematics.
Networks that utilize the power of cryptography already exist. It will not be possible to stop the spread of the fractal cipherspace.
To find out more, come to telecomix.org or visit us in cipherspace on telecomix.i2p.
Feel free to visit my works on Deviant Art: xp0s3.deviantart.com/
The Codebreakers by David Kahn
Because The Codebreakers dealt with several potentially sensitive subjects, like the National Security Agency, the US Intelligence and defense communities asked to review the manuscript prior to publication. After its review, the Department of Defense stated they "deplored the book" and "it would not be in the national interest to publish it." Kahn deleted certain portions related to NSA and the book was published without further incidence.
Source of material : National Cryptologic Museum
The Codebreakers (from Wikipedia article on David Kahn)
The Codebreakers comprehensively chronicles the history of cryptography from ancient Egypt to the time of its writing. It is widely regarded as the best account of the history of cryptography up to its publication. William Crowell, the former deputy director of the National Security Agency, was quoted in Newsday as saying "Before he (Kahn) came along, the best you could do was buy an explanatory book that usually was too technical and terribly dull." Kahn, then a journalist, was contracted to write a book on cryptology in 1961. He began writing it part-time, at one point quitting his regular job to work on it full time. The book was to include information on the National Security Agency (NSA), and according to the author James Bamford writing in 1982, the agency attempted to stop its publication, and considered various options, including publishing a negative review of Kahn's work in the press to discredit him. A committee of the United States Intelligence Board concluded that the book was "a possibly valuable support to foreign COMSEC authorities" and recommended "further low-key actions as possible, but short of legal action, to discourage Mr. Kahn or his prospective publishers". Kahn's publisher, the Macmillan company, handed over the manuscript to the Federal government for review without Kahn's permission on 4 March 1966. Kahn and Macmillan eventually agreed to remove some material from the manuscript, particularly concerning the relationship between the NSA and its British counterpart, the GCHQ.
The Codebreakers did not cover most of the history concerning the breaking of the German Enigma machine (which became public knowledge only in the 1970s). Nor did it cover the advent of strong cryptography in the public domain, beginning with the invention of public key cryptography and the specification of the Data Encryption Standard in the mid-1970s. This book was republished in 1996, and this new edition includes an additional chapter briefly covering the events since the original publication.
i09_0214 146
Creator/Photographer: Lock and Witfield
Medium: Medium unknown
Dimensions: 11.3 cm x 8.9 cm
Date: Prior to 1898
Collection: Scientific Identity: Portraits from the Dibner Library of the History of Science and Technology - As a supplement to the Dibner Library for the History of Science and Technology's collection of written works by scientists, engineers, natural philosophers, and inventors, the library also has a collection of thousands of portraits of these individuals. The portraits come in a variety of formats: drawings, woodcuts, engravings, paintings, and photographs, all collected by donor Bern Dibner. Presented here are a few photos from the collection, from the late 19th and early 20th century.
Repository: Smithsonian Institution Libraries
Accession number: SIL14-P004-04
Check out Renewin' Strathewen
Now published at seldomlogical.com/2009/09/12/a-benevolent-social-hack
Updated link to original statement by PM.
A benevolent social hack
Today I witnessed a social hack by a UK hacker who in the space of a month turned around 60 years of history. What did it take? A simple idea, a measure of determination some imagination and a bit of luck. What did he achieve? He persuaded the government of the United Kingdom with the help of fellow citizens, to acknowledge the maltreatment of a fellow citizen. But this was no ordinary citizen.
What is a Hacker?
You might have heard of Hackers in the media. [0] Those pesky 12 year-old boys and their computers at it again. Breaking into Government computers and causing millions of dollars damage. If you listen to the media, Hackers are also responsible for numerous other electronic sins when the most likely explanation is probably a poor choice of operating system. [1] Hackers have something of an image problem. In fact the term Hacker has been hijacked and misused. It used to mean a person who playfully enjoyed puzzles, reveled in understanding complicated technology by gaining access to machinery they had no permission to access. Hackers tend to be benevolent. Less interested in exploiting for gain [2], more interested in mastery and exploits to show amongst their friends. [3]
Instead, the media cottoned onto the term Hackers to describe malevolent behaviour and the broken understanding has persisted ever since. [4] So Instead of using the correct technical term Cracker, the term Hacker has now become synonymous with bad. Here is a simple way to correct this. Whenever you hear the term Hacker in the media, ask yourself is the behaviour benevolent or malevolent? If it's malevolent substitute Hacker for Cracker. If the behaviour is benevolent you are getting a definition closer to the original idea describing a Hacker. So to summarise, Hackers are curious and benevolent by nature. The alike understanding the complex and enjoy creating new things, especially technology. [5]
What is a "social hack"?.
What is a social hack?
Just as Hackers enjoy breaking and rebuilding technology, sometimes malevolent Hackers, Crackers try to re-engineer people. The intent is sometimes playful but the most reported reason is to gain access to information for misuse [6] by exploiting the cognitive biases of humans. [7] I can only think of a few instances of social hacks being done for good instead of evil. [8] But today I witnessed a benevolent social hack. And a big one at that. Now I have an example that probably best illustrates the benevolence of Hackers and what exactly a good "social hack" is. But first a bit of technology history.
A bit of history
If there is a birthplace of modern hackers you might be tempted to think MIT. [9] But you'd be wrong. Modern computer technology has it's birthplace in the United Kingdom. First there was Charles Babbage. Babbage created a mechanical calculating device and with the help of another Ada Lovelace between them the became the original, hardware/software team. [10] Babbage and Lovelace might have supplied the early inspiration but it took the Second World War, another 83 years [11] to encourage the theoretical framework and a complete working example of what we now know as Computers to exist. And at the centre of all this was one man, Alan Mathison Turing. [12]
Turing is the original Hacker, a mathematician, code breaker and computer scientist. Turing had a measurable effect on the infant science of computers with the creation of the
Turing machine" [13] and the thought experiment, "Intelligent Machinery". [14] Turing also designed machines, part electrical, part mechanical to crack the German Enigma and numerous other algorthyms to help crack encrypted messages vital for the German war machine.[15] In the mid to late 1940's, Turing continued to apply himself to the big problem of the time, outlined in "Computing Machinery and Intelligence" [16], software for the Manchester Mark 1 [17] and developed the "Turing Test" [18] as a means to test if a machine is in fact intelligent.
What is a social hack again?
Enough of the history, lets get back to social hacks. Turing was clearly a man of his time able to influence the future course of computer technology for a better world. But Turing was also a man born into the wrong time. Turing's crime was his sexuality. In a time where sexual orientation was not a choice but the law, Turing was persecuted. Turing was also subject to unethical medical procedures by the UK Government. The same Allied government who turned to ordinary people like Turing to help to defeat Nazi Germany. To defeat the Nazi regime and put a stop to the extermination of Jews, Gypsies, homosexuals and anyone else who didn't fit into the master plan.
So the idea behind a social hack is to somehow change the way people behave, perceive or do things through some mechanism. A social hack is much harder to achieve than a playing around with technology. A social hack relies on being able to persuade other people to do something they might not have thought of, want to do or imagined possible. A good social hack is done, for a greater good. A good social hack improves some aspect of society without personal gain.
A social hack howto
Almost a month ago a UK Hacker and nerd, John Graham-Cumming, wrote about [19] a petition [20] he was forming to get the UK Government to apologise formally to Alan Turing for the treatment he received at their hand. Well almost a month later after many emails, blog posts, twits later, John has got the Prime Minister, Gordon Brown on behalf of the government of United Kingdom to publicly apologise to Alan Turing, his treatment and formally recognise the importance of Alan Turing's technical and scientific application to the war effort. [21] And the contribution he made to science and technology in general. Probably the most rewarding part was also the discovery of members of Turing's existing family who now get some closure. In 2012 it will be the centenary of the birth of Turing London on June 23. [22] For nerds and people who work in computing, the Turing year is going to be big. Maybe not as big as Y2K, but big enough.
So thanks John for this benevolent "social hack". A reminder that Hackers do good things. A reminder that in a just society, people and Hackers alike should be judged by their achievements and not their race, religion, sex or orientation.
Reference
[0] Bruce Stirling, "The Hacker Crackdown",
[Accessed Friday, 11th September 2009]
www.mit.edu/hacker/hacker.html
[1] Wikipedia, "Storm botnet: In 2007 a Storm botnet controlled by criminal gangs estimated to total between 150,000 to 1 million PC's to enable a distributed denial of service attack. It was reported that up to 80% of the machines involved used Microsoft Windows operating system."
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Storm_botnet
[2] It has been known for Hackers have exploited their knowledge to gain access and excessive CPU access and I suspect the fascination for lock picking probably has a very practical reason behind it. Historically this was a necessity as access to precious processing time was limited. Limited enough to hack a solution. You can read more about early Hackers here by "Eric Steven Raymond", "A Brief History of Hackerdom",
[Accessed Friday, 11th September 2009]
www.catb.org/~esr/writings/cathedral-bazaar/hacker-histor...
[3] Woz.org, Steve Wozniak, "Letters-General Questions Answered (Woz on hacking)",
[Accessed Friday, 11th September 2009]
www.woz.org/letters/general/59.html
[4] The confusion between Hackers and Crackers means to use the word Hacker means Bad to most people.
[5] catb.org, Eric Steven Raymond, "The basic difference is this: hackers build things, crackers break them."
[Accessed Friday, 11th September 2009]
catb.org/~esr/faqs/hacker-howto.html#what_is
[6] Scientific American, Herbert H. Thompson, "How I Stole Someone's Identity",
[Accessed Friday, 11th September 2009]
www.scientificamerican.com/article.cfm?id=anatomy-of-a-so...
[7] Wikipedia, "A cognitive biases is a hickup in rational thought that can be used by Crackers to socially engineer a human for malevolhttp://www.computer50.org/mark1/MM1.htmlent (bad) reasons.",
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/List_of_cognitive_biases
[8] Dashes.com, Anil Dash, "Bill Gates and the Greatest Tech Hack Ever" I have a bit of trouble with this one but it's worth looking at despite the involvement of Microsoft.
[Accessed Friday, 11th September 2009]
dashes.com/anil/2008/06/bill-gates-and-the-http://www.cs....
[9] mitadmissions.org, Michael Snively, "Hacking/Snively's Blog: If you've never seen "Hackers" then you're depriving yourself and should make a point of getting on that train.* I get asked about hacking at MIT a lot, which is natural;"
[Accessed Friday, 11th September 2009]
www.mitadmissions.org/topics/life/hacks_traditions/hackin...
[10] Wikipedia, Ada Lovelace, "She is mainly known for having written a description of Charles Babbage's early mechanical general-purpose computer, the analytical engine. She is today appreciated as the "first programmer" since she was writing programs—that is, encoding an algorithm in a form to be processed by a machine—for a machine that Babbage had not yet built.",
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Ada_Lovelace
[11] computerhistory.org, Charles Babbage, "1849 is the year Babbage is reported to have created a version of his analytical machine."
[Accessed Friday, 11th September 2009]
www.computerhistory.org/babbage/ number10.gov.uk
[12] alanturing.net, "Born 23 June 1912 in London, died 7 June 1954 in Cheshire, United Kingdom. Computer scientist, mathematician and cryptographer.",
[Accessed Friday, 11th September 2009]
[13] Wikipedia, "Turing machine",
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Turing_machine#Informal_description
[14] Wikipedia, "Computing Machinery and Intelligence. A paper written in 1950 for 'Mind' in which Turing discusses artificial intelligence, proposes the 'Turing test' of intelligence and asks important questions such as, 'can machines think?'",
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Computing_Machinery_and_Intelligence\
[15] Wikipedia, "Cryptanalysis: Where Turing works at Bletchley Park during the Second World War in order to crack German cryptographic cyphers. "
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Alan_Turing#Cryptanalysis
[16] abelard.org, A. M. Turing, "Computing machinery and intelligence"
[Accessed Friday, 11th September 2009]
www.abelard.org/turpap/turpap.php
[17] computer50.org, "Manchester Mark 1: By April 1949 was generally available for computation in scientific research in the University. With the integration of a high speed magnetic drum by the Autumn (the ancestor of today's disc) this was the first machine with a fast electronic and magnetic two-level store. It in turn was the basis of the first commercially available computer, the Ferranti Mark 1, the first machine off the production line being delivered in February 1951."
[Accessed Friday, 11th September 2009]
www.computer50.org/mark1/MM1.html22
[18] Wikipedia, "Turing test"
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Alan_Turing#Early_computers_and_the...
[19] jgc.org, John Graham-Cumming<, "Alan Turing deserves an apology from the British Government ",
[Accessed Friday, 11th September 2009]
www.jgc.org/blog/2009/06/alan-turing-deserves-apology-fro...
[20] number10.gov.uk, John Graham-Cumming, "number10.gov.uk: E-Petitions: Submitted by John Graham-Cumming – Deadline to sign up by: 20 January 2010 – Signatures: 31,172"
[Accessed Friday, 11th September 2009]
petitions.number10.gov.uk/turing/
[21] number10.gov.uk, "Treatment of Alan Turing was 'appalling'"
[Accessed Friday, 11th September 2009]
[22] cs.swan.ac.uk, "THE ALAN TURING YEAR",
[Accessed Friday, 11th September 2009]
next >>>
By 1943, Bombes began arriving at the Navy's Nebraska Avenue Communications Annex at a rate of four per week. The WAVES in Dayton began transferring with the machines and were trained to operate the Bombes. By the end of the war, 121 Bobles ran 24 hours per day, searching for Enigma rotor settings. THe machines could search 456,976 setting in 20 minutes.
THe US Navy Bombes were faster than the British machines and the Navy could build them in large enough quantity to make a difference againt the ENIGMAs. Britain turned over the U-boat problem to the US Navy and even requested the US to build an additional fifty machines, of which only 26 were needed before production stopped. The original ninty six were sufficent to handle the U-boat messages, but the ground war was growing and Britain wanted assistance against German Army and Air Force Engma messages. Approximately 65% of the runs on the Bombes were German Navy. Once the daily settings had been retrieved, the Bombes switched over to a three rotor mode and worked against the German army and Air Force. They cound complete a three-rotor run in only fifty seconds.
Source: National Cryptologic Museum
Comment on the above
The four rotor system had 26^4 or 456,976 settings whilst the theree rotor system had 26^3 or 17,756 settings. It looks like the problem scale in a linear way as it took 50 seconds to check 17,756 setting (~350 per second) while the four rotor solution in 20 minutes is ~ 380 settings per second.
also think the designer Joseph Desch sounds like a remarkable engineer that I never heard of before.
Bombe on Wikipedia
Once the British had given the Americans the details about the bombe and its use, the US had the National Cash Register Company manufacture a great many additional bombes, which the US then used to assist in the code-breaking. These ran much faster than the British version, so fast that unlike the British model, which would freeze immediately (and ring a bell) when a possible solution was detected, the NCR model, upon detecting a possible solution, had to "remember" that setting and then reverse its rotors to back up to it (meanwhile the bell rang).
i09_0214 109z
Geheimschreiber
Although the ENIGMA remains the best know German cryptographic machine of World War II, in the early 1940's the German military introduced several new cryptographic teletypewriters known under the name Geheimschreiber - sometimes translated as "private secretary", sometimes as "secret writer".
These machines offered on-line encryption and decryption, that is plain test could be typed directly into the machine, automatically converted to encrypted text, and sent directly to the transmitter. In addtion to security, these "secret writers" provided the Germans with the ability to encrypt large volumes of test at high speed.
Learning that the Germans had named an early version of these machines SWORDFISH, the British and Americans bestowed nicknames associated with fish on the machines and the communications links in which they were used. The two most famous are TUNNY and STURGEON.
Just as they developed the Bombe to assist decryption of ENIGMA , the British developed data processing to attack the fish family of machine ciphers. (I must add: This was a whale of a job!) This led to the construction of the COLOSSUS which British historian F. H. Hinsley is "justly claimed as a pioneer programmable electronic digital computer."
The 40 (SZ40) when first encountered in 1940 was nicknamed TUNNY by the British - after a fish better known to Americans as TUNA.
The Schlüsselzusatz SZ40, manufactured by the German firm Lorenz, was used by the German Army for high-level communications, generally between Army groups. It provided on-line encryption and decryption and was capable of handling large volumes f traffic at high speed. The TUNNY depended on wheels for encryption and decryption but unlike ENIGMA it did nut substitute letters but insted encrypted elements of the electrically generated Baudot code used in normal telegraphic transmissions.
Source: National Cryptologic Museum 13 February 2009 with some hyperlinks added
i09_0214 084
Taken at the National Cryptologic Museum, NSA.
Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.
Darkness Odigaunt wonders if the cookies were still hidden in here for class. "Jaina, I thought about what you said, about baby books... What do you like to read?"
Lisbeth Dollinger ladles steaming soup into a bowl. She carries it to the table and sets it beside Jaina, with a spoon and napkin to follow. She listens closely to the conversation. "I am sorry, sister. A moment? Jaina, darling, did you hear Elise's question?" She returns to the fridge to get the milk.
Elise Capalini smiles as Sister Lis bustles around, and hopes she means to join them. She watches Jaina eat and is comforted that the girl has been safe here over night. She checks her PDA again, but still no word from Deb. Troubling.
Jaina Lefevre actually waits to swallow before speaking, eyes flickering to Sister D's and then down to the table. "Uh...'vanced mek-nyzed warfare 'n crypto-graffy an' diplo-massy." (Advanced Mechanized Warfare, Cryptography and Diplomacy). She looks over at Elise and then down at the table. "He was tall an' had darker skin and black hair and I dunno his name but th' lady wif him was called Huntress."
Lisbeth Dollinger thinks for two terrible seconds about her cousin. And hiring him to do some equally terrible thing to the UAC monsters. She closes her eyes, her back to the others, and prays fervent forgiveness while crossing herself. God save her from such thoughts. After pouring the milk, she returns the bottle to the fridge, and brings the glass to Jaina. "There you are."
Elise Capalini nods at Jaina; that matched the description of the private she'd seen on the street earlier in the evening, the one Portia had said had taken the children. Problem was, the MPD had no authority where the kids had been held. She takes a bite of her sandwich, ears flicking at the mention of what Jaina likes to read. "Sister Lis, I think you need to sit with us," she says and nods toward the empty chair.
Darkness Odigaunt leaned back in her chair, "Well.... I don't think Mrs. Bails will be teaching those either..." She reached for her purse, down beside the chair, and draws out a small book, "I had a friend once who liked really old computer manuals, but then she disappeared...Sorry, I don't have anything more advanced than that."
Lisbeth Dollinger smiles and sits down beside Elise. "Computer manuals!" She lifts her brows in surprise. "Heavens, darling. Do you not read anything else? Stories? Poetry?" That she is reading above her level does not seem to surprise her at all.
Jaina Lefevre takes the milk and downs about a third of the glass before putting it down and wiping her mouth with the back of her hand. "Thanks Sister Lis." She takes the last few bites of the sandwich. "S'okay SIster D. Mommy said she'd bring me books from th'Beast when she gets back. I got tooters there, and I can learn so-shill stuffs here." She wrinkles her nose at the question.' Mama wants me to read 'bout prince frogs and princesses and stuff. THat's dumb. Who needs a prince t'be happy? And I ain't kissin' no frogs. Tha's gross."
Elise Capalini noms her sandwich some more, then smiles at Jaina. "You don't need a prince to be happy, but the stories can be awfully fun to read anyhow. Plenty of adventures there." She nods, and sips her orange juice.
Darkness Odigaunt raised an eyebrow, "Well, not all stories are... about princesses and frogs... I bet there's a copy of Sherlock Homes lying around here. Ever hear of him?"
Lisbeth Dollinger nods, agreeing with Elise. Her thoughts turn to her cousin again, and this time she smiles. He would twitch and wince and curl his lip if he could hear Jaina now. "Or Tolkien," she chimes in. "Or Stevenson. Dickens. Mr. Twain."
Jaina Lefevre wrinkles her nose. "Don't need t'read 'bout 'ventures. I got lots. B'sides, Luci said she'd take me on a 'venture sometime. Gotta read stuffs that's gonna help me help Mommy when I'm bigger 'cause she ain't got no one that knowed about tack-nukes. I wanna put one on that boogerface's head!"
Elise Capalini laughs a little. "I have plenty of adventures myself, but I still like to read about others, outside of Midian. It's a big world out there. Midian is only a small corner of it." That idea is comforting to her, and the idea of getting to see more of the world next week thanks to Laz...that still seems like a dream. "I wouldn't turn any book away."
Darkness Odigaunt smiles, "Well, then Hawthorne, Poe, Eliot... Just reading books that teach you work isn't good. You have to know how to use it too... Like, math in a book is okay, but if you don't know places to use it in real life... I think I lost what I was trying to say..."
Jaina Lefevre looks over at Elise. "Yeah, but you is old already. You knowed what you gotta do. I gotta learn what I gotta do so's I can do it. When I'm old, -then- I'll read them other books. We didn't get books in th'lab. They showed us vids sometimes and taught us letters and names and stuff. But not books." She pauses and looks down. "Don't matter anyway. I can't go t'night. My reader is at home and my clotheses and it's not safe." She draws in the jelly on the plate with her finger.
Lisbeth Dollinger looks at Jaina in sudden, worried sorrow. "Dearest," she says softly. "There is so much more to life than 'nukes' or hurting others. Even those you might think deserve it. There is love and life and beauty. And a whole world of God's creation that you will miss if you spend all your time reading about war. War is one, small, unhappy part of this world."
Elise Capalini nearly chokes on her juice. She coughs a little and sets the bottle down. "Yeah, I'm old already," she murmurs and nods. "Sister Lis has it right. You should try and experience a little bit of everything. There's so much out there."
Darkness Odigaunt slides her plate Lis-wards, then glances back to Jaina, "Well, maybe it's time to try real paper books. Just until your mother brings the other kind?" she asks gently.
Jaina Lefevre licks the jam from her fingertip and looks over at the other three. "I seen my batch babies get burnded up and Mister get smooshed by a big boom and got shotted at and my head drilled with holes and got bit...er..sick and seen my Tauntie's head in a fridge and got beated up and fake dead from the Youaysee and I'm s'posed to read about fairy princesses and love and stuff? Why? That ain't gonna help me next time Youaysee wants to kick me in th'head, is it?" She shakes her head and gets up from the table, carrying her dishes over to the sink, limping a little and leaning on the edge of the cabinet to catch her breath.
Elise Capalini watches Jaina, and exhales a little. She finishes her sandwich and drinks more juice, thinking what a challenge it is to raise kids in Midian. To keep them innocent of all the horror out there--or at least temper the horror with some measure of "normal" homelife. She frowns and looks at both sisters, unsure what to say. It was hard to deny the truth of Midian, even to its youngest residents.
Lisbeth Dollinger replies gently, "It *will* help you, Jaina. It will teach you *why* we fight against such terrible things. Because no matter what happens to us, what horrors we see, there is still something good and wonderful in this world that is worth protecting."
Darkness Odigaunt scoots away from the table, then heads towards her and reaches for the plate, "Let me, hunny. You should be sitting for now." She glanced back to Lis, she could put things better than she could.
Jaina Lefevre looks up at Sister D, then over to the others. "There ain't nothin' wunnerful 'bout the Youaysee. I useded ta like Mister Tristan and th'slingshot man...but Slingshot man hurted me bad and Mister Tristan could too. I gotta takes care of me best I can 'cause Mommy might get tired of me and sells me. Ya never know. You gotta like what you got while you gots it 'cause it always changes." She heads to the stairs and starts to use her hands and feet to start up. "Gonna lie down now. Wanna go t'school laters."
Lisbeth Dollinger exhales and moves to clean up. This is why she became a nurse instead of a teaching sister. It was hopeless trying to rationalize with a child.
Elise Capalini watches Sister D get up, and absently rubs Sister Lis' arm before she moves off--no peanut butter, not to worry. "I should check on the cats, then get back in time for class myself."
mmkk.ktn.gv.at/EN/ausstellungen/K%C3%BCnstler_innen%20A-Z...
Hermann Josef PAINITZ
(1938-2018, Vienna, A)
Hermann Josef Painitz's geometric works, which follow a well-considered analysis and logic, occupy a special position in Austrian art history. The comprehensive work of the trained goldsmith, which spans more than five decades, is based on elementary basic shapes such as the circle, the sphere, the square and the cube, which interpenetrate one another, and constants such as time and space. In drawn and painted sequences, series and rhythms, the artist records temporal sequences in a specific, immobile moment. Any gestures are avoided. For example, he documents individual daily routines of himself or friends, which are reproduced in a coded visual language in the form of diagrams or organizational charts. Hermann J. Painitz expresses his logic-based thoughts artistically, starting with simple and countable forms - like notes in music - which he implements visually and geometrically. His language-related works are striking, including "Blue/Fireplace Red Fireplace Red/Blue", "Light Ochre", "Light Blue Light Blue" and "Light Gray Light Blue". Cryptographically represented words can be deciphered with the help of instructions on the picture or accompanying them. The degree of encryption varies; a simple form would be a word written backwards; in the works mentioned above, the conventional alphabet is assigned "religious symbols (various crosses), gestalt theory (silhouette of a cat), characters (undeciphered characters from different cultures, hieroglyphs), directional signs, question marks, etc.", as the artist describes it in his own words. This creates a "colorful composition that at first glance seems to lack an inner order, but in reality nevertheless follows an inner structure. In addition to this, there are concentric circles in the works - recurring in the artist's entire oeuvre - that depict mathematical laws. The artist continues the semantic and semiotic aspects from the two-dimensional level into a three-dimensional one. For his bread and hammer alphabet, he assigns different types of bread or hammer to the 26 letters and forms words with them. For example, he writes the word bread with four loaves of bread.
Have you ever noticed the barcodes on your receipts?
I notice such useless details and I even try to decode them:
Bletchley Park és un dels llocs més fascinants de la història del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informàtica i els ordinadors.
Aquí podeu veure una vista general dels blocs construits a partir de 1941 per encabir el creixent personal del que es coneixeria posteriorment com "Station X".
ca.wikipedia.org/wiki/Bletchley_Park
========================================================
Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).
Here you can see some of the wartime blocks (in fact A Block - Naval Intelligence) build after 1940, in order to cope with the increasing staff of what was known as the GC&CS, but his actual famous name is Station X.
en.wikipedia.org/wiki/Bletchley_Park
www.bletchleypark.org/content/museum.rhtm
For an impresive virtual visit, take a look to these videos:
AD900 Key Programmer
1. The professional duplicating machine, AD900 Pro, has been designed and built to keep pace with the evolution of transponder car keys.
2. The AD900 Pro key duplicator features the most innovative electronic components in the field of radio frequencies thus allowing easy detection, reading and cloning (duplication) of fixed code transponders and the identification of cryptographic transponder codes.
3. Major features00Pro such include the ability for copying of Crypto 42 type transponders and the Texas 4C and 4D transponders.
4. The AD900 Pro has been developed to cater for future developments and to keep up to date with the ever expanding technology of transponders within the Automotive vehicle systems.
5. The AD900 Pro offers complete flexibility as once the main unit is purchased the functionality can be expanded by adding additional software.
6. The machine of the future for transponder developments, is the AD900 Pro....for professional locksmiths.
Telecomix Crypto Munitions Bureau works for the benefit of cipherspace. Cipherspace is the state of crypto anarchy. This means that your identity is anonymous as long as you stay protected. There are no identities or authorities in cipherspace, and it is not possible to enforce laws where there is no identity, or where there are no authorities.
Today there are several threats to the inhabitants of the internet. The politicians of oppressive regimes in the east and in the west, in north and south, are imposing surveillance. Surveillance of the entire networks. What people say to each other, what information is transmitted between bots and humans alike.
This aggression must be met with the strongest encryption algorithms available to modern computers. With onion and garlic routing it is possible to erect the fractal cipherspace. With distributed hash tables it is possible to create networks that has no central node. There is no one that controls the fractal cipherspace. Internet as we know it, turns into darknet.
Telecomix Crypto Munitions Bureau recommends that you use the following software: i2p, for anonymous and secure communications, Gnu Privacy Guard, for direct and verified communication. The onion router, TOR, to access the internets.
Telecomix Munitions is a defense bureau.
You can change the future of the internets by joining us in defending the networks and creating cipherspace.
You can help defending yourself and your friends, yes, all inhabitants of the networks.
By learning a few skills you can take control over technology.
Telecomix munitions are currently developing and promoting advanced security devices, which can endure even the harshest forms of government or corporation surveillance.
Your personal computer is an encryption device. Modern hardware can transform plain text to ciphertext with ease. So rapidly you barely notice the difference between unencrypted and encrypted data.
The laws of mathematics are infinitely stronger than the laws of nations and corporations, as the human laws are really only ink on paper. The laws of mathematics, on the other hand, are the laws that define our very universe. With the use of modern crypto algorithms we can use this fact to defend free speech and the integrity of both bots and humans. Information is nothing but numbers, numbers governed not by human laws, but by the laws of mathematics.
Networks that utilize the power of cryptography already exist. It will not be possible to stop the spread of the fractal cipherspace.
To find out more, come to telecomix.org or visit us in cipherspace on telecomix.i2p.
Feel free to visit my works on Deviant Art: xp0s3.deviantart.com/
EOS cryptocurrency golden coin on futuristic technology background vector illustration banner and wallpaper template
OK, not the best photo of me, but an important day - not only because Bletchley Park cryptography station was vital to stopping Hitler in the second world war, but also because significant advances in computing were made there, and because people were brought together who later went on to develop the first real computers. Without WWII cryptography we might not have the kinds of machine that you're probably viewing this on.
The sad side of the story, of course, concerns Dr. Alan Turing, the brilliant mathematician who was central to the war effort and also important in the develoment of digital computers after the war. He also happened to be gay, and was eventually prosecuted for his sexual preferences and sentenced to chemical castration using female hormones. He committed suicide aged 41. A similar thing could well have happened to me if I'd lived during that period.