View allAll Photos Tagged cryptography
Microsoft's booth at the RSA Expo used wireless keyboards vulnerable to the Keykeriki and GoodFET. The radio transmissions are in the Nordic RF style in the 2.4GHz band, 2Mbps. The Start of Frame Delimiter (SFD/Sync) is a 5-byte string unique to each keyboard/dongle set, and the closest thing to cryptography is that the string is XORed with the keypresses.
This vulnerability has been reported to Microsoft multiple times, but they refuse to document it.
travisgoodspeed.blogspot.com/2011/02/promiscuity-is-nrf24...
Taken at the National Cryptologic Museum, NSA.
Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.
Taken at the National Cryptologic Museum, NSA.
Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.
During World War 2, this model of the Japanese Type-97 cipher machine was known to American cryptanalysts as JADE. JADE was one of three varieties of Japanese machines that used a series of telephone selector switches to encipher r decipher top-level messages. The other two machines were known by the American designators CORAL and PURPLE. The Top Secret messages enciphered by JADE, CORAL, and PURPLE machines and transmitted by radio were intercepted and decrypted by American Army and Navy personnel. The information gained by this source was of the highest level of importance and was instrumental in the Allied victory in the Pacific.
Although no PURPLE cipher machine was ever captured intact, it is believed that PURPLE looked very much like JADE. This JADE machine was captured in Saipan in June, 1944.
Source: National Cryptologic Museum
Purple
In 1937, the next generation 97-shiki injiki(ä¹äøå¼å°åę©) ("Type 97 print machine") was completed. The Ministry of Foreign Affairs machine was the Angooki Taipu-B (ęå·ę© ćæć¤ćB) ("Type B Cipher Machine"), codenamed Purple by United States cryptanalysts.
The chief designer of Purple was Kazuo Tanabe (ē°č¾ŗäøé). His engineers were Masaji Yamamoto (å±±ę¬ę£ę²») and Eikichi Suzuki (é“ęØęµå). Eikichi Suzuki suggested use of stepping switch instead of the more troublesome half-rotor switch.
Clearly, the Purple machine was more secure than Red, but the Navy did not recognize that Red had already been broken. The Purple machine inherited a weak point from the Red machine, namely vowel-consonant separate encryption, which was called "sixes-twenties" by the US Army SIS.
en.wikipedia.org/wiki/Purple_code
i09_0214 115
How to PGP encrypt, decrypt or digitally sign files via GnuPG GUI
If you would like to use this photo, be sure to place a proper attribution linking to xmodulo.com
Waves Operated the 26 Standard Bombes (N-530) and 3 special Bombes (N-800) on the Main Deck of Building 4 at the Navy's Communication Annex on Nebraska Avenue in Washington, DC
Bombes began arriving at the Navy's Communication Annex on Nebraska Avenue in Washington, DC at a rate of four per week beginning in September, 1943. Women known as WAVES (Women Accepted for Voluntary Emergency Service) operated the machines, but knew only that they were doing code work. Although they were not informed of the reult of their work, they did understand its importance. Because of their dedication and loyalty, German U-boat messages could be read in near real-time, and lives of men, Allied and German, were spared.
Source: National Cryptologic Museum
Bombe on Wikipedia
Once the British had given the Americans the details about the bombe and its use, the US had the National Cash Register Company manufacture a great many additional bombes, which the US then used to assist in the code-breaking. These ran much faster than the British version, so fast that unlike the British model, which would freeze immediately (and ring a bell) when a possible solution was detected, the NCR model, upon detecting a possible solution, had to "remember" that setting and then reverse its rotors to back up to it (meanwhile the bell rang).
i09_0214 131
How to PGP encrypt, decrypt or digitally sign files via GnuPG GUI
If you would like to use this photo, be sure to place a proper attribution linking to xmodulo.com
Day 2 of the UCF Burnett Honors College Summer Institute, an intensive 3 week summer camp for high school students to learn all about Java & Python as well as AI & Cryptography.
A laser-cut, four-layer, acrylic representation of a one-time redirect to a bitcoin, using cryptographics.io
Similar to "I promise to pay the bearer 1 bitcoin". If I'd known if it were legal to do this with a bitcoin wallet, I'd have done it, but to prototype the idea, here's an initial experiment.
To gain access to the bitcoin you would need to have the 256 character password that was used in the encryption process.
A hack-day project, for #sizzle9 and to be exhibited at Hack The Barbican this month.
The Unity Ingot Coin
The World of Finance and Investments is varying into a Decentralized Society
People are looking for extra places to stock their hard-earned grant and go to it through investments as they don't trust the status quo.
Taking a look at the relatively new world of cryptocurrencies and blockchain technologies we look many similarities to that of customary investment platforms such as stocks, bonds, funds, insurance and more
But they are completely different, heres why
Most cryptocurrencies are developed from blockchain technology.
The blockchain is a peer-to-peer database that maintains a list of history called
Blocks. These blocks are similar by cryptography securing the data. The first block chain was conceptualized by Satoshi Nakamoto in 2008 as a key component of the digital currency Bitcoin where it serves as the public ledger for all transactions that individuals complete with Bitcoin
the opening of blockchain for Bitcoin inspired entrepreneurs and tech savvy people all
over the world to design crypto currencies and tokens for additional decentralized applications
we see these pioneering days of using cryptocurrencies and the blockchain technology as a different nice of opportunity.
Ethereum, Bitcoins sudo challenger of sorts which is afterward developed from a blockchain technology did something unique in their progress by creating smart union Technology to be in afterward their blockchain for big concern and developers alike to make more lucrative opportunities in a more swift and modern manner.
Introducing our agreement Ingot Crypto-Token
A chaotic habit they are creating long term returns for people that wish to retain our token.
Built from Ethereums smart concord Technology the agreement Ingot is the first of its kind.
Why is it unique and a first?
Unity is backed by cryptocurrency mining.
50% of the proceeds from the weekly mining pools is used to buy Bitcoin and Gold to back up our token. 15% of the weekly mining proceeds is used to buy more mining servers in view of that the coin always grows in an exponential way. 15% of the daily mining proceeds is used to save the shout out value of our token stable in the quarrel make public places. The last 20% percentage is used for allowance and upkeep of the mining facility.
This means that the pact Token will exponentially build up in value based adjacent to the mining equipment and its buildup of value behind Gold and Bitcoin. rule deal to be similar to a more expected addition of value that relates to a Gold backed ETF.
The unity Ingot will bring online 1x mining server for every 5 million tokens innate adopted by their followers. later all tokens are adopted, the pact Ingot will have the base power of 2000 mining servers dynamic at a hash rate of 230mhs per server or 460gh in sum returning $880,000 per month after electricity costs at current announce prices the morning I am writing this article. The ROI of each server at todays prices is isolated 340 days opposed to mining Bitcoin itself as soon as the summit mining equipment for the Bitcoin blockchain which returns an ROI in 14 15 months at current prices and mysteriousness of the BTC blockchain. The agreement mining operation can mine oscillate cryptocurrencies such as Ethereum, ZCash, Lite Coin and thus many more which makes it much more diversified and appealing.
The treaty Ingot team focus their mining farms at the cryptocurrency that is offering the highest returns that day, hours of daylight in and morning out. past such an operation, ahead of time adopters of the agreement Ingot can expect a 100%+ growth factor year on top of year and thats just if Gold and Bitcoin stay at their current value, but it doesnt stop there.
Remember it was mentioned that 15% of the mining proceeds is reinvested into more mining servers? without difficulty this creates exponential buildup to the mining capabilities as capably as building vanguard bullion reserves against our token on a daily basis. One could look at this as roughly the strongest compound amalgamation model that the broadminded world has ever seen perfect its addition potential year exceeding year. The creators did this so if the cryptocurrency markets ever collapsed, people holding the unity Ingot could allegation their tokens against the reserves, appropriately acting once an insurance policy.
The agreement Ingot is just one of 9 unique tokens instinctive created and launched into the cryptocurrency tone by this build up team to fill the gulf of the different bullion backed tokens as a safe port of sorts. The creators acknowledge that this a need in the ever-evolving cryptocurrency recess that the world is currently opening happening too.
A see into the Recent endeavors Surrounding Bitcoin
Within the bearing in mind six months from the epoch I write this article we have seen countries such as the Philippines and Japan legalize Bitcoin as a genuine currency in their countries. Countries such as India, Russia, China and the EU are moreover looking at proceed the same. It has been released recently that Russia and China are dumping the U.S. dollar for gold and looking to harsh themselves from the central banks. considering this in mind, adopting Bitcoin into their unconventional plans would be a natural business to realize even if diversifying their investments to enlarge on their own currencies and secure guarding themselves from a potential banking collapse from the centralized system and the petro-dollar.
This can already be seen in Japan where they are now holding 41.8% of every Bitcoin and have released a projected estimate that 260,000 businesses will be compliant BTC as a form of payment in their country. Our predictions are that the cryptocurrency flavor will become the next-door financial encounter zone where countries in this area the world will every legalize crypto as qualified currency and will be credited with large reserves as a drop support to the fiat dollar exceeding the next two years.
Many of the elite in the similar to year have predicted that Bitcoin will surpass $10,000 per coin by 2020 and surpass $50,000 by 2030 because of the limited supply. Some people such as Jeremy Liew, the first Snap chat traveler and Peter Smith the CEO of Blockchain both say that Bitcoin will be worth greater than $500,000 by 2030 for this revise similar reason. It has as well as been said in recent months that if the Winklevoss ETF was to be accepted by the associated States SEC that Bitcoins value would have risen to $5000 per coin higher than night. The ETF was denied in March followed by 3 further Bitcoin ETF attempts in the same way as that judgement. The SEC is revisiting the substitute to legalize the Winklevoss ETF and has allowed open a breath of fresh air from the U.S. public in helpful their feedback. The similar recognition could be said that if Russia, India, China or the EU legalizes Bitcoin as official tender, the price per digital coin could look prices well along than $10,000.
This is the veracity we living in and people from every roughly the world are starting to realize that an investment in Bitcoin is a good opportunity. However, buying Bitcoin is expensive and there is an easier artifice to get a turn in this emerging trend. By acquiring a small tilt in the concurrence Ingot which is acknowledged to explode due to the fact that it is one of the abandoned difficult asset backed cryptocurrencies in the world, those holdings could twist into a greater recompense on investment and similar to the dust settles upon the given price for the tokens is received by the entry spread around place a person could easily trade help for Bitcoin or withhold onto the Untiy Ingot for the long term and reap the advance for a far away less purchase in cost. all in all, the cryptocurrency trend seems afterward it is here to stay and the opportunities are bountiful at the current time. Invest wisely, accomplish your own due diligence and acknowledge every precaution to secure guard your hard-earned money.
The Tele-Troopers are equipped with highly-advanced telecommunications devices, most of which are worn as backpacks and helmets. Their equipment is capable of both audio and video transmissions from the field. In addition to the standard BlasTech E-11 blaster rifle their gear includes an automatic frequency scanner, cryptography unit, and sensor jamming/anti-jamming equipment.
Taken at the National Cryptologic Museum, NSA.
Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.
Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but
Certainly!
Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.
The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.
In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.
In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.
Met de opkomst van de cryptocurrency Bitcoin kwam ook de revolutionaire technologie in beeld; de blockchain. FIBER en de Brakke Grond presenteren een avond met de Vlaamse cyberfilosoof Michel Bauwens over de blockchain. Een gedecentraliseerde database die de basis vormt achter de controversieĢle Bitcoin.
Met de opkomst van de cryptocurrency Bitcoin kwam ook de revolutionaire technologie in beeld; de blockchain. FIBER en de Brakke Grond presenteren een avond met de Vlaamse cyberfilosoof Michel Bauwens over de blockchain. Een gedecentraliseerde database die de basis vormt achter de controversieĢle Bitcoin.
My combination padlock (Master Lock). Can you guess the backdrop?
strobists: white plexi diffusion panels, Sigma EF-500DG Super at 1/4 power camera top, flash zoom at 17mm. ISO 100, Ę/16, 1/200s. eBay trigger. custom white balance.
©2008 David C. Pearson, M.D.
Embedded Electronics Starter Kit from GHI Electronics
FEZ Spider Starter Kit
www.ghielectronics.com/catalog/product/297
FEZ Spider Starter Kit is the first commercially available .NET Gadgeteer-compatible kit. it includes everything necessary for educators, hobbyists and even professionals. Embedded development is fast & easy (FEZ) thanks to .NET Micro Framework, .NET Gadgeteer and the numerous GHI value added features such as WiFi and USB Host.
The kit includes:
FEZ Spider Mainboard
Display T35 Module (3.5" with touchscreen)
USB Client DP Module (with USB cable)
Camera Module
2x Multicolor LED Module (DaisyLink)
2x Button Module
Ethernet J11D Module
SD Card Module
USB Host Module
Extender Module
Joystick Module
10cm IDC cables (included with modules).
Assorted IDC Cable Pack:
4x 5cm IDC cables
3x 20cm IDC cables
1x 50cm IDC cable
Reusable Plastic Storage Box
FEZ Spider Mainboard is a .NET Gadgeteer-compatible mainboard based on GHI Electronics' EMX module. This makes FEZ Spider Mainboard the most feature-full .NET Gadgeteer compatible device in the market. It contains all of .NET Micro Framework core features and adds many exclusive features, such as USB host, WiFi and RLP (loading native code). All these features combine to provide a rapid prototyping platform.
Key Features:
14 .NET Gadgeteer compatible sockets that include these types: X, Y, A, C, D, E, F, H, I, K, O, P, S, T, U, R, G, B and Z.
Configurable on-board LED
Configuration switches.
Based on GHI Electronics EMX module
72MHz 32-bit ARM7 processor
4.5 MB Flash
16 MB RAM
LCD controller
Full TCP/IP Stack with SSL, HTTP, TCP, UDP, DHCP
Ethernet, WiFi driver and PPP ( GPRS/ 3G modems) and DPWS
USB host
USB Device with specialized libraries to emulate devices like thumb-drive, virtual COM (CDC), mouse, keyboard
76 GPIO Pin
2 SPI (8/16bit)
I2C
4 UART
2 CAN Channels
7 10-bit Analog Inputs
10-bit Analog Output (capable of WAV audio playback)
4-bit SD/MMC Memory card interface
6 PWM
OneWire interface (available on any IO)
Built-in Real Time Clock (RTC) with the suitable crystal
Processor register access
OutputCompare for generating waveforms with high accuracy
RLP allowing users to load native code (C/Assembly) for real-time requirements
Extended double-precision math class
FAT File System
Cryptography (AES and XTEA)
Low power and hibernate support
In-field update (from SD, network or other)
Dimensions: W 2.25" x L 2.05" x H 0.5"
Power
Low power and hibernate modes
Active power consumption 160 mA
Idle power consumption 120 mA
Hibernate power consumption 40 mA
Enviromental:
Requires .NET Gadgeteer standard red power modules.
RoHS compliant /Lead-free compliant
Most EMX software features are GHI exclusive, see software documentation for details.
For more information about .NET Gadgeteer visit:
Photograph taken by Michael Kappel
During World War II the German Army used the SZ40 for high-level communications. It provided on-line encryption and decryption of messages and was capable of handling large volumes of traffic at high speed.
Built by the German firm Lorenz, the SZ40 depended on wheels for its encryption/decryption. It encrypted elements of the electrically generated āBaudot Codeā used in normal telegraphic transmissions (e.g., teletype). By adding the numeric representations of two letters together, a third letter was created. The wheels generated the key. Although highly complex, the use of wheels meant the key was not random.
Seen at the National Security Agencyās National Cryptologic Museum, Fort Meade, Maryland.
An observation from someone who is not an expert in cryptography: Cryptography is about converting order (a written or spoken message) to disorder (an encrypted communication with no clear patterns) and vice versa. Thus, I find it interesting that a number of tools for cryptographyāespecially prior to the digital ageāhave a physical order or pattern.
Taken at the National Cryptologic Museum, NSA.
Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.
Try and Vet T-Shirt Cryptographic Contest at Hack.lu 2011
You can see the highlighted text that I used to build the cryptographic key for the 2011.hack.lu/index.php/TryandVetTshirtContest
I published the solution: www.foo.be/cgi-bin/wiki.pl/2011-10-02_Try_and_Vet_Tshirt_...
Embedded Electronics Starter Kit from GHI Electronics
FEZ Spider Starter Kit
www.ghielectronics.com/catalog/product/297
FEZ Spider Starter Kit is the first commercially available .NET Gadgeteer-compatible kit. it includes everything necessary for educators, hobbyists and even professionals. Embedded development is fast & easy (FEZ) thanks to .NET Micro Framework, .NET Gadgeteer and the numerous GHI value added features such as WiFi and USB Host.
The kit includes:
FEZ Spider Mainboard
Display T35 Module (3.5" with touchscreen)
USB Client DP Module (with USB cable)
Camera Module
2x Multicolor LED Module (DaisyLink)
2x Button Module
Ethernet J11D Module
SD Card Module
USB Host Module
Extender Module
Joystick Module
10cm IDC cables (included with modules).
Assorted IDC Cable Pack:
4x 5cm IDC cables
3x 20cm IDC cables
1x 50cm IDC cable
Reusable Plastic Storage Box
FEZ Spider Mainboard is a .NET Gadgeteer-compatible mainboard based on GHI Electronics' EMX module. This makes FEZ Spider Mainboard the most feature-full .NET Gadgeteer compatible device in the market. It contains all of .NET Micro Framework core features and adds many exclusive features, such as USB host, WiFi and RLP (loading native code). All these features combine to provide a rapid prototyping platform.
Key Features:
14 .NET Gadgeteer compatible sockets that include these types: X, Y, A, C, D, E, F, H, I, K, O, P, S, T, U, R, G, B and Z.
Configurable on-board LED
Configuration switches.
Based on GHI Electronics EMX module
72MHz 32-bit ARM7 processor
4.5 MB Flash
16 MB RAM
LCD controller
Full TCP/IP Stack with SSL, HTTP, TCP, UDP, DHCP
Ethernet, WiFi driver and PPP ( GPRS/ 3G modems) and DPWS
USB host
USB Device with specialized libraries to emulate devices like thumb-drive, virtual COM (CDC), mouse, keyboard
76 GPIO Pin
2 SPI (8/16bit)
I2C
4 UART
2 CAN Channels
7 10-bit Analog Inputs
10-bit Analog Output (capable of WAV audio playback)
4-bit SD/MMC Memory card interface
6 PWM
OneWire interface (available on any IO)
Built-in Real Time Clock (RTC) with the suitable crystal
Processor register access
OutputCompare for generating waveforms with high accuracy
RLP allowing users to load native code (C/Assembly) for real-time requirements
Extended double-precision math class
FAT File System
Cryptography (AES and XTEA)
Low power and hibernate support
In-field update (from SD, network or other)
Dimensions: W 2.25" x L 2.05" x H 0.5"
Power
Low power and hibernate modes
Active power consumption 160 mA
Idle power consumption 120 mA
Hibernate power consumption 40 mA
Enviromental:
Requires .NET Gadgeteer standard red power modules.
RoHS compliant /Lead-free compliant
Most EMX software features are GHI exclusive, see software documentation for details.
For more information about .NET Gadgeteer visit:
Photograph taken by Michael Kappel
Many thanks to Elmhurst University Dr. Dean Jensen who spoke to DGN students about cryptography, the science of secret messages, and cybersecurity. He provided a puzzle and cipher wheels to crack the code!
Alan Turing Archive, Sherborne School Collections, Sherborne School, Abbey Road, Sherborne, Dorset, UK, DT9 3AP.
Alan Mathison Turing (1912-1954) was a pupil at Sherborne School from May 1926 to July 1931. As a Sixth former at Sherborne School, Alan Turing was allowed to borrow books from the School library and between October 1928 and May 1931 he borrowed 33 titles, but only three works of fiction. A list of the books Alan Turing borrowed from Sherborne School library is available here: oldshirburnian.org.uk/wp-content/uploads/2014/08/Alan-Tur...
One of Alan Turingās mathematics teachers at Sherborne was Donald Birkby Eperson. Eperson was a great advocate of the value of āRecreational Mathematicsā in the classroom, believing that it allowed boys to investigate problems and puzzles on their own and so he introduced them to the literary works of Lewis Carroll with their many arithmetical and logical allusions. Inspired by Eperson, Alan borrowed three books by Lewis Carroll from the School library in November 1930: 'The Game of Logic', 'Alice in Wonderland' and 'Through the Looking Glass'.
The majority of the books that Alan Turing borrowed from the School library were for the subjects of mathematics, chemistry, physics and astronomy, some of which Alan borrowed on several occasions, including Thomas Prestonās 'The Theory Heat' which he borrowed five times between February 1930 and June 1931. Other titles, such as J.H. Jeanās 'The Universe Around Us' and T.W. Webbās 'Celestial Objects for Common Telescopes' he took away in December 1929 for Christmas holiday reading. In February-March 1929, he borrowed 'Science and the Modern World' by Alfred North Whitehead (1861-1947) who had attended Sherborne School from 1875 to 1880.
In November 1928, Alan borrowed W.W. Rouse Ballās 'Mathematical Recreations and Essays'. This book contains information about the art of constructing cryptographs and ciphers and reveals Alanās early interest in the subject.
Alan Turing and Christopher Morcom used to meet in the School library on Wednesday afternoons to discuss their shared interests in mathematics, science and astronomy.
In 1965, Alan's mother, Mrs Ethel Sara Turing, donated the Alan Turing Archive to Sherborne School.
For more information about the Alan Turing Archives held at Sherborne School visit: oldshirburnian.org.uk/alan-turing/
If you have any additional information about this image or if you would like to use one of our images then we would love to hear from you. Please leave a comment below or contact us via the Sherborne School Archives website: oldshirburnian.org.uk/school-archives/contact-the-school-...
Dustan Levenstein is a Deanās Honored Graduate in the Department of Mathematics, where he will graduate with a bachelor of science in mathematics. Dustan is being recognized for his advanced academic work, as well as his research efforts with Professor David Ben Zvi that have culminated in an undergraduate thesis entitled āModular Representations of Symmetric Groupsā and a refereed journal publication.
Dustan began his activities in the Mathematics Department while he was still in high school. As an Austin native he was able to take Professor Ted Odell's Honors Advanced Placement Calculus alongside advanced U.T. freshmen. At the end of that semester he entered the Bennett competition run by the department for current freshmen, and was declared the winner over his elders. After being recruited to come to UT, he joined the Deanās Scholars Honors Program and continued to shine. As a sophomore, he was challenged by Professor Michael Starbird to come up with a proof of Kuratowski's Theorem without looking up references. Dustan came up with a proof that was simple and elegant enough that he ended up presenting it to Dr. Starbird's Discrete Mathematics course in the spring, and part of it as a student talk to the math club. Each year, Dustan has participated in the nationwide Putnam examination and has been UTās leading scorer for each of the past four years, even as a freshman.
Dustan has sought out numerous research opportunities while at UT. He participated in an NSF-funded Research Experience for Undergraduates summer program held at Pennsylvania State University. As part of this program he investigated a related set of tiling problems, asking for ways to cover a surface with identical copies of an irregular shape. Dustan's summer research has already led to a paper published in the journal Discrete Mathematics. More recently, Dustan turned his attention to an honors thesis, and chose a rather different direction for this work ā studying Representation Theory, a branch of abstract algebra. He is working with two mathematics faculty members, Professors David Ben-Zvi and John Meth. He has been able to construct useful examples of representations of symmetric groups in his thesis, which will enable him to attack research questions in this area in the future.
Apart from his current research activities, Dustan has mentored many younger undergraduates. Dustan has been a leader of the undergraduate math club and has given several informal research presentations at the club meetings. He maintains a deep interest in computer science and is pursuing independent study of cryptographic protocols that lie in the intersection of mathematics and computer science. He served as the head tutor for Dr. Elaine Rich's Computer Science Automata Theory course and also tutored for two years with the Sanger Learning and Career Center.
This fall, Dustan will begin pursuit of his PhD in mathematics at UCLA. While there, he will benefit from some of his book selections, including Algebraic Geometry by Robin Hartshorne and Commutative Algebra by David Eisenbud.
Smart Multicolor LED Module (DaisyLink)
Embedded Electronics Starter Kit from GHI Electronics
FEZ Spider Starter Kit
www.ghielectronics.com/catalog/product/297
FEZ Spider Starter Kit is the first commercially available .NET Gadgeteer-compatible kit. it includes everything necessary for educators, hobbyists and even professionals. Embedded development is fast & easy (FEZ) thanks to .NET Micro Framework, .NET Gadgeteer and the numerous GHI value added features such as WiFi and USB Host.
The kit includes:
FEZ Spider Mainboard
Display T35 Module (3.5" with touchscreen)
USB Client DP Module (with USB cable)
Camera Module
2x Multicolor LED Module (DaisyLink)
2x Button Module
Ethernet J11D Module
SD Card Module
USB Host Module
Extender Module
Joystick Module
10cm IDC cables (included with modules).
Assorted IDC Cable Pack:
4x 5cm IDC cables
3x 20cm IDC cables
1x 50cm IDC cable
Reusable Plastic Storage Box
FEZ Spider Mainboard is a .NET Gadgeteer-compatible mainboard based on GHI Electronics' EMX module. This makes FEZ Spider Mainboard the most feature-full .NET Gadgeteer compatible device in the market. It contains all of .NET Micro Framework core features and adds many exclusive features, such as USB host, WiFi and RLP (loading native code). All these features combine to provide a rapid prototyping platform.
Key Features:
14 .NET Gadgeteer compatible sockets that include these types: X, Y, A, C, D, E, F, H, I, K, O, P, S, T, U, R, G, B and Z.
Configurable on-board LED
Configuration switches.
Based on GHI Electronics EMX module
72MHz 32-bit ARM7 processor
4.5 MB Flash
16 MB RAM
LCD controller
Full TCP/IP Stack with SSL, HTTP, TCP, UDP, DHCP
Ethernet, WiFi driver and PPP ( GPRS/ 3G modems) and DPWS
USB host
USB Device with specialized libraries to emulate devices like thumb-drive, virtual COM (CDC), mouse, keyboard
76 GPIO Pin
2 SPI (8/16bit)
I2C
4 UART
2 CAN Channels
7 10-bit Analog Inputs
10-bit Analog Output (capable of WAV audio playback)
4-bit SD/MMC Memory card interface
6 PWM
OneWire interface (available on any IO)
Built-in Real Time Clock (RTC) with the suitable crystal
Processor register access
OutputCompare for generating waveforms with high accuracy
RLP allowing users to load native code (C/Assembly) for real-time requirements
Extended double-precision math class
FAT File System
Cryptography (AES and XTEA)
Low power and hibernate support
In-field update (from SD, network or other)
Dimensions: W 2.25" x L 2.05" x H 0.5"
Power
Low power and hibernate modes
Active power consumption 160 mA
Idle power consumption 120 mA
Hibernate power consumption 40 mA
Enviromental:
Requires .NET Gadgeteer standard red power modules.
RoHS compliant /Lead-free compliant
Most EMX software features are GHI exclusive, see software documentation for details.
For more information about .NET Gadgeteer visit:
Photograph taken by Michael Kappel
Royal Holloway University of London (Information Security Group) lecture: Introduction to Cryptography & Security Mechanisms: Theoretical v Practical Security & Crypto Tool Kit.
Blog: makaylalewis.co.uk/2013/10/16/sketchnotes-introduction-to...
©ALL RIGHTS RESERVED.
These photographs are presented here for viewing purposes ONLY. They are NOT royalty free images and may not be used for commercial or private use. Any such use of these images is strictly prohibited. Specifically, these images may not be copied, manipulated, be reproduced by any other means nor sold without prior written consent by the author.
Met de opkomst van de cryptocurrency Bitcoin kwam ook de revolutionaire technologie in beeld; de blockchain. FIBER en de Brakke Grond presenteren een avond met de Vlaamse cyberfilosoof Michel Bauwens over de blockchain. Een gedecentraliseerde database die de basis vormt achter de controversiƫle Bitcoin.
A cryptocurrency is a digital or virtual currency that uses cryptography for security. A cryptocurrency is difficult to counterfeit because of this security feature. Many cryptocurrencies are decentralized systems based on blockchain technology, a distributed ledger enforced by a disparate network of computers. A defining feature of a cryptocurrency, and arguably its biggest allure, is its organic nature; it is not issued by any central authority, rendering it theoretically immune to government interference or manipulation.
The first blockchain-based cryptocurrency was Bitcoin, which still remains the most popular and most valuable. Today, there are thousands of alternate cryptocurrencies with various functions or specifications. Some of these are clones of Bitcoin while others are forks, or new cryptocurrencies that split off from an already existing one.
Das Heer (Army) ENIGMA
THe three rotor ENIGMA became the cryptologic workhorse of the German land forces before World War 2, and continued as such untli V-E day. Rugged, completely portable, and requireing no external power, the machine was highly suited to the Blizkrieg (Lightning) type of war envisioned and practiced by the German High Command.
Although a few German officers felt that the ENIGMA could be broken by a determined cryptanalytic attack, the prevailing feeling was that the time needed by a cryptanalyst to produce intelligence from traffic enciphered on ENIGMA was so great that its value would be lost - no serious effort was made to determine otherwise.
Source National Cryptologic Museum
ENIGMA remains the best known German cryptographic machine of World War II.
ENIGMA cipher machine collection
i09_0214 098
Title: Della fisonomia dell'hvomo del signor Gio. Battista dalla Porta Napolitano : libri sei tradotti di Latino in volgare, e dall'istesso auttore accresciuti di figure, & di passi necessarij a diuerse parti dell'opera; et hora in questa terza, & vltima editione migliorati in piu di mille luoghi, che nella stampa di Napoli si leggeuano scorrettissimi, & aggiontaui La fisonomia naturale di Monsignor Giouanni Ingegneri.
Authors: Porta, Giambattista della approximately 1535-1615; Ingegneri, Giovanni d. 1600 Fisonomia naturale
Publisher: Venice : Pietro Paolo Tozzi
Publication Date: 1615
Physical Description: Illustrated, 23 cm. Book is most likely bound in vellum. Beige headbands.
Call Number: BF 840 .P6716 1615
About this book: this book provides an in-depth study into physiognomy. As quoted from the AbeBooks.com seller in Germany: āDella Porta preceded Lavater in attempting to estimate human character by the features. This is one of the first works on the ancient science of physiognomy to be extensively illustrated (G.-M).ā
Giambattista della Porta (also known as Giovanni Battista Della Porta) was an Italian scholar, playwright and polymath. He studied many subjects, particularly the sciences, mathematics and the occult. He was sometimes referred to as the āprofessor of secrets.ā He was born into an artistic and highly educated family from Vico Equense, near Naples. His books and plays covered diverse subjects including hydraulics, cryptography, comedies, physiognomy, astrology, philosophy and scientific inventions (Wikipedia).
According to Wikipedia, physiognomy is āthe assessment of a personās character or personality from his or her outer appearance, especially the face.ā This study has fallen in and out of favor over time. There is no clear evidence that physiognomy is scientifically sound. In this book, Porta used animals to illustrate human characteristics and often compared the appearance of humans and animals side by side.
Sources cited:
Della Fisonomia DellāHvomo Del Signor Gio. Battista Dalla Porta Napolitano. Libri Sei. Tradotti di Latino in volgare, e dallāistesso Auttore accresciuti di figure,. Et hora in questāvltima Editione migliorati in piu di mille luoghi, che nella stampa di Napoli si leggeuano scorettisimi aggiontaui la Fisonomia Naturale di Monsignor Giouanni Ingegneri. (n.d.) Retrieved June 16, 2015 from AbeBooks.com: www.abebooks.com/servlet/BookDetailsPL?bi=13121068751&....
Giambattista della Porta (n.d.) Retrieved on June 16, 2015 from Wikipedia: en.wikipedia.org/wiki/Giambattista_della_Porta
Physiognomy (n.d.) Retrieved on June 16, 2015 from Wikipedia: en.wikipedia.org/wiki/Physiognomy
The US Navy captured this Japanese RED cipher machine. Like its diplomatic counterpart, the Navy machine separated the alphabet into two subgroups. However, instead of using the Romanized spellings, it has a katakana keyboard. It is believed that due to the difficulty in using and maintaining this machine, the Navy RED saw little use by the Japanese fleet.
Source: National Cryptologic Museum
Red
The prototype machine was finally completed as 91-shiki injiki(ä¹äøå¼å°åę©) ("Type 91 print machine") in 1931. The year 1931 was year 2591 in the Japanese Imperial calendar. Thus it was prefixed "91-shiki" from the year it was developed.
The 91-shiki injiki Roman-letter model was also used by the Ministry of Foreign Affairs as Angooki Taipu-A (ęå·ę© ćæć¤ćA) ("Type A Cipher Machine"), codenamed Red by United States cryptanalysts.
The Red machine was unreliable unless the contacts in its half-rotor switch were cleaned every day. It enciphered vowels (AEIOUY) and consonants separately, perhaps to reduce telegram costs, and this was a significant weak point. The Navy also used the 91-shiki injiki Kana-letter model at its bases and on its vessels.
Source
Met de opkomst van de cryptocurrency Bitcoin kwam ook de revolutionaire technologie in beeld; de blockchain. FIBER en de Brakke Grond presenteren een avond met de Vlaamse cyberfilosoof Michel Bauwens over de blockchain. Een gedecentraliseerde database die de basis vormt achter de controversiƫle Bitcoin.
Met de opkomst van de cryptocurrency Bitcoin kwam ook de revolutionaire technologie in beeld; de blockchain. FIBER en de Brakke Grond presenteren een avond met de Vlaamse cyberfilosoof Michel Bauwens over de blockchain. Een gedecentraliseerde database die de basis vormt achter de controversiƫle Bitcoin.
Taken at the National Cryptologic Museum, NSA.
Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.
Embedded Electronics Starter Kit from GHI Electronics
FEZ Spider Starter Kit
www.ghielectronics.com/catalog/product/297
FEZ Spider Starter Kit is the first commercially available .NET Gadgeteer-compatible kit. it includes everything necessary for educators, hobbyists and even professionals. Embedded development is fast & easy (FEZ) thanks to .NET Micro Framework, .NET Gadgeteer and the numerous GHI value added features such as WiFi and USB Host.
The kit includes:
FEZ Spider Mainboard
Display T35 Module (3.5" with touchscreen)
USB Client DP Module (with USB cable)
Camera Module
2x Multicolor LED Module (DaisyLink)
2x Button Module
Ethernet J11D Module
SD Card Module
USB Host Module
Extender Module
Joystick Module
10cm IDC cables (included with modules).
Assorted IDC Cable Pack:
4x 5cm IDC cables
3x 20cm IDC cables
1x 50cm IDC cable
Reusable Plastic Storage Box
FEZ Spider Mainboard is a .NET Gadgeteer-compatible mainboard based on GHI Electronics' EMX module. This makes FEZ Spider Mainboard the most feature-full .NET Gadgeteer compatible device in the market. It contains all of .NET Micro Framework core features and adds many exclusive features, such as USB host, WiFi and RLP (loading native code). All these features combine to provide a rapid prototyping platform.
Key Features:
14 .NET Gadgeteer compatible sockets that include these types: X, Y, A, C, D, E, F, H, I, K, O, P, S, T, U, R, G, B and Z.
Configurable on-board LED
Configuration switches.
Based on GHI Electronics EMX module
72MHz 32-bit ARM7 processor
4.5 MB Flash
16 MB RAM
LCD controller
Full TCP/IP Stack with SSL, HTTP, TCP, UDP, DHCP
Ethernet, WiFi driver and PPP ( GPRS/ 3G modems) and DPWS
USB host
USB Device with specialized libraries to emulate devices like thumb-drive, virtual COM (CDC), mouse, keyboard
76 GPIO Pin
2 SPI (8/16bit)
I2C
4 UART
2 CAN Channels
7 10-bit Analog Inputs
10-bit Analog Output (capable of WAV audio playback)
4-bit SD/MMC Memory card interface
6 PWM
OneWire interface (available on any IO)
Built-in Real Time Clock (RTC) with the suitable crystal
Processor register access
OutputCompare for generating waveforms with high accuracy
RLP allowing users to load native code (C/Assembly) for real-time requirements
Extended double-precision math class
FAT File System
Cryptography (AES and XTEA)
Low power and hibernate support
In-field update (from SD, network or other)
Dimensions: W 2.25" x L 2.05" x H 0.5"
Power
Low power and hibernate modes
Active power consumption 160 mA
Idle power consumption 120 mA
Hibernate power consumption 40 mA
Enviromental:
Requires .NET Gadgeteer standard red power modules.
RoHS compliant /Lead-free compliant
Most EMX software features are GHI exclusive, see software documentation for details.
For more information about .NET Gadgeteer visit:
Photograph taken by Michael Kappel
Embedded Electronics Starter Kit from GHI Electronics
FEZ Spider Starter Kit
www.ghielectronics.com/catalog/product/297
FEZ Spider Starter Kit is the first commercially available .NET Gadgeteer-compatible kit. it includes everything necessary for educators, hobbyists and even professionals. Embedded development is fast & easy (FEZ) thanks to .NET Micro Framework, .NET Gadgeteer and the numerous GHI value added features such as WiFi and USB Host.
The kit includes:
FEZ Spider Mainboard
Display T35 Module (3.5" with touchscreen)
USB Client DP Module (with USB cable)
Camera Module
2x Multicolor LED Module (DaisyLink)
2x Button Module
Ethernet J11D Module
SD Card Module
USB Host Module
Extender Module
Joystick Module
10cm IDC cables (included with modules).
Assorted IDC Cable Pack:
4x 5cm IDC cables
3x 20cm IDC cables
1x 50cm IDC cable
Reusable Plastic Storage Box
FEZ Spider Mainboard is a .NET Gadgeteer-compatible mainboard based on GHI Electronics' EMX module. This makes FEZ Spider Mainboard the most feature-full .NET Gadgeteer compatible device in the market. It contains all of .NET Micro Framework core features and adds many exclusive features, such as USB host, WiFi and RLP (loading native code). All these features combine to provide a rapid prototyping platform.
Key Features:
14 .NET Gadgeteer compatible sockets that include these types: X, Y, A, C, D, E, F, H, I, K, O, P, S, T, U, R, G, B and Z.
Configurable on-board LED
Configuration switches.
Based on GHI Electronics EMX module
72MHz 32-bit ARM7 processor
4.5 MB Flash
16 MB RAM
LCD controller
Full TCP/IP Stack with SSL, HTTP, TCP, UDP, DHCP
Ethernet, WiFi driver and PPP ( GPRS/ 3G modems) and DPWS
USB host
USB Device with specialized libraries to emulate devices like thumb-drive, virtual COM (CDC), mouse, keyboard
76 GPIO Pin
2 SPI (8/16bit)
I2C
4 UART
2 CAN Channels
7 10-bit Analog Inputs
10-bit Analog Output (capable of WAV audio playback)
4-bit SD/MMC Memory card interface
6 PWM
OneWire interface (available on any IO)
Built-in Real Time Clock (RTC) with the suitable crystal
Processor register access
OutputCompare for generating waveforms with high accuracy
RLP allowing users to load native code (C/Assembly) for real-time requirements
Extended double-precision math class
FAT File System
Cryptography (AES and XTEA)
Low power and hibernate support
In-field update (from SD, network or other)
Dimensions: W 2.25" x L 2.05" x H 0.5"
Power
Low power and hibernate modes
Active power consumption 160 mA
Idle power consumption 120 mA
Hibernate power consumption 40 mA
Enviromental:
Requires .NET Gadgeteer standard red power modules.
RoHS compliant /Lead-free compliant
Most EMX software features are GHI exclusive, see software documentation for details.
For more information about .NET Gadgeteer visit:
Photograph taken by Michael Kappel
pluralistic.net/2025/08/14/bellovin/#wont-someone-think-o...
Three kids in a trenchcoat, atop one another's shoulders. They stand before a hellishly complex midcentury computing control room.
Embedded Electronics Starter Kit from GHI Electronics
FEZ Spider Starter Kit
www.ghielectronics.com/catalog/product/297
FEZ Spider Starter Kit is the first commercially available .NET Gadgeteer-compatible kit. it includes everything necessary for educators, hobbyists and even professionals. Embedded development is fast & easy (FEZ) thanks to .NET Micro Framework, .NET Gadgeteer and the numerous GHI value added features such as WiFi and USB Host.
The kit includes:
FEZ Spider Mainboard
Display T35 Module (3.5" with touchscreen)
USB Client DP Module (with USB cable)
Camera Module
2x Multicolor LED Module (DaisyLink)
2x Button Module
Ethernet J11D Module
SD Card Module
USB Host Module
Extender Module
Joystick Module
10cm IDC cables (included with modules).
Assorted IDC Cable Pack:
4x 5cm IDC cables
3x 20cm IDC cables
1x 50cm IDC cable
Reusable Plastic Storage Box
FEZ Spider Mainboard is a .NET Gadgeteer-compatible mainboard based on GHI Electronics' EMX module. This makes FEZ Spider Mainboard the most feature-full .NET Gadgeteer compatible device in the market. It contains all of .NET Micro Framework core features and adds many exclusive features, such as USB host, WiFi and RLP (loading native code). All these features combine to provide a rapid prototyping platform.
Key Features:
14 .NET Gadgeteer compatible sockets that include these types: X, Y, A, C, D, E, F, H, I, K, O, P, S, T, U, R, G, B and Z.
Configurable on-board LED
Configuration switches.
Based on GHI Electronics EMX module
72MHz 32-bit ARM7 processor
4.5 MB Flash
16 MB RAM
LCD controller
Full TCP/IP Stack with SSL, HTTP, TCP, UDP, DHCP
Ethernet, WiFi driver and PPP ( GPRS/ 3G modems) and DPWS
USB host
USB Device with specialized libraries to emulate devices like thumb-drive, virtual COM (CDC), mouse, keyboard
76 GPIO Pin
2 SPI (8/16bit)
I2C
4 UART
2 CAN Channels
7 10-bit Analog Inputs
10-bit Analog Output (capable of WAV audio playback)
4-bit SD/MMC Memory card interface
6 PWM
OneWire interface (available on any IO)
Built-in Real Time Clock (RTC) with the suitable crystal
Processor register access
OutputCompare for generating waveforms with high accuracy
RLP allowing users to load native code (C/Assembly) for real-time requirements
Extended double-precision math class
FAT File System
Cryptography (AES and XTEA)
Low power and hibernate support
In-field update (from SD, network or other)
Dimensions: W 2.25" x L 2.05" x H 0.5"
Power
Low power and hibernate modes
Active power consumption 160 mA
Idle power consumption 120 mA
Hibernate power consumption 40 mA
Enviromental:
Requires .NET Gadgeteer standard red power modules.
RoHS compliant /Lead-free compliant
Most EMX software features are GHI exclusive, see software documentation for details.
For more information about .NET Gadgeteer visit:
Photograph taken by Michael Kappel
Embedded Electronics Starter Kit from GHI Electronics
FEZ Spider Starter Kit
www.ghielectronics.com/catalog/product/297
FEZ Spider Starter Kit is the first commercially available .NET Gadgeteer-compatible kit. it includes everything necessary for educators, hobbyists and even professionals. Embedded development is fast & easy (FEZ) thanks to .NET Micro Framework, .NET Gadgeteer and the numerous GHI value added features such as WiFi and USB Host.
The kit includes:
FEZ Spider Mainboard
Display T35 Module (3.5" with touchscreen)
USB Client DP Module (with USB cable)
Camera Module
2x Multicolor LED Module (DaisyLink)
2x Button Module
Ethernet J11D Module
SD Card Module
USB Host Module
Extender Module
Joystick Module
10cm IDC cables (included with modules).
Assorted IDC Cable Pack:
4x 5cm IDC cables
3x 20cm IDC cables
1x 50cm IDC cable
Reusable Plastic Storage Box
FEZ Spider Mainboard is a .NET Gadgeteer-compatible mainboard based on GHI Electronics' EMX module. This makes FEZ Spider Mainboard the most feature-full .NET Gadgeteer compatible device in the market. It contains all of .NET Micro Framework core features and adds many exclusive features, such as USB host, WiFi and RLP (loading native code). All these features combine to provide a rapid prototyping platform.
Key Features:
14 .NET Gadgeteer compatible sockets that include these types: X, Y, A, C, D, E, F, H, I, K, O, P, S, T, U, R, G, B and Z.
Configurable on-board LED
Configuration switches.
Based on GHI Electronics EMX module
72MHz 32-bit ARM7 processor
4.5 MB Flash
16 MB RAM
LCD controller
Full TCP/IP Stack with SSL, HTTP, TCP, UDP, DHCP
Ethernet, WiFi driver and PPP ( GPRS/ 3G modems) and DPWS
USB host
USB Device with specialized libraries to emulate devices like thumb-drive, virtual COM (CDC), mouse, keyboard
76 GPIO Pin
2 SPI (8/16bit)
I2C
4 UART
2 CAN Channels
7 10-bit Analog Inputs
10-bit Analog Output (capable of WAV audio playback)
4-bit SD/MMC Memory card interface
6 PWM
OneWire interface (available on any IO)
Built-in Real Time Clock (RTC) with the suitable crystal
Processor register access
OutputCompare for generating waveforms with high accuracy
RLP allowing users to load native code (C/Assembly) for real-time requirements
Extended double-precision math class
FAT File System
Cryptography (AES and XTEA)
Low power and hibernate support
In-field update (from SD, network or other)
Dimensions: W 2.25" x L 2.05" x H 0.5"
Power
Low power and hibernate modes
Active power consumption 160 mA
Idle power consumption 120 mA
Hibernate power consumption 40 mA
Enviromental:
Requires .NET Gadgeteer standard red power modules.
RoHS compliant /Lead-free compliant
Most EMX software features are GHI exclusive, see software documentation for details.
For more information about .NET Gadgeteer visit:
Photograph taken by Michael Kappel
Jaina Lefevre pulls a cherry from her coke and takes a bite, putting the stem on the little napkin and chewing before taking a sip. She glances over at Deets and grins, bouncing a little. "Mama..can I has a netbook soon?"
Deets Carroll glances at the child. "A NETBOOK? Well... I suppose if you save up for one... What do you want a netbook for?"
Jaina Lefevre swallows the third? Fourth? cherry and piles up the stems. "School. I can finds more stuff online and I'm bored. I finished the puzzle book."
Deets Carroll hrrms. "Well, I suppose we can talk about it with Mommy Deb... you know, *I* never had a netbook when *I* was your age..." She had to build her own. From broken toasters. And she was GRATEFUL.
Lanaria Pera chuckles softly looking back at deets grining"when were you born again?"
Deets Carroll mock-glares at Lana. "Don't interrupt me when I'm mommying."
Jaina Lefevre looks up at Deets, bats her lashes and lets her lower lip quiver. "But..but...all th'other kids are slooower."
Lanaria Pera would snicker "yes ma'am. " and she'd give a mock salute, mouthing to jania she's ooollldd.
Jeffery Nubalo: smiles at the little girl answering her question "I was born back when dinasours roamed the earth" looks at her then back at the girl "and i would say she would be to"
Lanaria Pera would nod grining at jeff ya, lana would probably be too... except she cant remember how old she is.. or when her birthday is.. looking down her smile fading a little she goes back to wiping down the bar.
Deets Carroll sighs. "Well, let's talk to Mommy Deb about it. I don't want you spending all your time on the net. It's not healthy."
Jaina Lefevre blinks at Deets and nods, lowering her chin, but grinning at Lana through her bangs. She sips at her coke and then blurts. "Needs more books too...I gotta ask Mommy for the next book in th' class stuff she had on th'table."
Deets Carroll frowns, "Which class stuff is that?"
Jaina Lefevre stumbles over the words. "Mek-nyzed...war-fare. It was the book she left by the light. I didn't knowed they used dro...dr...how do you say that?"
Deets Carroll guesses. "Dromedaries? Druids? Drama teachers?"
Garthrim Ranger turns toward the little girl " Droids?"
Lanaria Pera would arch a brow looking back at deets "mechanized warfare? good lord deets what are you guys leaving lying aorund?
Jaina Lefevre shakes her head, getting frustrated. "Drow..nezz...things. No peoples in them. I figures it's got second class books for it 'cause this one said un-class-fied on the cover."
Deets Carroll waves a hand back at Lana. "Shush. The sex stuff is up high, out of reach."
Deets Carroll nods. "Drones?"
Garthrim Ranger Laughs " that will be the first things she gets her hands on"
Lanaria Pera arches a brow but shakes her head"ya. tell her where it is... "
Jeffery Nubalo: frowns shaking his head "who needs a book on mechanized warefar, what you need is Sun Tzu's Art of War"
Jaina Lefevre looks over at Jeff. "Already read dat one. Sounds like a bunch of cookie papers."
Deets Carroll studies the child. "Let's have a long talk with Mommy Deb. We need to figure out what you should be learning. What do *you* want to learn about?"
Lanaria Pera shakes her head again "where did you find her again?... most kids her age should be interested in dolls. and playing.. '
Jeffery Nubalo: raises an eyebrow "cookie paper? one of the best generals ever to have lived"
Jaina Lefevre looks up at Deets, expression serious. "Everythin'. Not clay and bottles and doors. That's dumb baby stuff." She sips her soda and then glances over at Jeff. 'Uh huh. Tells ya somethin', if ya think he was the best. He died like twenty-four hunnert years ago."
Deets Carroll grins at the child's assessment. "Okay, let's look at it this way. Suppose you could learn everything? What would you want to learn first?" She waves the Garth as she departs.
Jeffery Nubalo: smiles "i know what she wants to learn" chuckles "she wants to learn Mathematics and Poly Science"
Jaina Lefevre waves to Garth and then looks back at Deets. "Um...puzzles. And guns and how t'fix peoples...and stuff like that."
Jaina Lefevre glances over to Jeff. "Crypt-graffy."
Jeffery Nubalo: smiles "computer cryptography, i would love to teach someone about what i do with computers"
Jaina Lefevre shakes her head at Jeff. "Nuh uh. Spy stuff. So's I can help Mommy."
Lanaria Pera just looks back at the girl with a smile "you may not be an alien.. but your an odd little girl.. "
Deets Carroll nods. "Well, you would need math for that. A lot of it. That's a good start. And being a doctor is a good thing, too." She considers. "How about... suppose you could write stories? Suppose you could write such good stories that people would laugh, or cry, when they read them?"
Jaina Lefevre looks at Deets. "Why? Most stories is dumb." She makes a face and recites "See the dog. The dog is brown. He is tired. He ran far." She rolls her eyes. "Or th'poem stories. Those are even more dumb."
Deets Carroll shrugs, "Maybe you just haven't read the right stories. A good storyteller can change people's minds about something. Influence them to see things the way the writer wants them to." It was pretty obvious the child wasn't inclined that way.
Jaina Lefevre ohs to Deets. "I dooze that by talkin' to them. It's easier." She grins and finishes the coke. "I think Nanny flunked her test, Mama. Does this mean I get a new Nanny?"
Deets Carroll frowns. "Maybe it was YOUR test, too. I don't think we can get you a new nanny if you keep losing them. Maybe it would be best if you lived with Mommy in the BlackStar compound."
Jaina Lefevre sighs "Not my fault she was suckin' face with Nick all the time and now she's gonna make a brat."
Jaina Lefevre moves to give Deets a hug and a kiss and slides off the bar with her help. 'I'll take Nanny home now so she can keep pukin in the bathroom and I can reads s'more. Love you, Mama...Bye Lana. By Mister Jeff."
Deets Carroll looks pointedly at the child. "If you're so smart, maybe it *should* be your fault." Kid may be smart, but she's getting too big for her britches.