Wednesday, August 20, 2014
Search
  
Most Popular
Tech Views
General Computing
WEB Reviews
Seagate Enterprise Capacity 3.5 V.3 4TB SAS 6Gb/s HDD Review
OCZ Vector 256GB SSD Review @ Custom PC Review
Gigabyte F2A85XM-D3H
NZXT Phantom 630
Auvio Bluetooth Portable Speaker Review
Corsair H90 CPU Cooler Review
BIOSTAR Hi-Fi Z77X (Intel Z77) Motherboard Review
Noctua NH-L9i Cooler Review on Technic3D
Breaking News
Infineon To Buy International Rectifier for Approximately $3 Billion
Verizon May Launch New App Store
ZTE Nubia 5S mini LTE Coming Unlocked For $280
Lenovo Expands Its ThinkCentre Range with Affordable Desktop PCs
Samsung and Barnes & Noble Introduce Samsung Galaxy Tab 4 NOOK
TCL and Roku Introduce Streaming TVs
Ballmer Steps Down From Microsoft Board
Samsung To Unveil New Smart TV Content at IFA 2014
Home > Tech Views > General Computing

Monday, May 16, 2005
Fighting Big Brother

2. Page 2

Let’s take things from the beginning…

There is one and only basic feature in digital communications carried out as they are, either through new generation telephone apparatuses, or through mobiles, or through computer networks: what they practically convey is numbers. Anything we key on a computer, or utter on the phone, is turned into digits, carried through the line and decoded when reaching the receiver. Yet, it is possible that these numbers are “jumbled” in the source of transmission, on the grounds of an equation called the algorithm, to be rearranged in their proper order again when reaching their destination with the help of the same equation. If, in the meantime, one overrides the transmission in question and is not in possession of the algorithm, is by no means capable of comprehending the message.

The technology linked to ciphering as well as deciphering messages is rather old but the high cost involved in it has made a state monopoly out of it. With the discovery of the Personal Computer and the Digital Telephone Device the process has been simplified indeed. Now anyone can encode their messages providing they are in possession of the appropriate program. This way the state lost both its privilege to the monopoly of cryptography and the ability to spy upon the just and the unjust at the same time…

This “danger” became visible at an early stage by the USA secret services. Since 1979, Bobby Inman, head of the NSA-National Security Agency (an organization whose existence was unknown to everyone prior to 1966)-had been persisting in his department assuming control over all cryptography programs, congruent with the one over nuclear weapons, handed over to the Pentagon! Yet, his dictates had not been heard till it was too late. The science of cryptography was breaking away from academic institutions and, mainly through the Internet, spreading to the public.

In 1990 the American government tried to pass a bill against crime. One of its provisions allowed for the codes connected with products of cryptography to be readable by the state authorities. General clamor broke out, but that was not enough for the bill to be revoked, on the grounds of “national interest”…




Get RSS feed Easy Print E-Mail this Message


 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .