Authors name: Brasquet and Thomsen
This is the 2 post of the third Term. What it diferences this post with the other is that this one has an audio. In this audio I interview Alex with somo Cryptography questions. They are exactly three questions. The interview has not just "define questions" but like "personal questions". Some example is like "what would you do in case....". The audio also has some music so you will enjoy it a littel more. About the Cryptography if you want more infromation you can learn it on Khan Academy so I did. Its a great way to learn about this diffiuclt topic I am talking about.
So as I said Cryptography can be used basacally for many many thing like secret messeges , cheating in a test, for a crime , for doings things anomusly etc. Now I am getting more into details about the secret messeges and anonimusly remailers.
A remailer is a free service that strips off the header information from an electronic message and passes along only the content. It's important to note that the remailer may retain your identity, and rather than trusting the operator, many users may relay their message through several anonymous remailers before sending it to its intended recipient. That way only the first remailer has your identity, and from the end point, it's nearly impossible to retrace.
Here's a typical scenario - the sender intends to post a message to a news group via three remailers (remailer 1, remailer 2, remailer 3). He encrypts the message with the last remailer's (remailer 3's) public key. He sends the encrypted message to remailer 1, which strips away his identity, then forwards it to remailer 2, which forwards it to remailer 3. Remailer 3 decrypts the message and then posts it to the intended newsgroup.
Finally here is a video explaining how do we use Cryptography in everyday tegnology.
Done with Alex Thomsen





No comments:
Post a Comment