Why cryptocurrencies Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an Original Essay Cryptography is the art of writing or solving code. These codes are used to transmit messages to enable secrecy and security. It has been used for centuries mainly for militaristic purposes. Kings sent spies into enemy territory who used discreet code words to speak safely to their allies. Washington and the founding fathers had their own spy network that used vaults written by Ben Franklin (mostly) to communicate securely while under the eyes of the British. Today, our military uses codes and encryption to exchange sensitive information securely over the Internet and in person. Cryptography was an important aspect during World War II that ultimately helped decide the war. Messages were sent over telegraph wires using complex codes and keys on both sides and it was a constant battle of "who knows what?" Today the same battle continues, but today it is done mainly through the internet. Nowadays, instead of using morse code and large encryption machines that can decrypt messages, we instead use the Internet and complicated programs and algorithms to protect our vital information. Any normal person could be hacked almost anywhere in the world, and sometimes finding a hacker or preventing a security breach is easier said than done. Likewise, it's not always easy to hack into someone's network. Sometimes countries and government agencies attempt to spy on dangerous criminal organizations or even on each other by attempting to crack their targets' encryptions. The two "worlds" shown in "Cryptonomicon" are from World War II and the present day. Wartime was very different then, with less trained and disciplined soldiers who were often fresh out of school or even fresh off the streets to enlist. Officers often abused opium and slept with prostitutes when they were away. This is embodied by the character Frick with whom Shaftoe had a conflict while aboard his ship. Nowadays, actions such as these would most likely be reciprocated with a court marshal or some other form of military discipline. Soldiers of the time also often used racist language towards the Chinese. They regularly referred to shoe shiners, stock boys, Chinese soldiers, or even ordinary Chinese as "Coolies" and their "Chop-Suey" fighting style. Nowadays soldiers would be a little more careful about their conditions due to the codes of conduct and discipline expected of you, as well as the fact that if you were to be recorded saying racist slurs, the world would probably know by the next day due to the Internet. .Apple vs. the US Government One of the most notable legal conflicts monitored by the media recently was the one between Apple and the FBI. a terrorist who organized and carried out a mass shooting used an Apple iPhone to plan and make calls in the months before the attack, but had stopped backing up his information to the cloud. For this reason the FBI needs to hack the phone to see if there was any vital information on the phone related to terrorist organizations or imminent attacks. The problem is that the FBI is currently unable to hack the phone without risking the permanent loss of all information on the phone. Because of this, the FBI asks Apple to create a "key" that they can use to allow the FBI to hack the phone. Apple howeverhe refuses to do so because he believes that this way it could be used to hack all Apple devices. Apple iPhones are encrypted with 256-bit encryption which ultimately gives any user peace of mind that their device is safe from hackers, however if this key were to be created, Apple believes it would pose a huge risk to this security system and would put all its users in danger. risk. Craig Federighi said in a statement: "In the past 18 months alone, hackers have repeatedly breached the defenses of retail chains, banks and even the federal government, stealing credit card information, Social Security numbers and data of the fingerprints of millions of people. In addition to personal data, Federighi also spoke about the possibility that terrorist organizations can hack personal devices are hacked, criminals and terrorists who want to infiltrate systems and destroy sensitive networks can begin their attacks through access to a single person's smartphone." Federighi said encryption represents "the best data security available to consumers," making it "so disappointing" that the FBI is pushing against his technology. In contrast, the FBI wants Apple to comply and does not believe it would be as catastrophic to security as Apple claims. For the sake of national security, Apple should assist the FBI by providing them with a "key" that could be used to hack into the San Bernardino shooter's iPhone. Apple says this would be a major breach of security and privacy for millions of people The FBI says that this data key will be kept safe and that they only want to use it to access this phone. They claim this would not put millions of iPhone users at risk of cyber attacks. The FBI claims that rights will not be compromised if Apple were to comply with the FBI's request and has given a number of reasons as to why Apple should comply with their request and why Americans would not be at the same risks that Apple claims they would be. First, the main reason why the FBI believes that Apple should help them unlock the phone with this “key” is because the key itself would only identify itself to that individual iPhone. This means that the key will not be able to unlock other iPhone models, but only that one and possibly other iPhone 5s. Second, the FBI is fully satisfied that the software is created exclusively within an Apple facility and that the phone is also unlocked. The phone itself should never end up in government custody. Third, even if the FBI were to obtain the software and want to use it, they would need a search warrant to do so. Finally, the FBI gave Apple the option to use an alternative means of hacking the phone and offered to pay any amount to do so. In other words, it doesn't care about the software, but only accesses Farook's messages, contacts, emails and photos. Personally, I try to stay neutral in major media conflicts, but if I were asked whether I would support the FBI or Apple, I would say I would lean more towards Apple. The reason I chose to side with Apple is because, while I see the urgency in the FBI's need to get into this phone, I believe it would be a security breach to create the "key" to the phone. Hackers have already entered the private servers of government agencies and if this key were to be created, they would most likely be able to get their hands on it..
tags