preview

Internet Privacy In 'Blown To Bits'

Decent Essays

In the fifth section of the book “Blown to Bits”, the author talks about and explains data encryption, and how to defend data from people who are spying on it on the internet. The first part of the chapter mentions an example of legislation that was after the attack on the World Trade Center on September 11th. Senator Judd Gregg had the idea that all encryption agencies had to give access to their encryption data so that their information can be seen and tracked. The idea was accepted and turned out to be a success after the publishing of the Patriot Act.
To understand encryption, you must place yourself into the internet of the 90’s. At the time the internet was still new, all the data could be seen and accessed easily.The problem was that anyone could access your information and read it. This was a major issue because at that time, internet privacy was almost impossible. …show more content…

Encryption on the other hand, is nothing new to humans.It has been used for millenniums, and can be traced as far back as ancient Egyptian history. There are many famous, but one stands out. Caesar Cipher, which is working on a very simple system, shifting the alphabet. This code is very simple to break, but there are other codes that are much harder. Equatorie of Planetis is a substitution cipher as well, but is not a shift of the alphabet. The way to solve this cipher is based on a letter system that’s called frequency analysis .It can be decoded with a method called frequency

Get Access