RSA p1 released

master
Tait Hoyem 4 years ago
parent 59cc1bc927
commit 0f173be915

@ -1,28 +1,28 @@
---
title: "(draft) RSA Part 1: Why?"
title: "RSA Part 1: Why?"
layout: post
author: tait
---
What is the most unexcusable thing you have typed into Google search? What is the most personal secret you told a friend in confidence? What is your bank password? What is your business's secret to stay ahead of the competition?
What is the most embarassing thing you have typed into Google search? What is the most personal secret you told a friend in confidence? What is your bank password? What is your business's secret to stay ahead of the competition?
Now at first these questions may seem not completely related. There is a point though: You likely sent all of this information over the internet.
When you sent a text to your best friend telling them that secret or send your business partner an email, why is it that anyone can't just listen the signals coming form your phone or laptop and know what you sent to your friend or colleague? The answer: encryption.
When you send that messege to your friend or business partner, why is it that any person can't just listen to the signals coming from your phone or laptop and know what you sent to your friend or colleague? The answer: encryption.
First, some background about internet privacy. You can't have a conversation about internet encryption and privacy without discussing the man himself:
### Snowden
[Edward Joseph Snowden](https://en.wikipedia.org/wiki/Edward_Snowden) is an ex-NSA, ex-CIA employee who felt the United State's [4th Ammendment](https://en.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitution) was being violated by their programs of msas survailence.
Snowden was raised a staunch establishmentarian conservative; his girlfriend Lisndey however, slowly started changing his mind. Snowden became very influenced by the ideology of [populism](https://en.wikipedia.org/wiki/Populism).
His populist thinking is shown very clearly when he explains his reasoning for his disclosure of humungous troves of NSA documents.
[Edward Joseph Snowden](https://en.wikipedia.org/wiki/Edward_Snowden){:target="_blank"} is an ex-NSA, ex-CIA employee who felt the United State's [4th Ammendment](https://en.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitution){:target="_blank"} was being violated by their programs of msas survailence.
Snowden was raised a staunch establishmentarian conservative; his girlfriend Lisndey however, slowly started changing his mind. Snowden became very influenced by the ideology of [populism](https://en.wikipedia.org/wiki/Populism){:target="_blank"}.
His populist thinking is shown very clearly when he explains his reasoning for his disclosure of humongous troves of NSA documents.
> "My sole motive is to inform the public as to that which is done in their name and that which is done against them."
> ---[Edward Snowden](https://www.theguardian.com/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-video)
> ---[Edward Snowden](https://www.theguardian.com/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-video){:target="_blank"}
Snowden's first set of leaks went public in [The Gaurdian](https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security), [The New York Times](https://www.nytimes.com/2013/06/10/us/former-cia-worker-says-he-leaked-surveillance-data.html), and [ProPublica](https://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption) in late 2013;
people started to realize that their governments and ISPs **are** listening. People understood there might be more sinister motives than "national security" at play.
Snowden's first set of leaks went public in [The Gaurdian](https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security){:target="_blank"}, [The New York Times](https://www.nytimes.com/2013/06/10/us/former-cia-worker-says-he-leaked-surveillance-data.html){:target="_blank"}, and [ProPublica](https://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption){:target="_blank"} in late 2013;
people started to realize that their governments and internet service providers (ISPs) **are** listening. People understood there might be more sinister motives than "national security" at play.
Personally, I have seen a lot of non-tech-savy individuals using security-conscious software when I am helping them fix a problem.
In fact, there was one time I saw a collage student from rural Alberta who had a VPN running on her phone. This impressed me!
@ -34,7 +34,7 @@ This kind of encryption stops two things from happening: A) it stops the informa
Without HTTPS it is possible for sombody to listen in and change the data being sent between you and a server.
Only in recent years has HTTPS become near-universal across the web. It is used even on the simplest sites these days: this one included. After 2013, people became weary of government, criminal, and internet service provider (ISP) interference with their web traffic.
Only in recent years has HTTPS become near-universal across the web. It is used even on the simplest sites these days: this one included. After 2013, people became weary of government, criminal, and ISP interference with their web traffic.
This can be backed up by statistics:
The level of encrypted web traffic around the time of the Snowden leaks was around 30 percent. It was mostly used by banks, email providers, government, and journalists.
At the turn of the 2020s however, this has risen to nearly 90 percent among U.S. users of Firefox.
@ -43,11 +43,11 @@ Japan lags slightly behind with 80 percent encrypted traffic.
<figure>
<img src="/assets/img/encrypted-web-traffic.png" alt="Use of encrypted web traffic incresing over time.">
<figcaption>
More at: <a href="https://letsencrypt.org/stats/">Let's Encrypt</a>
More at: <a href="https://letsencrypt.org/stats/" target="_blank">Let's Encrypt</a>
</figcaption>
</figure>
This is just the data we know of. You can disable the telemetry settings in Firefox, and it is very likely that hardcore privacy advocates would disable this data collection, so perhaps the amount of encrypted web traffic is slightly higher.
This is just the data we know of. You can disable the [telemetry](https://en.wikipedia.org/wiki/Telemetry#Software){:target="_blank"} settings in Firefox, and it is very likely that hardcore privacy advocates would disable this data collection, so perhaps the amount of encrypted web traffic is slightly higher.
### What about RSA?

@ -0,0 +1,55 @@
---
title: "RSA Part 1: Why?"
layout: post
author: tait
---
What is the most embarassing thing you have typed into Google search? What is the most personal secret you told a friend in confidence? What is your bank password? What is your business's secret to stay ahead of the competition?
Now at first these questions may seem not completely related. There is a point though: You likely sent all of this information over the internet.
When you send that messege to your friend or business partner, why is it that any person can't just listen to the signals coming from your phone or laptop and know what you sent to your friend or colleague? The answer: encryption.
First, some background about internet privacy. You can't have a conversation about internet encryption and privacy without discussing the man himself:
### Snowden
[Edward Joseph Snowden](https://en.wikipedia.org/wiki/Edward_Snowden){:target="_blank"} is an ex-NSA, ex-CIA employee who felt the [United State's 4th Ammendment](https://en.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitution){:target="_blank"} was being violated by their programs of msas survailence.
Snowden was raised a staunch establishmentarian conservative; his girlfriend Lisndey however, slowly started changing his mind. Snowden became very influenced by the ideology of [populism](https://en.wikipedia.org/wiki/Populism){:target="_blank"}.
His populist thinking is shown very clearly when he explains his reasoning for his disclosure of humongous troves of NSA documents.
> "My sole motive is to inform the public as to that which is done in their name and that which is done against them."
> ---[Edward Snowden](https://www.theguardian.com/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-video){:target="_blank"}
Snowden's first set of leaks went public in [The Gaurdian](https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security){:target="_blank"}, [The New York Times](https://www.nytimes.com/2013/06/10/us/former-cia-worker-says-he-leaked-surveillance-data.html){:target="_blank"}, and [ProPublica](https://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption){:target="_blank"} in late 2013;
people started to realize that their governments and internet service providers (ISPs) **are** listening. People understood there might be more sinister motives than "national security" at play.
Personally, I have seen a lot of non-tech-savy individuals using security-conscious software when I am helping them fix a problem.
In fact, there was one time I saw a collage student from rural Alberta who had a VPN running on her phone. This impressed me!
### Encryption on The Web
The type of encryption used on the web is called: HyperText Transfer Protocol--Secure (HTTPS).
This kind of encryption stops two things from happening: A) it stops the information you are sending and recieving online from being seen by easvesdroppers and criminals, and B) stops those same third-parties from tampering with the data.
Without HTTPS it is possible for sombody to listen in and change the data being sent between you and a server.
Only in recent years has HTTPS become near-universal across the web. It is used even on the simplest sites these days: this one included. After 2013, people became weary of government, criminal, and ISP interference with their web traffic.
This can be backed up by statistics:
The level of encrypted web traffic around the time of the Snowden leaks was around 30 percent. It was mostly used by banks, email providers, government, and journalists.
At the turn of the 2020s however, this has risen to nearly 90 percent among U.S. users of Firefox.
Japan lags slightly behind with 80 percent encrypted traffic.
<figure>
<img src="/assets/img/encrypted-web-traffic.png" alt="Use of encrypted web traffic incresing over time.">
<figcaption>
More at: <a href="https://letsencrypt.org/stats/" target="_blank">Let's Encrypt</a>
</figcaption>
</figure>
This is just the data we know of. You can disable the [telemetry](https://en.wikipedia.org/wiki/Telemetry#Software){:target="_blank"} settings in Firefox, and it is very likely that hardcore privacy advocates would disable this data collection, so perhaps the amount of encrypted web traffic is slightly higher.
### What about RSA?
RSA is an encryption method named after the initials of the inventors' sir names: Ron **R**ivest, Adi **S**hamir, and Leonard **A**dleman. It uses the mathematical "factoring problem" to secure communication. The details of this specific type of encryption will be discussed in part 2 of this series on RSA.

@ -2,7 +2,7 @@
<html lang="en">
<head>
<meta charset="UTF-8">
<title>(draft) RSA Part 1: Why?</title>
<title>RSA Part 1: Why?</title>
<link rel="stylesheet" href="/assets/css/style.css">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
</head>
@ -18,31 +18,31 @@
</nav>
<h1>(draft) RSA Part 1: Why?</h1>
<h4 class="post-date line-under"></h4>
<h1>RSA Part 1: Why?</h1>
<h4 class="post-date line-under">Sunday, January 26 2020</h4>
<div class="article">
<p>What is the most unexcusable thing you have typed into Google search? What is the most personal secret you told a friend in confidence? What is your bank password? What is your businesss secret to stay ahead of the competition?</p>
<p>What is the most embarassing thing you have typed into Google search? What is the most personal secret you told a friend in confidence? What is your bank password? What is your businesss secret to stay ahead of the competition?</p>
<p>Now at first these questions may seem not completely related. There is a point though: You likely sent all of this information over the internet.</p>
<p>When you sent a text to your best friend telling them that secret or send your business partner an email, why is it that anyone cant just listen the signals coming form your phone or laptop and know what you sent to your friend or colleague? The answer: encryption.</p>
<p>When you send that messege to your friend or business partner, why is it that any person cant just listen to the signals coming from your phone or laptop and know what you sent to your friend or colleague? The answer: encryption.</p>
<p>First, some background about internet privacy. You cant have a conversation about internet encryption and privacy without discussing the man himself:</p>
<h3 id="snowden">Snowden</h3>
<p><a href="https://en.wikipedia.org/wiki/Edward_Snowden">Edward Joseph Snowden</a> is an ex-NSA, ex-CIA employee who felt the United States <a href="https://en.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitution">4th Ammendment</a> was being violated by their programs of msas survailence.
Snowden was raised a staunch establishmentarian conservative; his girlfriend Lisndey however, slowly started changing his mind. Snowden became very influenced by the ideology of <a href="https://en.wikipedia.org/wiki/Populism">populism</a>.
His populist thinking is shown very clearly when he explains his reasoning for his disclosure of humungous troves of NSA documents.</p>
<p><a href="https://en.wikipedia.org/wiki/Edward_Snowden" target="_blank">Edward Joseph Snowden</a> is an ex-NSA, ex-CIA employee who felt the <a href="https://en.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitution" target="_blank">United States 4th Ammendment</a> was being violated by their programs of msas survailence.
Snowden was raised a staunch establishmentarian conservative; his girlfriend Lisndey however, slowly started changing his mind. Snowden became very influenced by the ideology of <a href="https://en.wikipedia.org/wiki/Populism" target="_blank">populism</a>.
His populist thinking is shown very clearly when he explains his reasoning for his disclosure of humongous troves of NSA documents.</p>
<blockquote>
<p>“My sole motive is to inform the public as to that which is done in their name and that which is done against them.”
<a href="https://www.theguardian.com/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-video">Edward Snowden</a></p>
<a href="https://www.theguardian.com/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-video" target="_blank">Edward Snowden</a></p>
</blockquote>
<p>Snowdens first set of leaks went public in <a href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">The Gaurdian</a>, <a href="https://www.nytimes.com/2013/06/10/us/former-cia-worker-says-he-leaked-surveillance-data.html">The New York Times</a>, and <a href="https://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption">ProPublica</a> in late 2013;
people started to realize that their governments and ISPs <strong>are</strong> listening. People understood there might be more sinister motives than “national security” at play.</p>
<p>Snowdens first set of leaks went public in <a href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security" target="_blank">The Gaurdian</a>, <a href="https://www.nytimes.com/2013/06/10/us/former-cia-worker-says-he-leaked-surveillance-data.html" target="_blank">The New York Times</a>, and <a href="https://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption" target="_blank">ProPublica</a> in late 2013;
people started to realize that their governments and internet service providers (ISPs) <strong>are</strong> listening. People understood there might be more sinister motives than “national security” at play.</p>
<p>Personally, I have seen a lot of non-tech-savy individuals using security-conscious software when I am helping them fix a problem.
In fact, there was one time I saw a collage student from rural Alberta who had a VPN running on her phone. This impressed me!</p>
@ -54,7 +54,7 @@ This kind of encryption stops two things from happening: A) it stops the informa
<p>Without HTTPS it is possible for sombody to listen in and change the data being sent between you and a server.</p>
<p>Only in recent years has HTTPS become near-universal across the web. It is used even on the simplest sites these days: this one included. After 2013, people became weary of government, criminal, and internet service provider (ISP) interference with their web traffic.
<p>Only in recent years has HTTPS become near-universal across the web. It is used even on the simplest sites these days: this one included. After 2013, people became weary of government, criminal, and ISP interference with their web traffic.
This can be backed up by statistics:
The level of encrypted web traffic around the time of the Snowden leaks was around 30 percent. It was mostly used by banks, email providers, government, and journalists.
At the turn of the 2020s however, this has risen to nearly 90 percent among U.S. users of Firefox.
@ -63,15 +63,15 @@ Japan lags slightly behind with 80 percent encrypted traffic.</p>
<figure>
<img src="/assets/img/encrypted-web-traffic.png" alt="Use of encrypted web traffic incresing over time." />
<figcaption>
More at: <a href="https://letsencrypt.org/stats/">Let's Encrypt</a>
More at: <a href="https://letsencrypt.org/stats/" target="_blank">Let's Encrypt</a>
</figcaption>
</figure>
<p>This is just the data we know of. You can disable the telemetry settings in Firefox, and it is very likely that hardcore privacy advocates would disable this data collection, so perhaps the amount of encrypted web traffic is slightly higher.</p>
<p>This is just the data we know of. You can disable the <a href="https://en.wikipedia.org/wiki/Telemetry#Software" target="_blank">telemetry</a> settings in Firefox, and it is very likely that hardcore privacy advocates would disable this data collection, so perhaps the amount of encrypted web traffic is slightly higher.</p>
<h3 id="what-about-rsa">What about RSA?</h3>
<p>RSA is an encryption method named after the initials of the inventors sir names: Ron Rivest, Adi Shamir, and Leonard Adleman. It uses the mathematical “factoring problem” to secure communication. The details of this specific type of encryption will be discussed in part 2 of this series on RSA.</p>
<p>RSA is an encryption method named after the initials of the inventors sir names: Ron <strong>R</strong>ivest, Adi <strong>S</strong>hamir, and Leonard <strong>A</strong>dleman. It uses the mathematical “factoring problem” to secure communication. The details of this specific type of encryption will be discussed in part 2 of this series on RSA.</p>
</div>

@ -0,0 +1,79 @@
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<title>RSA Part 1: Why?</title>
<link rel="stylesheet" href="/assets/css/style.css">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
</head>
<body>
<div id="wrapper">
<nav>
<a href="/" >Home</a>
<a href="/blog.html" >Blog</a>
<a href="https://github.com/TTWNO/" target="_blank" rel="noopener noreferrer" >Code</a>
</nav>
<h1>RSA Part 1: Why?</h1>
<h4 class="post-date line-under"></h4>
<div class="article">
What is the most embarassing thing you have typed into Google search? What is the most personal secret you told a friend in confidence? What is your bank password? What is your business's secret to stay ahead of the competition?
Now at first these questions may seem not completely related. There is a point though: You likely sent all of this information over the internet.
When you send that messege to your friend or business partner, why is it that any person can't just listen to the signals coming from your phone or laptop and know what you sent to your friend or colleague? The answer: encryption.
First, some background about internet privacy. You can't have a conversation about internet encryption and privacy without discussing the man himself:
### Snowden
[Edward Joseph Snowden](https://en.wikipedia.org/wiki/Edward_Snowden){:target="_blank"} is an ex-NSA, ex-CIA employee who felt the United State's [4th Ammendment](https://en.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitution){:target="_blank"} was being violated by their programs of msas survailence.
Snowden was raised a staunch establishmentarian conservative; his girlfriend Lisndey however, slowly started changing his mind. Snowden became very influenced by the ideology of [populism](https://en.wikipedia.org/wiki/Populism){:target="_blank"}.
His populist thinking is shown very clearly when he explains his reasoning for his disclosure of humongous troves of NSA documents.
> "My sole motive is to inform the public as to that which is done in their name and that which is done against them."
> ---[Edward Snowden](https://www.theguardian.com/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-video){:target="_blank"}
Snowden's first set of leaks went public in [The Gaurdian](https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security){:target="_blank"}, [The New York Times](https://www.nytimes.com/2013/06/10/us/former-cia-worker-says-he-leaked-surveillance-data.html){:target="_blank"}, and [ProPublica](https://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption){:target="_blank"} in late 2013;
people started to realize that their governments and internet service providers (ISPs) **are** listening. People understood there might be more sinister motives than "national security" at play.
Personally, I have seen a lot of non-tech-savy individuals using security-conscious software when I am helping them fix a problem.
In fact, there was one time I saw a collage student from rural Alberta who had a VPN running on her phone. This impressed me!
### Encryption on The Web
The type of encryption used on the web is called: HyperText Transfer Protocol--Secure (HTTPS).
This kind of encryption stops two things from happening: A) it stops the information you are sending and recieving online from being seen by easvesdroppers and criminals, and B) stops those same third-parties from tampering with the data.
Without HTTPS it is possible for sombody to listen in and change the data being sent between you and a server.
Only in recent years has HTTPS become near-universal across the web. It is used even on the simplest sites these days: this one included. After 2013, people became weary of government, criminal, and ISP interference with their web traffic.
This can be backed up by statistics:
The level of encrypted web traffic around the time of the Snowden leaks was around 30 percent. It was mostly used by banks, email providers, government, and journalists.
At the turn of the 2020s however, this has risen to nearly 90 percent among U.S. users of Firefox.
Japan lags slightly behind with 80 percent encrypted traffic.
<figure>
<img src="/assets/img/encrypted-web-traffic.png" alt="Use of encrypted web traffic incresing over time.">
<figcaption>
More at: <a href="https://letsencrypt.org/stats/" target="_blank">Let's Encrypt</a>
</figcaption>
</figure>
This is just the data we know of. You can disable the [telemetry](https://en.wikipedia.org/wiki/Telemetry#Software){:target="_blank"} settings in Firefox, and it is very likely that hardcore privacy advocates would disable this data collection, so perhaps the amount of encrypted web traffic is slightly higher.
### What about RSA?
RSA is an encryption method named after the initials of the inventors' sir names: Ron Rivest, Adi Shamir, and Leonard Adleman. It uses the mathematical "factoring problem" to secure communication. The details of this specific type of encryption will be discussed in part 2 of this series on RSA.
</div>
</div>
</body>
</html>

@ -20,6 +20,15 @@
<table class="post-list">
<tr>
<td>
<h2><a href="/2020/01/26/rsa1.html">RSA Part 1: Why?</a></h2>
<span class="post-date">26 January 2020</span>
<div class="post-excerpt"><p>What is the most embarassing thing you have typed into Google search? What is the most personal secret you told a friend in confidence? What is your bank password? What is your businesss secret to stay ahead of the competition?</p>
</div>
</td>
</tr>
<tr>
<td>
<h2><a href="/2020/01/22/padding-and-margin.html">Padding And Margin</a></h2>

@ -1,4 +1,53 @@
<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.0.0">Jekyll</generator><link href="http://localhost:4000/feed.xml" rel="self" type="application/atom+xml" /><link href="http://localhost:4000/" rel="alternate" type="text/html" /><updated>2020-01-26T21:01:58+00:00</updated><id>http://localhost:4000/feed.xml</id><entry><title type="html">Padding And Margin</title><link href="http://localhost:4000/2020/01/22/padding-and-margin.html" rel="alternate" type="text/html" title="Padding And Margin" /><published>2020-01-22T00:00:00+00:00</published><updated>2020-01-22T00:00:00+00:00</updated><id>http://localhost:4000/2020/01/22/padding-and-margin</id><content type="html" xml:base="http://localhost:4000/2020/01/22/padding-and-margin.html">&lt;p&gt;Many people have expressed confusion over how padding and margins work in HTML/CSS. I have been one of those people. In this short article I will explain what the differences are between the two, and how it may affect the functionality of your site.&lt;/p&gt;
<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.0.0">Jekyll</generator><link href="http://localhost:4000/feed.xml" rel="self" type="application/atom+xml" /><link href="http://localhost:4000/" rel="alternate" type="text/html" /><updated>2020-01-27T03:05:22+00:00</updated><id>http://localhost:4000/feed.xml</id><entry><title type="html">RSA Part 1: Why?</title><link href="http://localhost:4000/2020/01/26/rsa1.html" rel="alternate" type="text/html" title="RSA Part 1: Why?" /><published>2020-01-26T00:00:00+00:00</published><updated>2020-01-26T00:00:00+00:00</updated><id>http://localhost:4000/2020/01/26/rsa1</id><content type="html" xml:base="http://localhost:4000/2020/01/26/rsa1.html">&lt;p&gt;What is the most embarassing thing you have typed into Google search? What is the most personal secret you told a friend in confidence? What is your bank password? What is your businesss secret to stay ahead of the competition?&lt;/p&gt;
&lt;p&gt;Now at first these questions may seem not completely related. There is a point though: You likely sent all of this information over the internet.&lt;/p&gt;
&lt;p&gt;When you send that messege to your friend or business partner, why is it that any person cant just listen to the signals coming from your phone or laptop and know what you sent to your friend or colleague? The answer: encryption.&lt;/p&gt;
&lt;p&gt;First, some background about internet privacy. You cant have a conversation about internet encryption and privacy without discussing the man himself:&lt;/p&gt;
&lt;h3 id=&quot;snowden&quot;&gt;Snowden&lt;/h3&gt;
&lt;p&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Edward_Snowden&quot; target=&quot;_blank&quot;&gt;Edward Joseph Snowden&lt;/a&gt; is an ex-NSA, ex-CIA employee who felt the &lt;a href=&quot;https://en.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitution&quot; target=&quot;_blank&quot;&gt;United States 4th Ammendment&lt;/a&gt; was being violated by their programs of msas survailence.
Snowden was raised a staunch establishmentarian conservative; his girlfriend Lisndey however, slowly started changing his mind. Snowden became very influenced by the ideology of &lt;a href=&quot;https://en.wikipedia.org/wiki/Populism&quot; target=&quot;_blank&quot;&gt;populism&lt;/a&gt;.
His populist thinking is shown very clearly when he explains his reasoning for his disclosure of humongous troves of NSA documents.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“My sole motive is to inform the public as to that which is done in their name and that which is done against them.”
&lt;a href=&quot;https://www.theguardian.com/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-video&quot; target=&quot;_blank&quot;&gt;Edward Snowden&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Snowdens first set of leaks went public in &lt;a href=&quot;https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security&quot; target=&quot;_blank&quot;&gt;The Gaurdian&lt;/a&gt;, &lt;a href=&quot;https://www.nytimes.com/2013/06/10/us/former-cia-worker-says-he-leaked-surveillance-data.html&quot; target=&quot;_blank&quot;&gt;The New York Times&lt;/a&gt;, and &lt;a href=&quot;https://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption&quot; target=&quot;_blank&quot;&gt;ProPublica&lt;/a&gt; in late 2013;
people started to realize that their governments and internet service providers (ISPs) &lt;strong&gt;are&lt;/strong&gt; listening. People understood there might be more sinister motives than “national security” at play.&lt;/p&gt;
&lt;p&gt;Personally, I have seen a lot of non-tech-savy individuals using security-conscious software when I am helping them fix a problem.
In fact, there was one time I saw a collage student from rural Alberta who had a VPN running on her phone. This impressed me!&lt;/p&gt;
&lt;h3 id=&quot;encryption-on-the-web&quot;&gt;Encryption on The Web&lt;/h3&gt;
&lt;p&gt;The type of encryption used on the web is called: HyperText Transfer ProtocolSecure (HTTPS).
This kind of encryption stops two things from happening: A) it stops the information you are sending and recieving online from being seen by easvesdroppers and criminals, and B) stops those same third-parties from tampering with the data.&lt;/p&gt;
&lt;p&gt;Without HTTPS it is possible for sombody to listen in and change the data being sent between you and a server.&lt;/p&gt;
&lt;p&gt;Only in recent years has HTTPS become near-universal across the web. It is used even on the simplest sites these days: this one included. After 2013, people became weary of government, criminal, and ISP interference with their web traffic.
This can be backed up by statistics:
The level of encrypted web traffic around the time of the Snowden leaks was around 30 percent. It was mostly used by banks, email providers, government, and journalists.
At the turn of the 2020s however, this has risen to nearly 90 percent among U.S. users of Firefox.
Japan lags slightly behind with 80 percent encrypted traffic.&lt;/p&gt;
&lt;figure&gt;
&lt;img src=&quot;/assets/img/encrypted-web-traffic.png&quot; alt=&quot;Use of encrypted web traffic incresing over time.&quot; /&gt;
&lt;figcaption&gt;
More at: &lt;a href=&quot;https://letsencrypt.org/stats/&quot; target=&quot;_blank&quot;&gt;Let's Encrypt&lt;/a&gt;
&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;p&gt;This is just the data we know of. You can disable the &lt;a href=&quot;https://en.wikipedia.org/wiki/Telemetry#Software&quot; target=&quot;_blank&quot;&gt;telemetry&lt;/a&gt; settings in Firefox, and it is very likely that hardcore privacy advocates would disable this data collection, so perhaps the amount of encrypted web traffic is slightly higher.&lt;/p&gt;
&lt;h3 id=&quot;what-about-rsa&quot;&gt;What about RSA?&lt;/h3&gt;
&lt;p&gt;RSA is an encryption method named after the initials of the inventors sir names: Ron &lt;strong&gt;R&lt;/strong&gt;ivest, Adi &lt;strong&gt;S&lt;/strong&gt;hamir, and Leonard &lt;strong&gt;A&lt;/strong&gt;dleman. It uses the mathematical “factoring problem” to secure communication. The details of this specific type of encryption will be discussed in part 2 of this series on RSA.&lt;/p&gt;</content><author><name>tait</name></author><summary type="html">What is the most embarassing thing you have typed into Google search? What is the most personal secret you told a friend in confidence? What is your bank password? What is your businesss secret to stay ahead of the competition?</summary></entry><entry><title type="html">Padding And Margin</title><link href="http://localhost:4000/2020/01/22/padding-and-margin.html" rel="alternate" type="text/html" title="Padding And Margin" /><published>2020-01-22T00:00:00+00:00</published><updated>2020-01-22T00:00:00+00:00</updated><id>http://localhost:4000/2020/01/22/padding-and-margin</id><content type="html" xml:base="http://localhost:4000/2020/01/22/padding-and-margin.html">&lt;p&gt;Many people have expressed confusion over how padding and margins work in HTML/CSS. I have been one of those people. In this short article I will explain what the differences are between the two, and how it may affect the functionality of your site.&lt;/p&gt;
&lt;p&gt;Here is an image from the World Wide Web Consortium (W3C) who sets the standards for the web.&lt;/p&gt;

@ -5,13 +5,14 @@
<lastmod>2020-01-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://localhost:4000/2020-01-10-rsa1.html</loc>
<loc>http://localhost:4000/2020/01/26/rsa1.html</loc>
<lastmod>2020-01-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>http://localhost:4000/2020-01-23-sql-joins.html</loc>
<loc>http://localhost:4000/2020-01-10-rsa1.html</loc>
</url>
<url>
<loc>http://localhost:4000/2020-01-26-rsa1.html</loc>
<loc>http://localhost:4000/2020-01-23-sql-joins.html</loc>
</url>
<url>
<loc>http://localhost:4000/blog.html</loc>

Loading…
Cancel
Save