The Guilfordian

China tests controversial facial recognition surveillance software

February 2, 2018

Governments currently use a variety of techniques, both known and unknown, to maintain the security of their citizens. For the past year, the Xinjiang Uyghur Autonomous Region of China has tested facial...

House bill causes controversy: privacy vs. security

February 26, 2016

AES, DES, 3DES, RC2, RC6 and Blowfish. These combinations of random numbers and letters are six of the most common encryption algorithms. Everything from the data on SIM cards to your Guilford email...

Anonymity online can be a tool or a weapon ­— use it to build, not injure, community

November 13, 2015

When divulging personal ideas and opinions, some people don’t feel comfortable without a veil of anonymity. That’s why the Internet, offering users an impersonal and seemingly low-risk way to socialize,...

Apple’s shaky security results in unreliable online storage services

October 31, 2014

In a massive structure in Maiden, North Carolina, surrounded by a farm of solar panels, hundreds of servers help one of the world’s largest tech companies store millions of bytes of private information....

Load more stories