The Guilfordian

China tests controversial facial recognition surveillance software

Shami Chideya, Staff Writer

February 2, 2018

Governments currently use a variety of techniques, both known and unknown, to maintain the security of their citizens. For the past year, the Xinjiang Uyghur Autonomous Region of China has tested facial recognition services to keep track of potential threats within its borders. While this concept...

House bill causes controversy: privacy vs. security

Meghana Iragavarapu, Staff Writer

February 26, 2016

AES, DES, 3DES, RC2, RC6 and Blowfish. These combinations of random numbers and letters are six of the most common encryption algorithms. Everything from the data on SIM cards to your Guilford email is protected by encryption through the conversion of personal electronic data into ciphertext. “Think...

Anonymity online can be a tool or a weapon ­— use it to build, not injure, community

Editorial Board

November 13, 2015

When divulging personal ideas and opinions, some people don’t feel comfortable without a veil of anonymity. That’s why the Internet, offering users an impersonal and seemingly low-risk way to socialize, can provide a more comfortable space for sharing. From social media platforms like Twitter...

Apple’s shaky security results in unreliable online storage services

Aubrey King, Staff Writer

October 31, 2014

In a massive structure in Maiden, North Carolina, surrounded by a farm of solar panels, hundreds of servers help one of the world’s largest tech companies store millions of bytes of private information. Online data-backup services may seem shiny, convenient and helpful, but the very permanent nature...