One-Time Pod explores the history of cryptography through episodes produced by students in Derek Bruff's first-year writing seminar at Vanderbilt University.

Episode List

Episode 48 - The Right to Be Forgotten

Aug 12th, 2021 12:00 PM

by Angela Brinckerhoff In today’s world, it’s not very hard to find information about anyone, no matter how personal. Our posts, public records, employment history, etc. can all be uncovered within a few clicks. A University of Washington team of researchers created a project called Vanish to address this, making it possible to permanently erase personal data. This project brings up the central debate of the “right to be forgotten” movement, discussing the legality and prospect of deleting data from public databases and web searches. This podcast discusses the system behind Vanish and the different sides of the “right to be forgotten” debate. Special thanks to Amelia Muir, Henoc Zinga, and Justin Terry for their contributions. References Auxier, B. (2020, August 17). Most Americans support right to have some personal info removed from online searches. Pew Research Center. Retrieved from https://www.pewresearch.org/fact-tank/2020/01/27/most-americans-support-right-to-have-some-personal-info-removed-from-online-searches/ DeWeerdt, S. (2021, April 15). A Welcome Disappearing Act. Retrieved from https://www.washington.edu/alumni/columns/dec09/findings-forget.html Geambasu, Roxana et. al. (2021, April 15). Enhancing the Privacy of the Web with Self-Destructing Data. Retrieved from https://vanish.cs.washington.edu/ Heilweil, R. (2018, March 05). How Close Is An American Right-To-Be-Forgotten? Forbes. Retrieved from https://www.forbes.com/sites/rebeccaheilweil1/2018/03/04/how-close-is-an-american-right-to-be-forgotten/ Markoff, J. (2009, July 20). New Technology to Make Digital Data Self-Destruct. Retrieved from https://www.nytimes.com/2009/07/21/science/21crypto.html Audio Sources: https://orangefreesounds.com/swing-drum-beat-loop-with-piano-melody-132-bpm/ https://orangefreesounds.com/funk-guitar-intro/ https://orangefreesounds.com/electronic-background-music/ https://orangefreesounds.com/ocean-waves-crashing-on-beach/ https://orangefreesounds.com/mysterious-piano/ https://orangefreesounds.com/downtempo-chill-out-track/ Image: “Footprints in the sand,” Susanne Nilsson, Flickr CC BY-SA

Episode 47 - PRISM

Aug 11th, 2021 12:00 PM

by Rishabh Gharekhan This podcast explains the story of Edward Snowden and the PRISM program. In 2013, Snowden leaked classified government secrets exposing the National Security Agency’s widespread mass surveillance programs. PRISM was one of these. Using discreet legal pathways, the NSA was tapping directly into the servers of American companies including Apple, Google, Microsoft. Snowden’s revelations shocked the American public due to the violations of privacy. The exposure of this program led to quick damage control. However, the damage had already been done which has continued to raise questions over how safe our data is online. Works Cited: Fitzpatrick, A. (2013, June 7). NSA Leak: Internet Giants Let Government Tap Your Data. Mashable. https://mashable.com/2013/06/06/prism-tech-companies-data-mining/?europe=true Greenwald, G., & MacAskill, E. (2017, December 29). NSA Prism program taps in to user data of Apple, Google and others. The Guardian. https://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data Greenwald, G., MacAskill, E., & Poitras, L. (2021, March 24). Edward Snowden: the whistleblower behind the NSA surveillance revelations. The Guardian. https://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance Lee, T. (2013, June 6). How Congress unknowingly legalized PRISM in 2007. The Washington Post. https://www.washingtonpost.com/news/wonk/wp/2013/06/06/how-congress-unknowingly-legalized-prism-in-2007/ Seifert, D. (2013, June 7). Secret program gives NSA, FBI backdoor access to Apple, Google, Facebook, Microsoft data. The Verge. https://www.theverge.com/2013/6/6/4403868/nsa-fbi-mine-data-apple-google-facebook-microsoft-others-prism Snowden Timeline. (2019, January 9). Government Accountability Project. https://whistleblower.org/snowden-timeline/ West, A. (2013, July 9). 17 disturbing things Snowden has taught us (so far). The World from PRX. https://www.pri.org/stories/2013-07-09/17-disturbing-things-snowden-has-taught-us-so-far Whittaker, Z. (2013, June 8). PRISM: Here’s how the NSA wiretapped the Internet. ZDNet. https://www.zdnet.com/article/prism-heres-how-the-nsa-wiretapped-the-internet/ Audio: Orange Free Sounds: Chillout Downtempo Music Loop Mysterious Synth Pad Tremolo Electric Guitar Music Loop Symbiosis Ambient Lounge Bensound: Enigmatic Fesliyan Studios: Land of Fantasy Obama Clip: https://www.youtube.com/watch?v=rENTl5JKzlQ&ab_channel=ABCNews News Clip (June 6, 2013 – 100 Seconds of News): https://www.youtube.com/watch?v=Oi5xHW2Ak9s&t=36s&ab_channel=TPMTV Further Reading: https://www.wired.com/2014/08/edward-snowden/ https://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance https://www.washingtonpost.com/world/national-security/edward-snowden-after-months-of-nsa-revelations-says-his-missions-accomplished/2013/12/23/49fc36de-6c1c-11e3-a523-fe73f0ff6b8d_story.html Image: “Edward Snowden,” Mike Mozart, Flickr CC BY

Episode 46 - USA PATRIOT Act

Aug 10th, 2021 12:00 PM

by Thomas Riker The attacks on September 11th, 2001 deeply affected America and its citizens. In its aftermath came the USA PATRIOT act, a far-reaching piece of legislation that was passed both in the Senate and the House of Representatives by an overwhelming majority. The act contained many provisions that expanded the scope of the government and its agencies in the hopes of catching terrorists, so as to prevent the next 9/11 from ever occurring. This podcast discusses the Patriot Act generally and its effects, mostly on regular American citizens, and raises questions about the debate between personal privacy and national security. Bibliography Ahmed, A., & Senzai, F. (2017, August 5). The USA Patriot Act: Impact on the Arab and Muslim American Community. Institute for Social Policy and Understanding. Duignan, B. (2020). Reauthorizations. Encyclopædia Britannica. https://www.britannica.com/topic/USA-PATRIOT-Act/Reauthorizations#ref302044 Jenks, R. (2001, December). The USA PATRIOT Act of 2001. Center for Immigration Studies. https://cis.org/Report/USA-PATRIOT-Act-2001 Staff, A.C.L.U. (2011). Surveillance Under the Patriot Act. American Civil Liberties Union. https://www.aclu.org/issues/national-security/privacy-and-surveillance/surveillance-under-patriot-act. Staff, A.C.L.U. (2015, May 12). End Mass Surveillance Under the Patriot Act. American Civil Liberties Union. https://www.aclu.org/issues/national-security/privacy-and-surveillance/end-mass-surveillance-under-patriot-act. Staff, A.C.L.U. (2021). Surveillance Under the USA/PATRIOT Act. American Civil Liberties Union. https://www.aclu.org/other/surveillance-under-usapatriot-act. Welling, A. (2001, October 24). Man admits setting fire at curry eatery. https://www.deseret.com/2001/10/24/19613237/man-admits-setting-fire-at-curry-eatery. Audio Sources: 1* A story read by Rishabh Gharekhan taken from the website: Welling, A. (2001, October 24). Man admits setting fire at curry eatery. https://www.deseret.com/2001/10/24/19613237/man-admits-setting-fire-at-curry-eatery. 2* A story told to me by my AP English Language teacher during my senior year at Canisius High School, read by my friend Mia. https://www.free-stock-music.com  “Above the Clouds” Image: “NSA Data Center,” Cory Doctorow, Flickr CC BY

Episode 45 - The Fourth Amendment

Aug 9th, 2021 12:00 PM

by Nathan Chang This podcast gives insight into the progression of the Fourth Amendment of the United States Constitution through time via two court cases, Carpenter v. United States and Smith v. Maryland. These two cases were both integral to how the advancement of technology has affected American legislation by addressing intrusive surveillance technology such as pen registers and CSLI, or cell-site location information. With new technology constantly springing up, our privacy has never been more vulnerable. Works Cited Carpenter v. United States. (n.d.). Oyez. Retrieved April 7, 2021, from https://www.oyez.org/cases/2017/16-402 Cedarbaum, J., Cahill, N., & McHale, S. (2019, June 20). Digital Data Privacy One Year After Carpenter. Retrieved April 8, 2021, from https://www.law360.com/articles/1170123/digital-data-privacy-one-year-after-carpenter Kerr, O. [@OrinKerr]. (2018, June 22). It occurs, to me, though, that a ton of work is being done in the opinion by the Court’s lack [Tweet]. Twitter. https://twitter.com/OrinKerr/status/1010181227045933056 Matsakis, L. (2018, June 22). Carpenter v. United States decision Strengthens digital privacy. Retrieved April 08, 2021, from https://www.wired.com/story/carpenter-v-united-states-supreme-court-digital-privacy/ Smith v. Maryland. (n.d.). Oyez. Retrieved April 17, 2021, from https://www.oyez.org/cases/1978/78-5374 Wessler, N. (2017, April 11). Cell phone records can show where you sleep and where you pray. Retrieved April 08, 2021, from https://www.aclu.org/blog/privacy-technology/internet-privacy/cell-phone-records-can-show-where-you-sleep-and-where-you Audio Sources Retrieved from https://www.fesliyanstudios.com/ ● Big Glass Breaking Combo Sound Effect ● AR10 7.62×51 308 Close Single Gunshot A Sound Effect ● Rifle Burst Fire D Sound Effect ● Suspenseful Dialogue ● Too Crazy ● Sentimental Dialogue ● Time Alone Image: “Analog,” Derek Bruff, Flickr, CC BY-NC

Episode 44 - P vs. NP

Aug 8th, 2021 12:00 PM

by Thomas Ditsworth While many people rely on the internet for everything from casual emails to secure banking transactions, most don’t understand the security behind it. In this podcast, we will discuss a computer science problem that is the basis behind our most current methods of encryption. In turn, we will explore where the encryption is used, the math behind why it is so secure, and how further innovation could put it all in jeopardy. References:  Baumhof, A. (2019, June 13). Andreas Baumhof. QuintessenceLabs. https://www.quintessencelabs.com/blog/breaking-rsa-encryption-update-state-art Hackerdashery. (2014, August 26). P vs. NP and the Computational Complexity Zoo [Video]. YouTube. https://www.youtube.com/watch?v=YX40hbAHx3s&t=515s Hardesty, L. (2009, October 29). Explained: P vs. NP. MIT News | Massachusetts Institute of Technology. https://news.mit.edu/2009/explainer-pnp Lake, J. (2021, March 18). What is RSA encryption and how does it work? Comparitech. https://www.comparitech.com/blog/information-security/rsa-encryption/ Pavlus, J. (2020, April 2). What Does ‘P vs. NP’ Mean for the Rest of Us? MIT Technology Review. https://www.technologyreview.com/2010/08/19/262224/what-does-p-vs-np-meanfor-the-rest-of-us The Millennium Prize Problems | Clay Mathematics Institute. (2021, April 19). Clay Mathematics Institute. https://www.claymath.org/millennium-problems/millennium-prize-problems Watson, J. (2017, March 16). Public key cryptography: What is it, how it works and how to use it in email and file encryption. Comparitech. https://www.comparitech.com/blog/vpn-privacy/what-is-public-key-cryptography/ Audio From Royalty Free Music by Bensound | Stock Music. (n.d.). BenSound. Retrieved March 31, 2021, from https://www.bensound.com/ For more information check out the following links to other resources about topics discussed in this podcast: P vs NP and the Computational Complexity Zoo Are you Ready for the Quantum Computing Revolution? Image: Screenshot from “P vs. NP and the Computational Complexity Zoo.”

Get this podcast on your phone, Free

Create Your Podcast In Minutes

  • Full-featured podcast site
  • Unlimited storage and bandwidth
  • Comprehensive podcast stats
  • Distribute to Apple Podcasts, Spotify, and more
  • Make money with your podcast
Get Started
It is Free