ADVERTISEMENT

Cryptography: How to Keep Your Secrets Safe

A versatile assortment of computational techniques can protect the privacy of your information and online activities to essentially any degree and nuance you desire
THIS IS A PREVIEW.
or subscribe to access the full article.

More In This Article

Zack has decided to try out the online dating service Chix-n-Studz.com. He signs up for an account at the Web site and fills in several screens of forms detailing his personal profile and what he is looking for in a potential partner. In no time at all, the service offers him a number of possible soul mates, among them the very exciting-sounding Wendy. He sends her his e-mail address and what he hopes is an engaging opening message. She replies directly to him, and a whirlwind e-romance begins.

Poor Zack. Soon he is also getting numerous unsolicited phone calls from political action groups and salespeople who seem to know things about him, and his health insurance company is questioning him about his extreme-adventure vacations; the unscrupulous owners of Chix-n-Studz have been selling client information. Then there is Ivan, a mischievous co-worker to whom Zack foolishly showed one of Wendy’s e-mails. Zack does not know that several subsequent recent messages supposedly from Wendy are fakes from Ivan.

THIS IS A PREVIEW.
or subscribe to access the full article.
Buy Digital Issue $7.99
Digital Issue + All Access Subscription $99.99 Subscribe
Rights & Permissions
Share this Article:

Comments

You must sign in or register as a ScientificAmerican.com member to submit a comment.

Email this Article

X