Peter Wayner

Last updated

Peter Wayner is an American writer known for his books on technology and his writing in mainstream publications including The New York Times , InfoWorld, [1] and Wired magazine. His work on mimic functions, a camouflaging technique for encoding data so it takes on the statistical characteristics of other information, is an example of steganography, [2] and was the basis of his 2009 book, Disappearing Cryptography. [3]

In 2018, he received attention for writing an article about the New York City transit system, advocating for replacing large subway trains with competing fleets of smaller, thinner and more nimble autonomous cars, scooters, hoverboards and pods. [4] [5] The article received widespread criticism. [6] [7] [8] [9]

Bibliography (selected)

Related Research Articles

Steganography is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, message, image, or video is concealed within another file, message, image, or video. The word steganography comes from Greek steganographia, which combines the words steganós, meaning "covered or concealed", and -graphia meaning "writing".

<span class="mw-page-title-main">Program counter</span> Processor register that indicates where a computer is in its program sequence

The program counter (PC), commonly called the instruction pointer (IP) in Intel x86 and Itanium microprocessors, and sometimes called the instruction address register (IAR), the instruction counter, or just part of the instruction sequencer, is a processor register that indicates where a computer is in its program sequence.

Obfuscation is the obscuring of the intended meaning of communication by making the message difficult to understand, usually with confusing and ambiguous language. The obfuscation might be either unintentional or intentional, and is accomplished with circumlocution, the use of jargon, and the use of an argot of limited communicative value to outsiders.

A canary trap is a method for exposing an information leak by giving different versions of a sensitive document to each of several suspects and seeing which version gets leaked. It could be one false statement, to see whether sensitive information gets out to other people as well. Special attention is paid to the quality of the prose of the unique language, in the hopes that the suspect will repeat it verbatim in the leak, thereby identifying the version of the document.

<i>Empire Service</i> Amtrak service between New York City, NY and Niagara Falls, NY

The Empire Service is an Inter-city rail service operated by Amtrak within the state of New York in the United States. The brand name originated with the New York Central Railroad in 1967. Trains on the line provide frequent daily service along the 460-mile (740 km) Empire Corridor between New York City and Niagara Falls via Albany, the state capital.

The Cardan grille is a method of writing secret messages using a grid.

Information leakage happens whenever a system that is designed to be closed to an eavesdropper reveals some information to unauthorized parties nonetheless. In other words: Information leakage occurs when secret information correlates with, or can be correlated with, observable information. For example, when designing an encrypted instant messaging network, a network engineer without the capacity to crack encryption codes could see when messages are transmitted, even if he could not read them.

<i>20th Century Limited</i> American named passenger train (1902–1967)

The 20th Century Limited was an express passenger train on the New York Central Railroad (NYC) from 1902 to 1967. The train traveled between Grand Central Terminal in New York City and LaSalle Street Station in Chicago, Illinois, along the railroad's "Water Level Route".

In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message is deniable in the sense that an adversary cannot prove that the plaintext data exists.

A digital watermark is a kind of marker covertly embedded in a noise-tolerant signal such as audio, video or image data. It is typically used to identify ownership of the copyright of such signal. "Watermarking" is the process of hiding digital information in a carrier signal; the hidden information should, but does not need to, contain a relation to the carrier signal. Digital watermarks may be used to verify the authenticity or integrity of the carrier signal or to show the identity of its owners. It is prominently used for tracing copyright infringements and for banknote authentication.

<span class="mw-page-title-main">M (New York City Subway service)</span> New York City Subway service

The M Queens Boulevard/Sixth Avenue Local is a rapid transit service in the B Division of the New York City Subway. Its route emblem, or "bullet", is colored orange since it uses the IND Sixth Avenue Line in Manhattan.

<span class="mw-page-title-main">Tradecraft</span> Espionage techniques

Tradecraft, within the intelligence community, refers to the techniques, methods and technologies used in modern espionage (spying) and generally, as part of the activity of intelligence assessment. This includes general topics or techniques, or the specific techniques of a nation or organization.

A mimic function changes a file so it assumes the statistical properties of another file . That is, if is the probability of some substring occurring in , then a mimic function , recodes so that approximates for all strings of length less than some . It is commonly considered to be one of the basic techniques for hiding information, often called steganography.

<span class="mw-page-title-main">Cryptography</span> Practice and study of secure communication techniques

Cryptography, or cryptology, is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security are also central to cryptography. Practical applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.

Ingemar J. Cox is Professor and Director of Research in the Department of Computer Science at University College London, where he is Head of the Future Media Group, and he is Professor in the Machine Learning department at the University of Copenhagen. Between 2003 and 2008, he was Director of UCL's Adastral Park Campus.

<span class="mw-page-title-main">Ian H. Witten</span> English computer scientist in New Zealand (born 1947)

Ian Hugh Witten was a computer scientist at the University of Waikato, New Zealand. He was a Chartered Engineer with the Institute of Electrical Engineers.

<span class="mw-page-title-main">Technology of the New York City Subway</span>

Since the late 20th century, the Metropolitan Transportation Authority has started several projects to maintain and improve the New York City Subway. Some of these projects, such as subway line automation, proposed platform screen doors, the FASTRACK maintenance program, and infrastructural improvements proposed in 2015–2019 Capital Program, contribute toward improving the system's efficiency. Others, such as train-arrival "countdown clocks", "Help Point" station intercoms, "On the Go! Travel Station" passenger kiosks, wireless and cellular network connections in stations, MetroCard fare payment alternatives, and digital ads, are meant to benefit individual passengers. Yet others, including the various methods of subway construction, do not directly impact the passenger interface, but are used to make subway operations efficient.

This is a list of cybersecurity information technology. Cybersecurity is security as it is applied to information technology. This includes all technology that stores, manipulates, or moves data, such as computers, data networks, and all devices connected to or included in networks, such as routers and switches. All information technology devices and facilities need to be secured against intrusion, unauthorized use, and vandalism. Additionally, the users of information technology should be protected from theft of assets, extortion, identity theft, loss of privacy and confidentiality of personal information, malicious mischief, damage to equipment, business process compromise, and the general activity of cybercriminals. The public should be protected against acts of cyberterrorism, such as the compromise or loss of the electric power grid.

A copy detection pattern (CDP) or graphical code is a small random or pseudo-random digital image which is printed on documents, labels or products for counterfeit detection. Authentication is made by scanning the printed CDP using an image scanner or mobile phone camera. It is possible to store additional product-specific data into the CDP that will be decoded during the scanning process. A CDP can also be inserted into a 2D barcode to facilitate smartphone authentication and to connect with traceability data.

References