Close Menu
    Facebook X (Twitter) Instagram
    Recent Posts
    • Attending Computers and Writing 2025? Be a Session Reviewer! 
    • Charisse Iglesias: Community Engagement Beyond Academia
    • Addison Kliewer – Bridging Academia and Industry with Technical Writing Mastery
    • Philosophy of Technology in Rhetoric and Writing Studies
    • Call for Blog Carnival 23: Digital Circulation in Rhetoric and Writing Studies
    • Introduction to Robert Beck
    • Introduction to Alex Mashny
    • Introduction to Marie Pruitt
    RSS Facebook X (Twitter) Instagram
    Digital Rhetoric Collaborative
    • Home
    • Conversations
      • Blog Carnivals
      • DRC Talk Series
      • Hack & Yack
      • DRC Wiki
    • Reviews
      • CCCC Reviews
        • 2023 CCCC Reviews
        • 2022 CCCC Reviews
        • 2021 CCCC Reviews
        • 2019 CCCC Reviews
      • C&W Reviews
        • 2022 C&W Reviews
        • 2019 C&W Reviews
        • 2018 C&W Reviews
        • 2017 C&W Reviews
        • 2016 C&W Reviews
        • 2015 C&W Reviews
        • 2014 C&W Reviews
        • 2013 C&W Reviews
        • 2012 C&W Reviews
      • MLA Reviews
        • 2019 MLA Reviews
        • 2014 MLA Reviews
        • 2013 MLA Reviews
      • Other Reviews
        • 2018 Watson Reviews
        • 2017 Feminisms & Rhetorics
        • 2017 GPACW
        • 2016 Watson Reviews
        • 2015 IDRS Reviews
      • Webtext of the Month
    • Teaching Materials
      • Syllabus Repository
      • Teaching & Learning Materials (TLM) Collection
    • Books
      • Memetic Rhetorics
      • Beyond the Makerspace
      • Video Scholarship and Screen Composing
      • 100 Years of New Media Pedagogy
      • Writing Workflows
      • Rhetorical Code Studies
      • Developing Writers in Higher Education
      • Sites of Translation
      • Rhizcomics
      • Making Space
      • Digital Samaritans
      • DRC Book Prize
      • Submit a Book Proposal
    • DRC Fellow Projects
    • About
      • Advisory Board
      • Graduate Fellows
    Digital Rhetoric Collaborative

    C&W Session I2: Preserving Spaces of Wonder in an Age of Surveillance: Getting Started with Digital Cryptography

    0
    By Elizabeth Fleitz on June 26, 2017 2017 C&W Reviews

    Computer with lock graphicSession #i2, “Preserving Spaces of Wonder in an Age of Surveillance: Getting Started with Digital Cryptography,” was a mini-workshop held on Sunday morning. Virginia Tech PhD Candidate Andrew Kulak led the workshop, explaining about the necessity of security and privacy in the digital age, and led participants through the process of encrypting and decrypting documents. Citing the rise in recent hacking events, Kulak mentioned several tips for keeping one’s digital information safe. Student grades, banking information, and academic research are all legitimate information that is usually stored digitally, and may come under threat from hacking. Cybersecurity, Kulak argues, is a techne that can help to preserve spaces of wonder in a world that seems to have a growing disregard for privacy.

    Certainly, concerns about digital surveillance are much more than just tinfoil hat theories. Hacking events are reported regularly, and we’ve all known someone–or have been ourselves–affected by a data breach of some sort. According to the Pew Research Center (2017), 64% of Americans have been personally impacted by a data breach. Furthermore, public trust in the safety of their online information is at an all-time low: 49% of Americans surveyed are distrustful of the government’s and social media sites’ capability of keeping their data safe. Digital cryptography, therefore, can be a tool for one to take control of their own security.

    Cat with tinfoil hat
    Digital surveillance is a serious threat, not a tinfoil hat theory.

    The majority of the workshop led participants through downloading software and using it to encrypt a document. Kulak showed participants how to use GPG (Gnu Privacy Guard), an open-source PGP encryption software. PGP, a public key cryptography standard, is considered to be a safe form of encryption at this point, as it has not been (publicly) cracked. Public key cryptography is a process of encoding and decoding messages with a series of keys (passwords). Public key cryptography was explained by Kulak using a metaphor of a locked mailbox, in which a sender can deposit a message into the mailbox (through use of a publicly available key), and that message can only be accessed/unlocked by the recipient, who not only has the public key but also a private key. This type of standard helps to maintain the integrity of the message, as any attempt to change the message in transit would corrupt the file.

    Workshop participants (using Macs or Linux) used command-line methods to download and run the GPG software. First, Homebrew was downloaded, a package manager that is used to download and install GnuPG from the command line. Then, GnuPG was installed. Kulak led participants through creating a public and a private key, and generating a revocation certificate (for deactivation of a compromised key pair). Then, participants encrypted a text file and emailed it to Kulak, who then demonstrated on his computer how to decrypt it.

    PowerPoint slide
    Fair warning, from Kulak’s PowerPoint presentation.

    Other recommendations made by Kulak beyond message encryption included:

    • Updating home router’s credentials: changing router’s IP and default DNS
    • Using WPA2 Personal + AES for your home WiFi network security
    • Change your WiFi password to a strong 16+ character password
    • Enable the guest WiFi account for visitor access
    • Encrypt work files when using cloud storage
    • Use two-factor authentication with a physical token for email
    • Leave WiFi and Bluetooth off when traveling with devices when not in use
    • Consider using a travel laptop with only the files you need if possible
    • Activate strongest firewall settings when on public WiFi
    Bibliography
    [Computer with lock graphic]. Retrieved from http://www.doncio.navy.mil/uploads/1002ZUL23524.jpg

    Kulak, A. (2017). Cybersecurity 101 [PowerPoint slides].

    Pew Research Center. (2017, January 26). Americans and cybersecurity. Retrieved from http://www.pewinternet.org/2017/01/26/americans-and-cybersecurity/

    [Tinfoil hat cat photo]. Retrieved from https://c1.staticflickr.com/3/2363/1505091017_e3fc22ffb8.jpg

    Author

    • Elizabeth Fleitz
      Elizabeth Fleitz

      Elizabeth Fleitz is an Associate Professor of English at Lindenwood University.

      View all posts
    Leave A Reply Cancel Reply

    Recent Posts
    By Alyse CampbellMay 6, 20250

    Attending Computers and Writing 2025? Be a Session Reviewer! 

    By Thais Rodrigues Cons, Toluwani OdedeyiApril 25, 20250

    Charisse Iglesias: Community Engagement Beyond Academia

    By Toluwani Odedeyi, Thais Rodrigues ConsMarch 31, 20250

    Addison Kliewer – Bridging Academia and Industry with Technical Writing Mastery

    By Mehdi MohammadiFebruary 11, 20250

    Philosophy of Technology in Rhetoric and Writing Studies

    By Marie Pruitt, Robert Beck, Alex MashnyFebruary 4, 20250

    Call for Blog Carnival 23: Digital Circulation in Rhetoric and Writing Studies

    Digital Rhetoric Collaborative | Gayle Morris Sweetland Center for Writing | University of Michigan

    Type above and press Enter to search. Press Esc to cancel.