User:Dave Young/Thematic Project 1
Covert Networks
Random Notes
Number stations: Radio networks that broadcast codes, popular theories are that they are used for espionage purposes or for drug smuggling.
One-time pads: indecipherable coding systems for eavesdroppers. Often used to encrypt number station broadcasts.
Automated reel-to-reel tape recorders: timed to play broadcasts at certain times of the day. Occasionally they "fail", and broadcast the code at an incorrect speed, or broadcast the wrong code entirely.
Re-watch: The Conversation by Francis Ford-Coppola - Listening/Paranoia/Cold War/Nixon/Espionage.
Radio as a filesharing medium? Using mplayer to send data as raw audio over a radio network.
The Fruitsalad Enigma
Continuing with the idea of covert networks and cryptography, I have begun working on an experimental encryption tool (alpha stages at the moment) codenamed The Fruitsalad Enigma, and returns the encoded message as a list of fruit (some exotic variants included). The encryption algorithm, as the name suggests, is based on the Enigma machine - used during World War II and cracked by a collaborative effort that included the Polish resistance and a team at Bletchley Park (Britain's wartime decryption centre). Like the Enigma, it employs conceptual use of "rotors" (albeit conceptually rather than mechanically) which alters the encryption algorithm for each character in the message, making it quite difficult to decrypt. The idea arose out of discussions about data, privacy, and facebook. Thinking that facebooks advertising algorithms were content-dependent, I thought that flooding your facebook profile messages with status updates about fruit would skew the advertising data facebook collects about you. I've since discovered that the advertising algorithms are slightly more meta, and in fact do not depend on what's on your "wall" (as far as I understand it at least, facebook seems happy to remain ambiguous about such issues at times).
I'm using this "project" as a way of learning more about string operations in python. I'm also curious about using python alongside bash, perhaps building a terminal-based UI with 'dialog' so the user can input their text, providing a suitably anachronistic aesthetic for an ecnryption/decryption tool :)
A point of interest for me is that with the original Enigma, no encoded letter every referred to itself (ie the letter 'a' was never encrypted as 'a') - this pattern was picked up by the codebreakers and was an important feature that led to its eventual decryption. The idea of hiding text in plain sight is also interesting to me - disguising an encrypted message as another piece of text entirely.
A SECRET CODE
GRAPEFRUIT PEACH PAPAYA PEAR POMEGRANATE WATERMELON TANGERINE DRAGONFRUIT PEACH LOGANBERRY LEMON PINEAPPLE PAPAYA CHERRY COCONUT KIWI WATERMELON COCONUT GRAPE MANDARIN PASSIONFRUIT MANDARIN STRAWBERRY GRAPEFRUIT PEACH TANGERINE DRAGONFRUIT VANILLA COCONUT RASPBERRY LOGANBERRY