There is both room for and a need for many different types of physicists and scientists to kick progress up a notch. Some of the most mind-stretching and inspiring are those who are philosophical about their work, as well as those who are interdisciplinary in their understanding. Scott Aaronson fits in both camps and shares […]Read more "book review: Quantum Computing Since Democritus"
June 1, 2015 I was thrilled to start my 3 year tenure as an NSF Astronomy and Astrophysics Postdoctoral Fellow (NSF AAPF) at Caltech. I am therefore declaring June 1 as my official academic New Year. I’m treating this fellowship period as my shot to make a scientific difference, and here’s to the next 3 years. I have an structured routine scheduled, […]Read more "Happy Academic New Year, 2015"
Whisper At Open WhisperSystems Winter Break of Code, I had the privilege to announce our integrated RedPhone/TextSecure roadmap for iOS and Android. Code named Whisper, it offers a cross platform one stop solution for secure messaging and phone calls. This is a big deal! Close to a billion people are using data channel messaging and phone […]Read more "Axolotl Protocol for Cryptographically Secure Messaging: An Illustrated Primer"
Motivation I’ve been obsessed with gadgetry since I was a little girl, much before I got into hacking and making which was the inevitable progression. I got a pager before I made more than 5 friends (I recall primarily paging myself and ignoring my mother), and was on my fourth palm pilot, second laptop, and […]Read more "Google Glass–using, hacking, loving"
I took a Cryptography I course on coursera.org taught by Stanford’s Dan Boneh. The lectures are easy listening (I usually put on my wireless headphones while doing a household chore, and set my iPad somewhere convenient if I need to glance at the slide), although clocking in at about 2 hours a week, are certainly a bit of a commitment. The are broken into 5-20 minute chunks, the online system tracks which you have listened to already, and asks you 0-3 questions a lecture to make the whole process more interactive and to jolt you to attention if you’ve filtered out an important section.Read more "Cryptography course–the power of XOR"
My TED 2013 audition talk on circleof6app.com went live today. It was an extremely tough story to tell, so please take the time to rate the talk or leave a comment if you take the time to watch it. That’s the easiest way you can help the project get more exposure.Read more "circleof6 TED audition talk live"
I’m proud to have been the developer behind Circle of 6, which has just won the White House’s Apps Against Abuse Challenge. I spent part of this week in a conference call with US Vice President Joe Biden, who is well informed and extremely passionate about bringing a stop to violence against women. He spent 5 minutes speaking about our app, which was surreal and heartfelt. It has been more than worth it to spend some Sundays working on such a meaningful project with a great team; and glad to see our work will be appreciated. Like our Facebook page to stay up to date and join the pledge to end violence against women. The app will launch in January 2012.Read more "Circle of 6 winner of White House’s Apps Against Abuse Challenge"
SSL stands for the secured socket layer and it is the way many websites handle encrypting your data as you communicate to them and helping you to verify that they are who you think they are, making it more difficult for others to view your traffic. As simple as using SSL is, many services don’t use it. What happens then? Well if an eavesdropper, let’s call her Eve, is somewhere on the same network as you are, for example if you are at a coffee house and she is sitting a few tables down from you, she can run any number of freely available tools (or one she wrote herself) to observe your network traffic. Sounds like a rather far fetched scenario, if you aren’t familiar with how easy it is to be Eve(il) if you so choose.Read more "SSL and packet sniffing with Wireshark."