{"id":3581,"date":"2016-10-01T09:53:53","date_gmt":"2016-10-01T13:53:53","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5211fall16\/?p=3581"},"modified":"2016-10-01T09:53:53","modified_gmt":"2016-10-01T13:53:53","slug":"computer-scientists-close-in-on-perfect-hack-proof-code","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/2016\/10\/01\/computer-scientists-close-in-on-perfect-hack-proof-code\/","title":{"rendered":"Computer Scientists Close In On Perfect, Hack-Proof Code"},"content":{"rendered":"<p>Are mathematical formulas the best answer to date against hacking? This is what Wired\u2019s Kevin Hartnett explains in \u201cComputer Scientists Close In On Perfect, Hack-Proof Code,\u201d an article he posted on Huffington Post. Several computer scientists are experimenting on a coding method that would make it \u201cimpossible\u201d to hack. It\u2019s a sign of relief to learn that a great deal of effort is being put together to make hack-proof code a reality. Perhaps this is possible, but I\u2019m almost certain attackers will eventually figure out a way to break into the system.<\/p>\n<p>Tests are now being conducted using a helicopter code named as \u201cLitte Bird.\u201d Kevin reports that a team of hackers could have taken over the helicopter almost as easily as it could break into a home Wi-Fi. However, engineers from the Defense Advanced Research Projects Agency had implemented a new kind of security mechanism software system that couldn\u2019t be commandeered. The writer goes further to add that key parts of Little Bird\u2019s computer system were unhackable with \u201cExisting technology, its code as trustworthy as a\u00a0<a href=\"https:\/\/www.quantamagazine.org\/20150519-will-computers-redefine-the-roots-of-math\/\">mathematical proof<\/a>.\u201d I\u2019m looking forwards to see whether this coding method will emerge as unhackable as intended.<\/p>\n<p>&nbsp;<\/p>\n<p>http:\/\/www.huffingtonpost.com\/entry\/computer-scientists-close-in-on-perfect-hack-proof_us_57e93bf1e4b05d3737be6460?section=us_technology<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Are mathematical formulas the best answer to date against hacking? This is what Wired\u2019s Kevin Hartnett explains in \u201cComputer Scientists Close In On Perfect, Hack-Proof Code,\u201d an article he posted on Huffington Post. Several computer scientists are experimenting on a coding method that would make it \u201cimpossible\u201d to hack. It\u2019s a sign of relief to [&hellip;]<\/p>\n","protected":false},"author":11666,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[715709],"tags":[],"class_list":{"0":"post-3581","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-05it-strategy","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3581","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/users\/11666"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/comments?post=3581"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3581\/revisions"}],"predecessor-version":[{"id":3582,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3581\/revisions\/3582"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/media?parent=3581"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/categories?post=3581"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/tags?post=3581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}