Unreviewed Annotation 1 Contributor ?

What is this?

The Genius annotation is the work of the Genius Editorial project. Our editors and contributors collaborate to create the most interesting and informative explanation of any line of text. It’s also a work in progress, so leave a suggestion if this or any annotation is missing something.

To learn more about participating in the Genius Editorial project, check out the contributor guidelines.

Loading...

Chmelar invented the finger in 1971, as a 16 year old. His high school team made it to the Iowa state basketball championships, prompting Chmelar to find a new way to support the players. The rest is history: the idea expanded, Chmelar never patented it, and the finger became one of the sporting world’s most loved icons.

This video is processing – it'll appear automatically when it's done.

What is this?

The Genius annotation is the work of the Genius Editorial project. Our editors and contributors collaborate to create the most interesting and informative explanation of any line of text. It’s also a work in progress, so leave a suggestion if this or any annotation is missing something.

To learn more about participating in the Genius Editorial project, check out the contributor guidelines.

Loading...

This video is processing – it'll appear automatically when it's done.

What is this?

The Genius annotation is the work of the Genius Editorial project. Our editors and contributors collaborate to create the most interesting and informative explanation of any line of text. It’s also a work in progress, so leave a suggestion if this or any annotation is missing something.

To learn more about participating in the Genius Editorial project, check out the contributor guidelines.

Loading...

The worst part for Guy (or Guido, his adopted name) was that he did not actually mastermind the plan! Guy was tasked with guarding the gunpowder to be used in the plot, and just happened to be in the building when guards swept in. Since he was the first and main conspirator arrested, history made him infamous.

Fawkes' image spawned the mask made famous in V for Vendetta. The mask has been appropriated by some groups (notably the hacktivist collective Anonymous) as a generalized symbol of anarchy and rebellion.

This video is processing – it'll appear automatically when it's done.

What is this?

The Genius annotation is the work of the Genius Editorial project. Our editors and contributors collaborate to create the most interesting and informative explanation of any line of text. It’s also a work in progress, so leave a suggestion if this or any annotation is missing something.

To learn more about participating in the Genius Editorial project, check out the contributor guidelines.

Loading...

Every rapper, from, an up and coming artist to someone already established, will use Nas as a benchmark for making it. Calling yourself better than Nas, usually incorrectly, is a rite of passage. Even people like Kendrick Lamar will shout the brag.

Irahnik does not, because of the respect and structure of real hip-hop. While bragging and boasting are part of the game, comparing yourself (especially when you know it to not be true) to the legends does not fly. He may be hard, but Nas, by virtue of his legacy, will always be harder.

This video is processing – it'll appear automatically when it's done.

Unreviewed Annotation 1 Contributor ?

What is this?

The Genius annotation is the work of the Genius Editorial project. Our editors and contributors collaborate to create the most interesting and informative explanation of any line of text. It’s also a work in progress, so leave a suggestion if this or any annotation is missing something.

To learn more about participating in the Genius Editorial project, check out the contributor guidelines.

Loading...

While the statement, essentially that the ends justify the means, makes sense, the public has failed to accept it. Why? Because the NSA has yet to provide any single actionable case when intelligence gathered from this or other programs has been the factor in interrupting, preventing, or otherwise solving crime. When both the methods and results are secret, it creates a vacuum of information that must be filled by revelation or suspicion.

This video is processing – it'll appear automatically when it's done.

What is this?

The Genius annotation is the work of the Genius Editorial project. Our editors and contributors collaborate to create the most interesting and informative explanation of any line of text. It’s also a work in progress, so leave a suggestion if this or any annotation is missing something.

To learn more about participating in the Genius Editorial project, check out the contributor guidelines.

Loading...

While “terrorists, cybercriminals, human traffickers and others” certainly fit into the category of “use code to hide their activities,” so do businesses, individuals, and legitimate holders of privacy. What the NSA fails to realize, or choses to ignore, is that corrupting encryption for the “adversaries” also ruins it for everyone else. If the system is broken in one place, everyone must suffer this same fault, a basic tenet of cybersecurity. The ends justified by such means do not seem readily apparent, and are not elaborated upon by the NSA.

Side note:

  • The U.S. launched 231 cyber attacks in 2011, and currently has 85,000 strategic implants in major networks around the world, giving them surreptitious control of significant worldwide communications.
  • Despite this offensive, global terrorism, by most measures, appears to have grown since 2001.
  • Likewise, the global human trafficking industry is flourishing, representing an estimated $32 billion a year trade-value.

Considering these developments, it’s hard to imagine that the primary goal of these programs is really to target terrorists, human traffickers, or other international criminals. If it is, then it is failing miserably, and might be worth some reconsideration anyway.

This video is processing – it'll appear automatically when it's done.

Unreviewed Annotation 1 Contributor ?

What is this?

The Genius annotation is the work of the Genius Editorial project. Our editors and contributors collaborate to create the most interesting and informative explanation of any line of text. It’s also a work in progress, so leave a suggestion if this or any annotation is missing something.

To learn more about participating in the Genius Editorial project, check out the contributor guidelines.

Loading...

Encryption was one of the chief ways in which Nazi Germany was able to succeed in its blitzkrieg war campaign. Until the breaking of its Enigma code, used to past encrypted, secret messages, the Allied powers were entirely in the dark about troop movements and strikes. Once the system was broken in part by Alan Turing, the British and United States forces were able to intercept and interpret secret transmissions.

This video is processing – it'll appear automatically when it's done.

Unreviewed Annotation 1 Contributor ?

What is this?

The Genius annotation is the work of the Genius Editorial project. Our editors and contributors collaborate to create the most interesting and informative explanation of any line of text. It’s also a work in progress, so leave a suggestion if this or any annotation is missing something.

To learn more about participating in the Genius Editorial project, check out the contributor guidelines.

Loading...

Both the New York Times and the Guardian chose to publish documents outlining NSA encryption plans and industrial espionage, despite a plea from the NSA to avoid running the story. The two outlets, however, chose to gently redact the papers to remove non-vital, personal information. Regardless, the three pages shared displayed a vital portion of the NSA’s SIGINT program, designed to “influence” encryption standards to have flaws and to exploit said flaws in analyzing encrypted messages.

This video is processing – it'll appear automatically when it's done.

Unreviewed Annotation 1 Contributor ?

What is this?

The Genius annotation is the work of the Genius Editorial project. Our editors and contributors collaborate to create the most interesting and informative explanation of any line of text. It’s also a work in progress, so leave a suggestion if this or any annotation is missing something.

To learn more about participating in the Genius Editorial project, check out the contributor guidelines.

Loading...

Canzani was killed instantly at 3am on Columbus, Ohio’s I-670, when Cordle, driving his truck in the wrong lane, slammed into the car. While Matthew was taken to the hospital, he was not publicly named or charged by September 3rd, 2013, as police chose to continue the investigation.

This video is processing – it'll appear automatically when it's done.

Unreviewed Annotation 1 Contributor ?

What is this?

The Genius annotation is the work of the Genius Editorial project. Our editors and contributors collaborate to create the most interesting and informative explanation of any line of text. It’s also a work in progress, so leave a suggestion if this or any annotation is missing something.

To learn more about participating in the Genius Editorial project, check out the contributor guidelines.

Loading...

The key word is “trusted.” A “trusted” technology in computing indicates one that is deemed safe and reliable, with minimal security holes. Since the NSA has already influenced the purposeful, malicious creation of exploits, they then use these flaws to corrupt entire networks and systems.

The problem? Everyone else using these systems. The NSA is not the only dedicated cybersecurity team in the world – once an exploit is revealed, it will be shared and used. That corrupts the entire system for everyone.

This video is processing – it'll appear automatically when it's done.