![]() From Plutarch we know that scytalae were very probably used as tools for cryptography during wartime. The scytale could have been used for a variety of purposes, including as a messenger authentication stick, as a sort of military name-tag, and as a cryptographic device. So what exactly was a scytale and how was it used? The fact that Lysander was much disturbed shows that the message was both powerful and important. Therefore the ephors sent a confidential – and most probably encrypted – message by scytale to Lysander summoning him to come home – or be sentenced to death on account of this misbehaviour. describes how the Persian statesman Pharnabazus complained to the Spartan ephors that their general Lysander was pillaging his territories for no purpose. In the episode that introduces this piece, Plutarch Life of Lysander 19.4. The loneliness of the long-distance ruler: a 19th-century sketch of the ephors at rest (Ludwig Löffler, 1861). – used a scytale (a “stick” or “staff”) to communicate with commanders in the field on confidential matters. Our primary ancient sources are Xenophon’s Hellenica 3.3, and the anonymous Constitution of Sparta 15. According to our sources, the ephors – leading magistrates who shared power with the two kings For more on this complicated set-up, see Marshall Sahlins, “Twin-born with greatness: the dual kingship of Sparta,” Journal of Ethnographic Theory 1 (2011) 63–101 also of interest is Ellen Millender’s “Spartan Literacy Revisited” ( Classical Antiquity 20 (2001), 121–64). One particularly interesting example of ancient cryptography can be found in 5 th– and 4 th-century BC Sparta. The Ancient Greeks, and in turn the Romans, seem to have been experts in the art of cryptography (“hidden-writing”). Yet these problems are not the invention of the computer age: since antiquity, individuals in all civilisations have been trying to use technology to encipher confidential correspondence, while others have been desperately trying to decipher it. Play nice, support each other and encourage learning.When Pharnabazus was outraged by Lysander pillaging and wasting his territory, he sent men to Sparta to denounce him… The ephors were incensed, and when they found Thorax, one of Lysander’s friends and fellow-generals, with money in his private possession, they put him to death, and sent a scytale to Lysander, ordering him home… When the scytale reached him at the Hellespont, Lysander was much disturbed.Ĭommunication security is of integral importance to our modern world: when security is breached, the consequences are often of global importance. We are not tech support, these posts should be kept on /r/techsupportĭon't be a dick. Low-effort content will be removed at moderator discretion from security firms/pen testing companies is allowed within the confines of site-wide rules on self promotion found here, but will otherwise be considered spam. Spam is strictly forbidden and will result in a ban. Sharing of personal data is forbidden - no doxxing or IP dumping No "I got hacked" posts unless it's an interesting post-mortem of a unique attack. "How does HSTS prevent SSL stripping?" is a good question. Intermediate questions are welcomed - e.g. Offering to do these things will also result in a ban.Asking how to get into your "girlfriend's" instagram.This is not the place to try to find hackers to do your dirty work and you will be banned for trying. Discussion around the legality of issues is ok, encouraging or aiding illegal activities is not Hacking can be a grey area but keep it above board. "TeenagerĪrrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering". Guides and tutorials are welcome here as long as they are suitably complex and most importantly legal!īans are handed out at moderator discretion.Īnother one got caught today, it's all over the papers. This sub is aimed at those with an understanding of hacking - please visit /r/HowToHack for posting beginner links and tutorials any beginner questions should be directed there as they will result in a ban here. What we are about: quality and constructive discussion about the culture, profession and love of hacking. A subreddit dedicated to hacking and hacking culture.
0 Comments
Leave a Reply. |