<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Harvard Gazette</provider_name><provider_url>https://dev.news.harvard.edu/gazette</provider_url><author_name>gazetteimport</author_name><author_url>https://dev.news.harvard.edu/gazette/story/author/gazetteimport/</author_url><title>Code conquers computer snoops &#x2014; Harvard Gazette</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="Aentt3oPCW"&gt;&lt;a href="https://dev.news.harvard.edu/gazette/story/2001/04/code-conquers-computer-snoops/"&gt;Code conquers computer snoops&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://dev.news.harvard.edu/gazette/story/2001/04/code-conquers-computer-snoops/embed/#?secret=Aentt3oPCW" width="600" height="338" title="&#x201C;Code conquers computer snoops&#x201D; &#x2014; Harvard Gazette" data-secret="Aentt3oPCW" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://dev.news.harvard.edu/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><description>With electronic privacy becoming more difficult to attain for everyone from governments to lovers, the need for an unbreakable code is rising rapidly toward the top of many most wanted lists. Michael Rabin, the Thomas J. Watson Sr. Professor of Computer Science at Harvard University, says he has come up with the solution: a code that cannot be deciphered even by those who have both the key and unlimited computer power.</description><thumbnail_url>https://dev.news.harvard.edu/gazette/wp-content/uploads/2001/04/06-rabin-450-11.jpg</thumbnail_url></oembed>
