Hundreds of years ago, people developed ingenious methods to secure their letters from prying eyes – and they did it with only paper, adhesive and folds. Late at night on 8 February 1587, an ...
Abstract: In this section we will take a close look at twelve historical letters, written on paper from the 1580s to the 1970s, that demonstrate some distinctive features or techniques of ...
The rich history of a centuries-old document security technology—folding and securing a letter into its own envelope for delivery—and a comprehensive guide to learning how to make your own locked ...
The researchers virtually opened the letters with an advanced X-ray machine. They then used computers to analyze the folds and create a readable, digital model of the unfolded message. Unlocking ...
Communication through written word existed long before the days of text messages and DMs, and even then some kind of security was needed to protect people’s secrets. When we think of a handwritten ...
Leslie Katz led a team that explored the intersection of tech and culture, plus all manner of awe-inspiring science, from space to AI and archaeology. When she's not smithing words, she's probably ...
Computer-generated unfolding animation of sealed letter DB-1538. “Virtual unfolding” was used to read the contents of sealed letterpackets from 17th-century Europe without physically opening them.
Keys: How to Use this Book -- Introduction to Letterlocking -- Building the Story of Letterlocking -- Reading Letterlocking Features -- Locking Mechanisms, Security, and Authentication -- Distinctive ...