How people secured their secrets before encyption

Centuries before encrypted texts and secure video conferencing, people relied on physical engineering to keep their written messages sturdy, sealed, and secure against eavesdroppers.

In a new book, researchers Jana Dambrogio and Daniel Starza Smith outline the “letterlocking” techniques used by figures from Queen Elizabeth I to poet Emily Dickinson to protect their paper letters—and the methods Dambrogio, Smith, and a growing number of other scholars have developed to reverse-engineer those historic documents, from algorithmic analysis of X-ray images to careful paper modeling.

Dambrogio, a conservator at the Massachusetts Institute of Technology Libraries, traces her interest in the subject back about 25 years, to a fellowship at the Vatican’s archives. There, she noticed security features in a trove of historic legal and accounting documents—different kinds of mechanisms engineered to keep them sealed, make tampering visible, and verify that senders were who they claimed to be. The features were fascinating on their own, but understanding how they worked also seemed crucial to preserving the documents, ensuring that these security aspects wouldn’t be inadvertently lost during repairs.

“That object is like the time capsule from that time period,” Dambrogio says. “If I change anything not knowing, then that object loses its voice.”

To understand how the documents functioned, she built more than 100 models of objects in the collection. Later, she connected with Smith, now a senior lecturer in early modern English literature at King’s College London. Smith explains that while his colleagues had long been interested in the physical aspects of historic writings—like how poet John Donne arranged words on a page—scholars had largely overlooked the technical side of how letters were assembled.

“When Jana showed me these models, suddenly all this kind of material fell into place,” he says. “Because you could see through modeling how these objects worked as kind of engineered structures and devices, designed to travel long distances and keep information safe.”

Letterlocking: The Hidden History of the Letter, by Jana Dambrogio and Daniel Starza Smith, with the Unlocking History Research Group [Photo: MIT Press]

Together, the pair began studying what they came to call letterlocking, reconstructing through close analysis and modeling the many ways historic letters were folded and secured. These included elaborate locks created from sliced-off portions of the letter paper itself—designed so senders could rejoin them and confirm the letter hadn’t been replaced in transit. These sliced strips were passed precisely through slits in the folded document before being sealed with wax.

They searched for additional examples—from letters listed on eBay to ceremonial correspondence between heads of state stored in the National Archives—learning to recognize the telltale markings of different folding and locking patterns. In 2012, they established the Unlocking History Research Group, which grew to include dozens of other researchers.

As their work expanded, they began constructing a taxonomy of letterlocking, creating a periodic table-style diagram categorizing the combinations of folds, insertions, holes, and adhesives used to secure letters. This gave researchers a common language to describe and compare techniques.

 The letterlocking categories and formats chart visualising different ways to organise letterlocking evidence.  [Image:MIT Libraries, MC0760, UH6203.]

When they learned of the Brienne Collection—a centuries-old Dutch postmaster’s trunk containing around 2,600 undelivered letters from the late 1600s and early 1700s—they worked with a team of experts to explore the letters’ seals and contents without disturbing them. X-ray experts captured painstaking, high-resolution scans of the documents, while computer scientists devised new computer vision algorithms for what they called “virtual unfolding” of the letters.

A paper by the team, published in Nature in 2021, has since been cited in research across fields including AI, cryptology, and literary history.

“It’s been so much fun tracking the citations,” Smith says. “We’ve been cited in antenna studies. I didn’t know anything about antenna studies.”

Left to right: A letter from John Donne (February 12, 1602) showing evidence of letterlocking, in The Folger Shakespeare Library (UH0027). Step by step drawing showing how the John Donne’s oculus lock works. [Images: Folger Shakespeare Library, L.b. 528 (UH0027); MIT Libraries, MC0760, UH0027.]

Their research also offers new insights into the personalities and correspondence methods of historic figures. In their book, Dambrogio and Smith cite an example where King Charles I verified a letter was sent by a particular secret agent based on its fold pattern, as well as a 17th-century English statesman scolding his university student son for folding his letters “like those that come out of a grammar school.” And one of Donne’s letters, Smith says, appears to reflect his writing style in its physical engineering, using an unusual and ornate locking mechanism.

“It was so immediately striking that the way he was folding his letter was so similar to what else I knew about him,” Smith says. “His love of complexity and difficulty and elegance, and not doing things the way that everybody else did them.”

Through projects like a series of YouTube videos and detailed step-by-step diagrams included in their book—the authors say they chose MIT Press not only for Dambrogio’s affiliation but for the publisher’s experience producing graphical engineering texts—they hope to inspire more people to explore the field. That includes scholars building their own models of historic locking techniques, even without a background in engineering or paper arts.

While letterlocking techniques became less common after the rise of the modern pre-stickied envelope in the 1800s, the goals of security, authentication, and aesthetics remain familiar—even in the age of digital communication.

“People’s desire across time and space is to communicate with each other and to protect that for the person for which it’s intended,” says Dambrogio. “We still do that with two-step authentication in our bank accounts and whatnot.”

https://www.fastcompany.com/91315486/how-people-secured-their-secrets-before-encyption?partner=rss&utm_source=rss&utm_medium=feed&utm_campaign=rss+fastcompany&utm_content=rss

Creată 21d | 14 apr. 2025, 10:40:03


Autentifică-te pentru a adăuga comentarii

Alte posturi din acest grup

Speed-limiting devices could be coming for reckless U.S. drivers in these states

A teenager who admitted being “addicted to speed” behind the wheel had totaled two other cars in the year before he slammed into a minivan at 112 mph (180 kph) in a Seattle suburb,

5 mai 2025, 16:40:03 | Fast company - tech
Nvidia chips could face new tracking rules under a bipartisan bill to stop chip smuggling to China

A U.S. lawmaker plans to introduce legislation in coming weeks to verify the location of

5 mai 2025, 16:40:02 | Fast company - tech
Meta’s AI social feed is a privacy disaster waiting to happen

Since ChatGPT sparked the generative AI revolution in November 2022, interacting with AI has felt like using a digital confession booth—private, intimate, and shielded from public view (unless you

5 mai 2025, 14:20:05 | Fast company - tech
I have trouble focusing, but this AI browser feature helps

My worst workday habit is that I’m a compulsive web page checker.

Throughout the day, I’m constantly refreshing the same handful of sites for updates. I’ll check the me

5 mai 2025, 11:50:07 | Fast company - tech
This is the future of AI, according to Nvidia

​​Recent breakthroughs in generative AI have centered largely on language and imagery—from chatbots that compose sonnets and analyze text to voice models that mimic human speech and tools that tra

5 mai 2025, 11:50:06 | Fast company - tech
Free online storage services compared: Which one’s best for you?

Cloud storage services conveniently let you store and access documents, photos, videos, and more from any device. The best part? Many top providers offer free plans that are surprisingly capable.

5 mai 2025, 05:10:03 | Fast company - tech