diff options
| author | root <root@turin.home> | 2022-01-25 23:00:12 +0000 |
|---|---|---|
| committer | root <root@turin.home> | 2022-01-25 23:00:12 +0000 |
| commit | 11e3e6e472781b2078c9179e344abd42ece2cb53 (patch) | |
| tree | f1a439a42f80154e9c538dd7b2ac277c11878df8 | |
| parent | f99481ad484caa2bc34ec101c0baa8845f6dcb16 (diff) | |
Minor changes
| -rw-r--r-- | Makefile | 1 | ||||
| -rw-r--r-- | formatting.ms | 2 | ||||
| -rw-r--r-- | paper.ms | 22 |
3 files changed, 14 insertions, 11 deletions
@@ -1,6 +1,7 @@ default: ls target || mkdir target cat formatting.ms paper.ms |\ + sed "s/^{/.[\n/g" |\ sed "s/}{/\n.]\n.[\n/g" |\ sed "s/{/\n.[\n/g" | sed "s/\}\ /\n.]\n/g" | sed "s/\}/\n.]\n/g" |\ refer -Ss -p refer |\ diff --git a/formatting.ms b/formatting.ms index b553c04..ea2536e 100644 --- a/formatting.ms +++ b/formatting.ms @@ -34,7 +34,7 @@ .fzoom CR 750 .fzoom CB 900 .rm CH -.nr HY 1 +.nr HY 0 .R1 accumulate .R2 @@ -45,24 +45,26 @@ governments access to unencrypted Internet communications so that suspicious activity can be flagged and investigated in order to prevent a terror attack or in order to better respond in the case of an attack. Graham describes the extensive use of end to end encryption -used by terrorists in order to avoid interception by the autorities. +used by terrorists in order to avoid interception by the authorities. Due to U.S. usage of intercepted communications to uncover and prevent a number of al-Qa'ida plots, the terrorist organisation and other terrorist groups have increasingly used encrypted communications (read citation from Graham). An significant factor is the use of non-mainstreams software in early use of encryption by terrorists, -including a program that built a rapper around the popular, secure, +including a program that built a wrapper around the popular, secure, and open source PGP called \fIMujahedeen secrets\fR. Although now terrorists and criminals use widely available, popular, and user-friendly software such as the Tails operating system or Telegram -(Graham citation 28), Messaging -technologies and their support for `end-to-end encryption' is a -particularly significant issue. Introduction of end-to-end encryption -being introduced by large companies such as Facebook has raised -concern {conversation facebook} over the potential for usage by -criminals and a lack of ability for Facebook or law enforcement to -obtain conversation between criminals which may be vital in an -investigation. +(Graham citation 28), terrorists organisations have shown an ability +to make use of more obscure and complicated systems, as well as use +publicly available source code in order to construct software for +operatives to use. Messaging technologies and their support for +`end-to-end encryption' is a particularly significant issue. +Introduction of end-to-end encryption being introduced by large +companies such as Facebook has raised concern {conversation facebook} +over the potential for usage by criminals and a lack of ability for +Facebook or law enforcement to obtain conversation between criminals +which may be vital in an investigation. Concerns exist with digital technologies on at a hardware level. The Intel Management Engine that exists {Intel Management} |
