aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorroot <root@turin.home>2022-01-25 23:00:12 +0000
committerroot <root@turin.home>2022-01-25 23:00:12 +0000
commit11e3e6e472781b2078c9179e344abd42ece2cb53 (patch)
treef1a439a42f80154e9c538dd7b2ac277c11878df8
parentf99481ad484caa2bc34ec101c0baa8845f6dcb16 (diff)
Minor changes
-rw-r--r--Makefile1
-rw-r--r--formatting.ms2
-rw-r--r--paper.ms22
3 files changed, 14 insertions, 11 deletions
diff --git a/Makefile b/Makefile
index 651d684..6b64181 100644
--- a/Makefile
+++ b/Makefile
@@ -1,6 +1,7 @@
default:
ls target || mkdir target
cat formatting.ms paper.ms |\
+ sed "s/^{/.[\n/g" |\
sed "s/}{/\n.]\n.[\n/g" |\
sed "s/{/\n.[\n/g" | sed "s/\}\ /\n.]\n/g" | sed "s/\}/\n.]\n/g" |\
refer -Ss -p refer |\
diff --git a/formatting.ms b/formatting.ms
index b553c04..ea2536e 100644
--- a/formatting.ms
+++ b/formatting.ms
@@ -34,7 +34,7 @@
.fzoom CR 750
.fzoom CB 900
.rm CH
-.nr HY 1
+.nr HY 0
.R1
accumulate
.R2
diff --git a/paper.ms b/paper.ms
index 9275254..63572db 100644
--- a/paper.ms
+++ b/paper.ms
@@ -45,24 +45,26 @@ governments access to unencrypted Internet communications so that
suspicious activity can be flagged and investigated in order to
prevent a terror attack or in order to better respond in the case of
an attack. Graham describes the extensive use of end to end encryption
-used by terrorists in order to avoid interception by the autorities.
+used by terrorists in order to avoid interception by the authorities.
Due to U.S. usage of intercepted communications to uncover and prevent
a number of al-Qa'ida plots, the terrorist organisation and other
terrorist groups have increasingly used encrypted communications (read
citation from Graham). An significant factor is the use of
non-mainstreams software in early use of encryption by terrorists,
-including a program that built a rapper around the popular, secure,
+including a program that built a wrapper around the popular, secure,
and open source PGP called \fIMujahedeen secrets\fR. Although now
terrorists and criminals use widely available, popular, and
user-friendly software such as the Tails operating system or Telegram
-(Graham citation 28), Messaging
-technologies and their support for `end-to-end encryption' is a
-particularly significant issue. Introduction of end-to-end encryption
-being introduced by large companies such as Facebook has raised
-concern {conversation facebook} over the potential for usage by
-criminals and a lack of ability for Facebook or law enforcement to
-obtain conversation between criminals which may be vital in an
-investigation.
+(Graham citation 28), terrorists organisations have shown an ability
+to make use of more obscure and complicated systems, as well as use
+publicly available source code in order to construct software for
+operatives to use. Messaging technologies and their support for
+`end-to-end encryption' is a particularly significant issue.
+Introduction of end-to-end encryption being introduced by large
+companies such as Facebook has raised concern {conversation facebook}
+over the potential for usage by criminals and a lack of ability for
+Facebook or law enforcement to obtain conversation between criminals
+which may be vital in an investigation.
Concerns exist with digital technologies on at a hardware level. The
Intel Management Engine that exists {Intel Management}