aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorroot <root@turin.home>2022-03-06 20:49:30 +0000
committerroot <root@turin.home>2022-03-07 11:35:34 +0000
commit6cb3b7378e3961a42e431cd970a81b1cc68a6fdd (patch)
tree89e932cc3be4a50967b0075f0aee3311445b4dbb
parentc5f1ca699554b7e972122b6ac734fc4b239ea6ec (diff)
Adding to conclusion.
-rw-r--r--paper.ms22
1 files changed, 16 insertions, 6 deletions
diff --git a/paper.ms b/paper.ms
index 1824926..76d6d5d 100644
--- a/paper.ms
+++ b/paper.ms
@@ -367,12 +367,22 @@ The executive summary to the 9/11 Commission Report {#9/11 commission
report} describes the September 2001 terrorist attacks as 'a shock,
not a surprise'. In a similar light, the release of information
relating to mass surveillance and mishandling of data such as the 2013
-Edward Snowden releases and the 2018 Facebook-Cambridge Analytica
-scandal ought to also be potentially considered a shock, not a
-surprise given the level of data that both governments and private
-organisations have access to and responsibility for. Encryption
-enables people to trust that their data that they wish to be private
-truly is and allows
+Edward Snowden releases ought to also be potentially considered a
+shock, not a surprise given the level of data that both governments
+and private organisations have access to and responsibility for.
+Encryption enables people to trust that their data that they wish to
+be private truly is and allows companies to handle communications
+such as e-mails without having to consider secure storage or giving
+data to law enforcement due to the fact the company itself is unable
+to read the data if it is end-to-end encrypted. The free market
+arguably has moved itself towards encrypted standards. Open source
+initiatives have pioneered free implementations of secure
+cryptographic standards, allowing any user to use these tools directly
+in order to send information, as occurs with the popular PGP
+implementation GPG. Additionaly the open implementation of
+cryptographic tools enables developers to integrate secure versions of
+these tools into new programs, allowing for the easy development of
+programs that allow encrypted communications.
.nr HY 0
.ad l