diff options
| author | root <root@turin.home> | 2022-01-30 00:08:51 +0000 |
|---|---|---|
| committer | root <root@turin.home> | 2022-01-30 00:08:51 +0000 |
| commit | 8b37c99b44de06d947ac44c1df3156f005f51bcd (patch) | |
| tree | 8bc77ef0d0a6230ba2005c499d124684212d5922 | |
| parent | 9fbbc8575ab726f106bb1a46c1c57f3aed374664 (diff) | |
840 words
| -rw-r--r-- | Makefile | 5 | ||||
| -rw-r--r-- | header.html | 3 | ||||
| -rw-r--r-- | paper.ms | 71 | ||||
| -rw-r--r-- | refer | 6 |
4 files changed, 58 insertions, 27 deletions
@@ -4,11 +4,12 @@ default: sed "s/^{/.[\n/g" |\ sed "s/}{/\n.]\n.[\n/g" |\ sed "s/{/\n.[\n/g" | sed "s/\}\ /\n.]\n/g" | sed "s/\}/\n.]\n/g" |\ - refer -Ss -p refer > target/temp + refer -Ss -p refer | tr "_" " "> target/temp cat formatting.ms target/temp | groff -ket -Tpdf -ms -P-pa4 > target/paper.pdf cat header.html > target/paper.html cat formatting.ms target/temp| sed "s/.nr LL*/.nr LL 7i/g" |\ - groff -Tascii -c -ms | ansi2html -piml >> target/paper.html + groff -Tascii -c -ms |\ + sed "1,2d" | ansi2html -piml >> target/paper.html echo "</pre>" >> target/paper.html read: zathura target/paper.pdf& diff --git a/header.html b/header.html index cdf4442..b5d8c25 100644 --- a/header.html +++ b/header.html @@ -12,4 +12,7 @@ html { a:hover, a:active { color: hotpink; } /* hotpink on hover */ } </style> +<title>Title</title> <pre> + <a href="/">Mohit Agarwal</a> + <a href="./paper.pdf">See this as a pdf</a> @@ -5,24 +5,26 @@ Mohit Agarwal .AI January 2022 .LP -The Internet offers a potentially Utopian vision of human interaction. -The nature of computers and the information stored on them means that -a large file such as a book can be duplicated practically instantly. -When sharing information on the Internet, it is not limited by the -physical limitation of traditional methods. To give someone a book is -either to lose the copy yourself or to obtain or produce a copy of -that book, which can be a difficult process. With the Internet, -however, information can exist in a more absolute state, separated -entirely from any physical media. Millions of people can download a -single book as easily as one person could, and the traditional -limitations that lead us to 'own' individual property no longer exist. -In this way, the Internet eliminates the ownership of information in -whatever forms it perpetuated through the attachment of information -to media such as books or celluloid film, and the copying of -information can take place in its purest state: of literal +A problem (instability), a solution + +The Internet offers individuals a potentially Utopian medium of human +interaction. The nature of computers and the information stored on +them means that a large file such as a book can be duplicated +practically instantly. When sharing information on the Internet, it is +not limited by the physical limitation of traditional methods. To give +someone a book is either to lose the copy yourself or to obtain or +produce a copy of that book, which can be a difficult process. With +the Internet, however, information can exist in a more absolute state, +separated entirely from any physical media. Millions of people can +download a single book as easily as one person could, and the +traditional limitations that lead us to 'own' individual property no +longer exist. In this way, the Internet eliminates the ownership of +information in whatever forms it perpetuated through the attachment of +information to media such as books or celluloid film, and the copying +of information can take place in its purest state: of literal information, and then being stored as pure information, although on a -physical media such as a hard drive, for all meaningful reasons (due to -the large capacities and low cost of modern drives) unattached to +physical media such as a hard drive, for all meaningful reasons (due +to the large capacities and low cost of modern drives) unattached to anything physical whatsoever. Although this was true for other methods of sharing information, such as through radio broadcasts, information received via the Internet can be easily stored, processed, and @@ -46,7 +48,7 @@ suspicious activity can be flagged and investigated in order to prevent a terror attack or in order to better respond in the case of an attack. Graham describes the extensive use of end to end encryption used by terrorists in order to avoid interception by the authorities. -Due to U.S. usage of intercepted communications to uncover and prevent +Due to US usage of intercepted communications to uncover and prevent a number of al-Qa'ida plots, the terrorist organisation and other terrorist groups have increasingly used encrypted communications (read citation from Graham). An significant factor is the use of @@ -58,13 +60,32 @@ user-friendly software such as the Tails operating system or Telegram (Graham citation 28), terrorists organisations have shown an ability to make use of more obscure and complicated systems, as well as use publicly available source code in order to construct software for -operatives to use. Although the issue of popular messaging -technologies and their support for `end-to-end encryption' is an often -discussed issue. Introduction of end-to-end encryption being -introduced by large companies such as Facebook has raised concern -{conversation facebook} over the potential for usage by criminals and -a lack of ability for Facebook or law enforcement to obtain -conversation between criminals which may be vital in an investigation. +operatives to use. + +Although the issue of popular messaging technologies and their support +for 'end-to-end encryption' is often discussed, the argument that the +introduction of end-to-end encryption by large companies such as +Facebook gives an advantage to criminals {conversation facebook}{home +office} is arguably an entirely invalid one. By preventing the usage +of true end-to-end encryption in industry, we will not be able to +prevent those attempting to evade the law from doing so, as shown in +the case of terrorist organisations who have used more obscure +software in the past and also in the case of the abundance of illegal +acitivity that occurs on the so called dark web in the form of the +trade of drugs and child pornography among others (cite). Instead the +limitation of use of encryption on popular software will only decrease +the privacy of those uninterested in criminal activity and instead +using technology to communicate. In the case of platforms such as +Instagram (which is owned by Facebook) it is quite clear that the vast +majority of communications (cite) will not contain anything illegal +(reword) and that it is these conversations that will suffer from a +lack of encryption. The information exposed by Edward Snowden in 2013 +demonstrates that the US government has processed and collected vast +amounts of unencrypted data (cite) and likely continues to do so. In +the case of unencrypted messaging the problem remains and preventing +end to end encryption will simply allow governments to maintain the +status quo of being able to intercept and read all communications +between its citizens and individuals outside of their jurisdictions. Concerns exist with digital technologies on at a hardware level. The Intel Management Engine that exists {Intel Management} @@ -58,3 +58,9 @@ %D June 2016 %J CTC Sentinel %O https://ctc.usma.edu/how-terrorists-use-encryption/ (Accessed 22 January 2022) + +%T International statement: End-to-end encryption and public safety +%A Home_Office +%D Oct 2020 +%O https://www.gov.uk/government/publications/international-statement-end-to-end-encryption-and-public-safety +(Accessed 29 January 2021) |
