aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorroot <root@turin.home>2022-03-06 00:00:30 +0000
committerroot <root@turin.home>2022-03-06 00:00:30 +0000
commit9bd5954621df161652a8ea63fad8d8cf216ea543 (patch)
tree9a44a9346e7a67d21f91977c2da6018c24c2bdd9
parent5b9185cf3fb178999fdec96d1d6e012afa0790b1 (diff)
Adding on quantum. Editing. 3500 words.
-rw-r--r--formatting.ms2
-rwxr-xr-xmake3
-rw-r--r--paper.ms86
-rw-r--r--refer30
4 files changed, 93 insertions, 28 deletions
diff --git a/formatting.ms b/formatting.ms
index 201ddf6..f19df16 100644
--- a/formatting.ms
+++ b/formatting.ms
@@ -33,4 +33,4 @@
.fzoom CR 750
.fzoom CB 900
.rm CH
-.nr HY 0
+.nr HY 14
diff --git a/make b/make
index 439460f..234ceee 100755
--- a/make
+++ b/make
@@ -13,9 +13,6 @@ cat paper.ms|\
sed "s/)(?!.*\.)/) /g" |\
perl -0pe 's/\nREMOVEME//g' |\
tr "^" " "> target/temp
-#sed -E "s|([^\"\'\>=])(http[s]?://[^[:space:]]*)|\1\n.pdfhref W -D \"\2\" -A -- \2\n|g" |\
-#sed -E "s|([^\"\'\>=])(http[s]?://[^[:space:]]*)|\1\n.pdfhref W \2\n|g"
-# awk '{printf "%s%s", $0, (/)$/ ? "" : ORS)}' |\
cat formatting.ms target/temp |\
groff -Eket -Tpdf -ms -P-pa4 > target/paper.pdf
groff -Eket -Thtml -ms target/temp |\
diff --git a/paper.ms b/paper.ms
index d326b73..1824926 100644
--- a/paper.ms
+++ b/paper.ms
@@ -106,11 +106,8 @@ activity that occurs on the so called dark web in the form of the
trade of drugs and child pornography among others {gulati deep web}. Instead the
limitation of use of encryption on popular software will only decrease
the privacy of those uninterested in criminal activity and instead
-using technology to communicate. In the case of platforms such as
-Instagram (which is owned by Facebook) it is quite clear that the vast
-majority of communications (cite) will not contain anything illegal
-(reword) and that it is these conversations that will suffer from a
-lack of encryption. The information exposed by Edward Snowden in 2013
+using technology to communicate.
+The information exposed by Edward Snowden in 2013
demonstrates that the US government has processed and collected vast
amounts of unencrypted data (cite) and possibly continues to do so. In
the case of unencrypted communication the problem remains and preventing
@@ -229,14 +226,21 @@ metadata (cite?) may no longer be effective, thereby potentially
preventing such investigation to occur. For governments, this is
arguably the result of such heavy surveillance in the first place.
It is clear that knowledge such as the 2013 Snowden leaks had an impact
-on the public (cite), and that people are therby more interested in
-their privacy and preventing surveillance. The exception to this has
-been in China, where the government has unparalleled control over the
+on the public (cite), and people are therby more interested in
+their privacy and preventing surveillance. Around the world
+individuals use tools to increase their privacy and anonymity when
+using the internet, as well as to overcome censorship of information
+by governments. A major exception to the availability of the free
+Internet has been
+China, where the government has unparalleled control over the
flow of information over the internet. This has allowed the filtering
of content, prevention from accessing sites, and the blocking of the
anonymity network Tor which would allow users to circumvent measures
put in place by the government {firewall}{talbot tor china}{winter
-china tor} Whether such draconian measures could even be implemented
+china tor}. Measures in China have enabled the government to tightly
+control and monitor the flow of information via the Internet; ensuring
+that citizens can only access that which the ruling part should allow.
+Whether such draconian measures could even be implemented
in the more democratic West is questionable, but the opportunity
clearly exists for governments to undermine the digital privacy of its
citizens. Any such measures, however, will face scrutiny from the
@@ -247,8 +251,8 @@ observation of law enforcement, allowing illegal activity to occur
In addition, the rate of development in unconventional computing
methods is increasing rapidly. Effective quantum computing will
-mean that existing popular cryptographic algorithms such as RSA, which
-is used for communications and digital signatures, would no longer be
+result in existing popular cryptographic algorithms such as IRSA, which
+is used for communications and digital signatures, no longer being
secure {lily chen quantum}.
Significant research such as at IBM in recent years (cite) has shown
feasibility in current ideas surrounding quantum computing and
@@ -262,19 +266,49 @@ will be made by those implementing cryptography, both in the open
source space and in industry, as well as in government where
government agencies must act in order to protect their data. This
change will take place naturally and many have already started to
-consider methods for `post-quantum cryptography' {nist alagic}. The
-significant factor however will be regulatory responses to
-post-quantum cryptographic methods.
+consider methods for post-quantum cryptography {nist alagic}.
+Regulatory considerations about post-quantum cryptography are already
+being made and arguments can be made that regulation should be written
+that institutes standards and requirements in order to prepare for a
+future with effective quantum computing {bruno post quantum}. Once
+more, however an issue reveals itself with the speed of regulatory
+change and the progress of technology. Changes will likely be made by
+open software in order to maintain secure encryption, such as those
+used by the open source web servers to encrypt Interet traffic, as
+well as by large corporations such as Microsoft which provides
+software used by many businesses and individuals. An issue may exist
+in software that is less popular and legacy software which may not be
+open to the scrutiny of open software and may lead to
+vulnerabilities. Furthermore, the usage of post-quantum cryptography
+by the public and the potential that it may help terrorists and
+criminals to communicate might not be addressed in a significant way.
+The issue of regulation being insufficient may further be realised by
+post-quantum cryptography due to its open nature: the US National
+Institute of Standards and Technology (NIST) made a public request for
+nominations of post-quantum cryptographic algorithms (cite), leading
+to standards that will clearly influence future lawmaking (cite).
+(reword last few sentences) This adoption of open processes and the
+open auditing and implementation of future cryptographic standards is
+most striking when compared with the \fIDual_EC_DRBG\fR algorithm.
+This algorithm, which contained a vulnerability was included in NIST
+standards. This vulnerability allowed the NSA to potentially decrypt
+Internet traffic such as emails (cite). The NSA also allegedly paid
+the firm RSA Security in order to implement the algorith with backdoor in its
+popular security products {menn nsa contract} and although the NSA
+denies wrongdoing there was clearly NSA involvement with the company
+that remains significant in the enterprise security space {goodin rsa
+denial}{perlroth government}.
- https://www.natlawreview.com/article/preparing-post-quantum-migration-race-to-save-internet
- https://universitypress.unisob.na.it/ojs/index.php/ejplt/article/download/1225/665
- https://universitypress.unisob.na.it/ojs/index.php/ejplt/index
- https://www.meritalk.com/articles/reps-khanna-mace-developing-quantum-computing-bill-to-secure-fed-data/ .
+Dual EC DRBG
+ !! https://wikiless.org/wiki/Dual_EC_DRBG
+ https://www.reuters.com/article/us-usa-security-rsa-idUSBRE9BJ1C220131220
+ https://web.archive.org/web/20131223121638/http://blogs.rsa.com/news-media-2/rsa-response/
-Once more, the significant research is occurring as aforementioned in
+Significant research is occurring as aforementioned in
the US and in China {quantum research in china}. Both in the US at
Google {google supremacy nature} and in China {china quantum
-advantage}{science photons quantum advantage}.
+advantage}{science photons quantum advantage} at a university claims
+of `quantum supremacy' have been made.
The question must be asked as to whether the discussion of encryption
and surveillance is necessary.
@@ -373,9 +407,8 @@ Government
https://archive.nytimes.com/www.nytimes.com/interactive/2013/09/05/us/documents-reveal-nsa-campaign-against-encryption.html
https://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption
https://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html
- !! https://wikiless.org/wiki/Dual_EC_DRBG
- https://www.reuters.com/article/us-usa-security-rsa-idUSBRE9BJ1C220131220
- https://web.archive.org/web/20131223121638/http://blogs.rsa.com/news-media-2/rsa-response/
+
+
https://www.technologyreview.com/2012/04/04/186902/how-china-blocks-the-tor-anonymity-network/
https://www.nytimes.com/2016/09/03/technology/nso-group-how-spy-tech-firms-let-governments-see-everything-on-a-smartphone.html
Leahy Law
@@ -404,4 +437,9 @@ Surveillance
crowd supply boosts open hardware: linux magazine
-{firewall}
+https://ooni.org/post/2021-italy-blocks-gutenberg-book-publishing-website/#findings
+https://ooni.org/post/2021-how-signal-private-messenger-blocked-around-the-world/
+https://ooni.org/post/2021-russia-blocks-tor/
+
+https://www.openrightsgroup.org/
+
diff --git a/refer b/refer
index 55383ed..fc3a797 100644
--- a/refer
+++ b/refer
@@ -244,6 +244,14 @@
%A Angela Robinson
%A Daniel Smith-Tone
+%J European Journal of Privacy Law & Technologies
+%D 2021
+%N 1
+%T Post-quantum encryption and privacy regulation: Can the law keep pace with technology?
+%A Luigi Bruno
+%A Isabella Spano
+%O https://universitypress.unisob.na.it/ojs/index.php/ejplt/article/view/1225
+
%T The Hidden Truth Anonymity in Cyberspace: Deep Web
%D 2018
@@ -280,3 +288,25 @@
%C University of California at Berkeley
%R UCB/EECS-2014-146
%D Aug 2014
+
+
+%T Exclusive: Secret contract tied NSA and security industry pioneer
+%A Joseph Menn
+%J Reuters
+%D Dec 2013
+%O https://www.reuters.com/article/us-usa-security-rsa-idUSBRE9BJ1C220131220
+(Accessed 5 March 2022)
+
+%T RSA issues non-denying denial of NSA deal to favor flawed crypto code
+%J Ars Technica
+%A Dan Goodin
+%D Dec 2013
+%O https://arstechnica.com/information-technology/2013/12/rsa-issues-non-denying-denial-of-nsa-deal-to-favor-flawed-crypto-code/
+(Accessed 5 March 2022)
+
+%T Government Announces Steps to Restore Confidence on Encryption Standards
+%A Nicole Perlroth
+%D September 2013
+%J The New York Times
+%O https://bits.blogs.nytimes.com/2013/09/10/government-announces-steps-to-restore-confidence-on-encryption-standards/
+(Accessed 5 March 2022)