diff options
| author | root <root@turin.home> | 2022-02-08 16:24:14 +0000 |
|---|---|---|
| committer | root <root@turin.home> | 2022-02-08 16:24:14 +0000 |
| commit | ab036b410ef57fc650aa0646ec7bf4a500e2d654 (patch) | |
| tree | fb919f4c3ec6596639536f5b8e970118e04779b3 | |
| parent | ea62f14753f24cfd81c94b3f967abfc153f0294d (diff) | |
Rethinking opening. 1900 words.
| -rw-r--r-- | paper.ms | 27 |
1 files changed, 20 insertions, 7 deletions
@@ -13,10 +13,6 @@ A problem (instability), a solution is this a fair question to argue -define objectives -.br -How should we deal with encryption? -.br What does the future hold for encryption? topic sentences? @@ -25,7 +21,7 @@ Ars technica: seek alternate source Symbol, slogan, surprise, salient (sticks out), story -The Internet offers an arguable Utopian communication method. The +The Internet offers an arguably Utopian communication method. The nature of computers and the information stored on them means that data such as a book or film can be duplicated practically instantly. When sharing information on the Internet, the physical limitations of @@ -52,6 +48,25 @@ whereas the internet may be used to present new information by anyone. A key example of this might be Wikipedia. Wikipedia allows individuals to contribute to entries that form a vast encyclopedia. +The way we respond to encryption as a society will clearly be +significant, and the success of government responses to encryption in +relation to issues such as terror and crime are rather significant. A +failure of effective response could allow terrorism to occur in ways +previously unseen, however an overreaction threatens people's civil +liberties and could easily be exploited for reasons other than +prevention of crime and terror. The successes and failures of +government responses can be judged in various ways. + +.IP i. 5 +Have responses stopped a significant amount of crime +.IP ii. 5 +Have responses stopped a significant amount of terror +.IP iii. 5 +Are these responses open to exploitation +.IP iv. 5 +Are these responses to extreme +.PP + An argument is often made against digital privacy in the interest of national security. With access to communications and usage history law enforcement and government can quickly discover large amounts of @@ -206,8 +221,6 @@ prove willing to fund the activities of surveillance agencies. Furthermore, there are options available to authorities that are regularly made use of. (Give example from Graham) -Ms Pluton - {firewall} .nr HY 0 |
