diff options
| author | root <root@turin.home> | 2022-03-22 23:39:41 +0000 |
|---|---|---|
| committer | root <root@turin.home> | 2022-03-22 23:39:41 +0000 |
| commit | b6dc7c4e0b04473bf3d68ff2f71dbb2d4dd7d6ca (patch) | |
| tree | a802608b4bc8082d91917c6cfea02cea6d6f1dee | |
| parent | 2ef9c9c104a9f4d78609c0687adf842215fb5a94 (diff) | |
Minor changes, mostly formatting
| -rw-r--r-- | formatting.ms | 5 | ||||
| -rwxr-xr-x | make | 3 | ||||
| -rw-r--r-- | paper.ms | 34 |
3 files changed, 22 insertions, 20 deletions
diff --git a/formatting.ms b/formatting.ms index 7be9eda..818cbf7 100644 --- a/formatting.ms +++ b/formatting.ms @@ -29,8 +29,9 @@ .\" page numbers in footer, centered .rm CH .ds CF % -.ds FAM Sabon +.ds FAM SabonU .fzoom CR 750 .fzoom CB 900 .rm CH -.nr HY 14 +.nr HY 0 +.pdfinfo /Author "Mohit Agarwal" @@ -11,8 +11,9 @@ cat paper.ms|\ grep -v "^\.lf" |\ sed "s/\ \ (/ (/g"|\ sed "s/)(?!.*\.)/) /g" |\ - perl -0pe 's/\nREMOVEME//g' |\ + grep -v "^REMOVEME" |\ tr "^" " "> target/temp + #perl -0pe 's/\nREMOVEME//g' |\ cat formatting.ms target/temp |\ groff -Eket -Tpdf -ms -P-pa4 > target/paper.pdf groff -Eket -Thtml -ms target/temp |\ @@ -5,9 +5,9 @@ sort .TL Cryptography, crime, terror, and surveillance .AU -\f[TI]Mohit Agarwal +\f[R]Mohit Agarwal .AI -February 2022 +March 2022 .LP Modern encryption methods allow a level of privacy in communication that has not before been seen: information that is encrypted cannot be @@ -135,7 +135,7 @@ surveillance of the authorities. Instead, the level of surveillance that large, secretive groups of individuals once had to carry out in order to enable a surveillance state can be performed instead through bureaucracies and technological methods. In modern times, governments -can operate with a very limited number of operatives `on the ground`, +can operate with a very limited number of operatives 'on the ground', and instead focus attention on the giant amounts of data they have for processing in order to make the findings they intend to: be it crime, terrorism, or - as was the case with the Gestapo and Stasi - descent. @@ -222,7 +222,7 @@ A shift toward open standards reveals a problem for law enforcement agencies and counterterrorism forces. The tools of mass surveillance that once enabled investigation into crime or terror such as reading messages/emails, listening to calls, tracking location, or analysing -metadata (cite?) may no longer be effective, thereby potentially +metadata may no longer be effective, thereby potentially preventing such investigation to occur. For governments, this is arguably the result of such heavy surveillance in the first place. It is clear that knowledge such as the 2013 Snowden leaks had an impact @@ -303,7 +303,10 @@ that remains significant in the enterprise security space {goodin rsa denial}{perlroth government}. The question must be asked as to whether the discussion of encryption -and surveillance is necessary. +and surveillance is necessary. Governments and law enforcement clearly +have alternative methods to direcrlty analysing communications in +order to stop crime or terror which might better respect the privacy +of the general public. Metadata analysis has proved Individuals around the world have clearly expressed interest in matters of privacy and encryption (cite) and open source software @@ -313,8 +316,8 @@ state surveillance. Measures taken by governments to prevent this development will doubtless be limited unless extreme actions such as those seen in China are taken. Otherwise, development will continue to occur in both free and non free societies in support of individual -freedoms. The assertion of "Linus' law" that , "given enough eyeballs, -all bugs are shallow" (cite - CathBaz) creates a serious inability +freedoms. The assertion of \[oq]Linus' law\[cq] that , \[lq]given enough eyeballs, +all bugs are shallow\[rq] (cite - CathBaz) creates a serious inability for actors such as governments to engineer backdoors into software as the NSA previously has (cite) or to prevent the development of software altogether (find example). On the other hand, a significant @@ -369,8 +372,8 @@ processors made after 2018, and are therefore potentially a real threat to security {kocher spectre} The executive summary to the 9/11 Commission Report {#9/11 commission -report} describes the September 2001 terrorist attacks as 'a shock, -not a surprise'. In a similar light, the release of information +report} describes the September 2001 terrorist attacks as \[oq]a shock, +not a surprise\[cq]. In a similar light, the release of information relating to mass surveillance and mishandling of data such as the 2013 Edward Snowden releases ought to also be potentially considered a shock, not a surprise given the level of data that both governments @@ -413,10 +416,6 @@ earlier). .nr HY 0 .ad l -Intro - Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008 - USA FREEDOM Act (2015)(HR 2048) - Cryptography https://wikiless.org/wiki/Kerckhoffs%27s_principle?lang=en Timing Attacks @@ -451,10 +450,6 @@ Government Leahy Law DeadHand and MonsterMind -Terror - September 2001 - 2001 Anthrax attacks - Privacy Apple and App Tracking Transparency https://www.flurry.com/blog/ios-14-5-opt-in-rate-att-restricted-app-tracking-transparency-worldwide-us-daily-latest-update/ @@ -480,3 +475,8 @@ https://ooni.org/post/2021-russia-blocks-tor/ https://www.openrightsgroup.org/ +\[oq]go\[cq] +\[lq]How Terrorists Use Encryption,\[rq] + +TODO : recite bulletin +https://www.ghi-dc.org/publication/stasi-at-home-and-abroad-domestic-order-and-foreign-intelligence |
