diff options
| author | root <root@turin.home> | 2022-02-26 15:44:39 +0000 |
|---|---|---|
| committer | root <root@turin.home> | 2022-03-07 11:35:34 +0000 |
| commit | d915196f3c57d86e47675035aafbf82216efe745 (patch) | |
| tree | d112d6e5cc47dfd833c9391e4653f766df464752 | |
| parent | 185b30a2b70471422fcf26e8fb433458c691e1d4 (diff) | |
Todos and citations.
| -rw-r--r-- | formatting.ms | 10 | ||||
| -rw-r--r-- | header.html | 3 | ||||
| -rwxr-xr-x | make | 4 | ||||
| -rw-r--r-- | paper.ms | 27 | ||||
| -rw-r--r-- | refer | 46 |
5 files changed, 61 insertions, 29 deletions
diff --git a/formatting.ms b/formatting.ms index 55532a0..201ddf6 100644 --- a/formatting.ms +++ b/formatting.ms @@ -1,15 +1,15 @@ -.nr LL 5.00i -.nr PO 1.65i +.nr LL 5.15i +.nr PO 1.60i .\" top margin -.nr HM 1.0i +.nr HM 1.25i .\" bottom margin -.nr FM 1.0i +.nr FM 1.25i .\" header/footer width .nr LT \n[LL] .\" point size .nr PS 11pt .\" line height -.nr VS 14p +.nr VS 15p .\" paragraph indent .\" .nr PI 0m .\" interparagraph space diff --git a/header.html b/header.html index 2aa6d9b..52234c4 100644 --- a/header.html +++ b/header.html @@ -4,9 +4,10 @@ html { line-height: 1.5; font-family: serif; + font-size: 1.1rem; color: #1a1a1a; background-color: #fdfdfd; - max-width: 70ch; + max-width: 80ch; margin: auto; } body{margin-top:10%} @@ -18,9 +18,9 @@ cat paper.ms|\ # awk '{printf "%s%s", $0, (/)$/ ? "" : ORS)}' |\ cat formatting.ms target/temp |\ groff -Eket -Tpdf -ms -P-pa4 > target/paper.pdf -groff -E -Thtml -ms target/temp |\ +groff -Eket -Thtml -ms target/temp |\ sed -E "s|([^\"\'\>=])(http[s]?://[^[:space:]]*)|\1<a href=\2>\2</a>|g" |\ sed -E "s|^(http[s]?://[^[:space:]]*)|<a href=\1>\1</a>|g" |\ sed "1,6d" > target/temp2 cat header.html target/temp2 |\ - sed -E '35 i <a href="./paper.pdf">See this document as a pdf</a><br>'> target/paper.html + sed -E '36 i <a href="./paper.pdf">See this document as a pdf</a><br>'> target/paper.html @@ -15,7 +15,7 @@ decrypted without the necessary keys, which in the case of RSA is ensured by the large primes involved and the current intractability of large prime factorisation. This allows for communication that is practically guaranteed to be private: a relatively new phenomenon in -communications, seen with inventions such as the one-tme pad (cite) +communications, seen with inventions such as the one-tme pad {Rijmenants} (cite) which was cryptographically secure and used by the both the KGB and NSA (cite), beyond the use of the Enigma and Lorentz machines by the Nazis which were both of which were decrypted by cryptanalysis methods @@ -104,7 +104,7 @@ prevent those attempting to evade the law from doing so, as shown in the case of terrorist organisations who have used more obscure software in the past and also in the case of the abundance of illegal activity that occurs on the so called dark web in the form of the -trade of drugs and child pornography among others (cite). Instead the +trade of drugs and child pornography among others {gulati deep web}. Instead the limitation of use of encryption on popular software will only decrease the privacy of those uninterested in criminal activity and instead using technology to communicate. In the case of platforms such as @@ -113,8 +113,8 @@ majority of communications (cite) will not contain anything illegal (reword) and that it is these conversations that will suffer from a lack of encryption. The information exposed by Edward Snowden in 2013 demonstrates that the US government has processed and collected vast -amounts of unencrypted data (cite) and likely continues to do so. In -the case of unencrypted messaging the problem remains and preventing +amounts of unencrypted data (cite) and possibly continues to do so. In +the case of unencrypted communication the problem remains and preventing end to end encryption will simply allow governments to maintain the status quo of being able to intercept and read all communications between its citizens and individuals outside of their jurisdictions. @@ -235,8 +235,15 @@ been in China, where the government has unparalleled control over the flow of information over the internet. This has allowed the filtering of content, prevention from accessing sites, and the blocking of the anonymity network Tor which would allow users to circumvent measures -put in place by the government {firewall} (cite for Tor). (research?: -would such measures even work in western world?) +put in place by the government {firewall}{talbot tor china}{winter +china tor} Whether such draconian measures could even be implemented +in the more democratic West is questionable, but the opportunity +clearly exists for governments to undermine the digital privacy of its +citizens. Any such measures, however, will face scrutiny from the +media and public in Western society and thereby open software such as +Tor is used to share significant amounts of information away from the +observation of law enforcement, allowing illegal activity to occur +{gulati}. In addition, the rate of development in unconventional computing methods is increasing rapidly. Effective quantum computing will @@ -274,7 +281,9 @@ the US and in China {quantum research in china}. Both in the US at Google {google supremacy nature} and in China {china quantum advantage}{science photons quantum advantage}. -(Is discussion on this useful?) +The question must be asked as to whether the discussion of encryption +and surveillance is necessary. + Individuals around the world have clearly expressed interest in matters of privacy and encryption (cite) and open source software allows those with the technical skills to become involved in the @@ -332,7 +341,9 @@ relating to mass surveillance and mishandling of data such as the 2013 Edward Snowden releases and the 2018 Facebook-Cambridge Analytica scandal ought to also be potentially considered a shock, not a surprise given the level of data that both governments and private -organisations have access to and responsibility for. +organisations have access to and responsibility for. Encryption +enables people to trust that their data that they wish to be private +truly is and allows .nr HY 0 .ad l @@ -74,16 +74,12 @@ %D 2014 %J Bulletin of the German Historical Institute %C German Historical Institute Washington DC -%O https://www.ghi-dc.org/fileadmin/publications/Bulletin_Supplement/Supplement_9/supp9.pdf -(Accessed 3rd January 2022) %T Participatory Repression? Reflections on Popular Involvement with the Stasi %A Gary Bruce %D 2014 %J Bulletin of the German Historical Institute %C German Historical Institute Washington DC -%O https://www.ghi-dc.org/fileadmin/publications/Bulletin_Supplement/Supplement_9/supp9.pdf -(Accessed 3rd January 2022) %T N.S.A. Able to Foil Basic Safeguards of Privacy on Web %J The New York Times @@ -114,23 +110,20 @@ %A Peter Baker %D June 2013 %J The New York Times -%O https://www.nytimes.com/2013/06/07/us/nsa-verizon-calls.html -(Accessed 17th February 2022) +%O Accessed online on 17th February 2022 %T NSA collecting phone records of millions of Verizon customers daily %A Glenn Greenwald %D June 2013 %J The Guardian -%O https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order -(Accessed 17th February 2022) +%O Accessed online on 17th February 2022 %T Anger swells after NSA phone records court order revelations %J The Guardian %D June 2013 %A Dan Roberts %A Spencer Ackerman -%O https://www.theguardian.com/world/2013/jun/06/obama-administration-nsa-verizon-records -(Accessed 17th February 2022) +%O Accessed online on 17th February 2022 -- lawmaking @@ -138,8 +131,7 @@ %J The Register %D Feb 2022 %A Agam Shah -%O https://www.theregister.com/2022/02/05/us_house_passes_america_competes/ -(Accessed 6th February 2022) +%O Accessed online on 6th February 2022 %A H.R.3773 %T 110th Congress (2007-2008): FISA Amendments Act of 2008 @@ -177,6 +169,12 @@ %O https://www.nytimes.com/2018/01/03/business/computer-flaws.html (Accessed 7th February 2022) +%T One-time Pad +%A Dirk Rijmenants +%D date unknown +%O https://www.ciphermachinesandcryptology.com/en/onetimepad.htm +(Accessed 26th February 2022) + -- quantum %T Report on Post-Quantum Cryptography @@ -219,7 +217,7 @@ %T Quantum computational advantage using photons %A Han-Sen Zhong^et^al %D 2020 -%G DOI: 10.1126/science.abe8770 +%O DOI: 10.1126/science.abe8770 %T Google Claims To Achieve Quantum Supremacy — IBM Pushes Back %J NPR @@ -227,3 +225,25 @@ %A Paolo Zialcita %O https://www.npr.org/2019/10/23/772710977/google-claims-to-achieve-quantum-supremacy-ibm-pushes-back . + +%T The Hidden Truth Anonymity in Cyberspace: Deep Web +%D 2018 +%A Saksham Gulati +%A Shilpi Sharma +%A Garima Agarwal +%J Advances in Intelligent Systems and Computing +%V 673 +%P 719–730 +%O DOI: 10.1007/978-981-10-7245-1_70 + +%T China Cracks Down on Tor Anonymity Network +%A David Talbot +%D Oct 2009 +%J MIT Technology Review + +%T How China Is Blocking Tor +%A Philipp Winter +%A Stefan Lindskog +%J Karlstad University +%G arXiv:1204.0447 [cs.CR] +%D Apr 2012 |
