aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorroot <root@turin.home>2022-02-26 15:44:39 +0000
committerroot <root@turin.home>2022-03-07 11:35:34 +0000
commitd915196f3c57d86e47675035aafbf82216efe745 (patch)
treed112d6e5cc47dfd833c9391e4653f766df464752
parent185b30a2b70471422fcf26e8fb433458c691e1d4 (diff)
Todos and citations.
-rw-r--r--formatting.ms10
-rw-r--r--header.html3
-rwxr-xr-xmake4
-rw-r--r--paper.ms27
-rw-r--r--refer46
5 files changed, 61 insertions, 29 deletions
diff --git a/formatting.ms b/formatting.ms
index 55532a0..201ddf6 100644
--- a/formatting.ms
+++ b/formatting.ms
@@ -1,15 +1,15 @@
-.nr LL 5.00i
-.nr PO 1.65i
+.nr LL 5.15i
+.nr PO 1.60i
.\" top margin
-.nr HM 1.0i
+.nr HM 1.25i
.\" bottom margin
-.nr FM 1.0i
+.nr FM 1.25i
.\" header/footer width
.nr LT \n[LL]
.\" point size
.nr PS 11pt
.\" line height
-.nr VS 14p
+.nr VS 15p
.\" paragraph indent
.\" .nr PI 0m
.\" interparagraph space
diff --git a/header.html b/header.html
index 2aa6d9b..52234c4 100644
--- a/header.html
+++ b/header.html
@@ -4,9 +4,10 @@
html {
line-height: 1.5;
font-family: serif;
+ font-size: 1.1rem;
color: #1a1a1a;
background-color: #fdfdfd;
- max-width: 70ch;
+ max-width: 80ch;
margin: auto;
}
body{margin-top:10%}
diff --git a/make b/make
index b898fff..15b35d4 100755
--- a/make
+++ b/make
@@ -18,9 +18,9 @@ cat paper.ms|\
# awk '{printf "%s%s", $0, (/)$/ ? "" : ORS)}' |\
cat formatting.ms target/temp |\
groff -Eket -Tpdf -ms -P-pa4 > target/paper.pdf
-groff -E -Thtml -ms target/temp |\
+groff -Eket -Thtml -ms target/temp |\
sed -E "s|([^\"\'\>=])(http[s]?://[^[:space:]]*)|\1<a href=\2>\2</a>|g" |\
sed -E "s|^(http[s]?://[^[:space:]]*)|<a href=\1>\1</a>|g" |\
sed "1,6d" > target/temp2
cat header.html target/temp2 |\
- sed -E '35 i <a href="./paper.pdf">See this document as a pdf</a><br>'> target/paper.html
+ sed -E '36 i <a href="./paper.pdf">See this document as a pdf</a><br>'> target/paper.html
diff --git a/paper.ms b/paper.ms
index 3f107ac..73af97c 100644
--- a/paper.ms
+++ b/paper.ms
@@ -15,7 +15,7 @@ decrypted without the necessary keys, which in the case of RSA is
ensured by the large primes involved and the current intractability of
large prime factorisation. This allows for communication that is
practically guaranteed to be private: a relatively new phenomenon in
-communications, seen with inventions such as the one-tme pad (cite)
+communications, seen with inventions such as the one-tme pad {Rijmenants} (cite)
which was cryptographically secure and used by the both the KGB and
NSA (cite), beyond the use of the Enigma and Lorentz machines by the
Nazis which were both of which were decrypted by cryptanalysis methods
@@ -104,7 +104,7 @@ prevent those attempting to evade the law from doing so, as shown in
the case of terrorist organisations who have used more obscure
software in the past and also in the case of the abundance of illegal
activity that occurs on the so called dark web in the form of the
-trade of drugs and child pornography among others (cite). Instead the
+trade of drugs and child pornography among others {gulati deep web}. Instead the
limitation of use of encryption on popular software will only decrease
the privacy of those uninterested in criminal activity and instead
using technology to communicate. In the case of platforms such as
@@ -113,8 +113,8 @@ majority of communications (cite) will not contain anything illegal
(reword) and that it is these conversations that will suffer from a
lack of encryption. The information exposed by Edward Snowden in 2013
demonstrates that the US government has processed and collected vast
-amounts of unencrypted data (cite) and likely continues to do so. In
-the case of unencrypted messaging the problem remains and preventing
+amounts of unencrypted data (cite) and possibly continues to do so. In
+the case of unencrypted communication the problem remains and preventing
end to end encryption will simply allow governments to maintain the
status quo of being able to intercept and read all communications
between its citizens and individuals outside of their jurisdictions.
@@ -235,8 +235,15 @@ been in China, where the government has unparalleled control over the
flow of information over the internet. This has allowed the filtering
of content, prevention from accessing sites, and the blocking of the
anonymity network Tor which would allow users to circumvent measures
-put in place by the government {firewall} (cite for Tor). (research?:
-would such measures even work in western world?)
+put in place by the government {firewall}{talbot tor china}{winter
+china tor} Whether such draconian measures could even be implemented
+in the more democratic West is questionable, but the opportunity
+clearly exists for governments to undermine the digital privacy of its
+citizens. Any such measures, however, will face scrutiny from the
+media and public in Western society and thereby open software such as
+Tor is used to share significant amounts of information away from the
+observation of law enforcement, allowing illegal activity to occur
+{gulati}.
In addition, the rate of development in unconventional computing
methods is increasing rapidly. Effective quantum computing will
@@ -274,7 +281,9 @@ the US and in China {quantum research in china}. Both in the US at
Google {google supremacy nature} and in China {china quantum
advantage}{science photons quantum advantage}.
-(Is discussion on this useful?)
+The question must be asked as to whether the discussion of encryption
+and surveillance is necessary.
+
Individuals around the world have clearly expressed interest in
matters of privacy and encryption (cite) and open source software
allows those with the technical skills to become involved in the
@@ -332,7 +341,9 @@ relating to mass surveillance and mishandling of data such as the 2013
Edward Snowden releases and the 2018 Facebook-Cambridge Analytica
scandal ought to also be potentially considered a shock, not a
surprise given the level of data that both governments and private
-organisations have access to and responsibility for.
+organisations have access to and responsibility for. Encryption
+enables people to trust that their data that they wish to be private
+truly is and allows
.nr HY 0
.ad l
diff --git a/refer b/refer
index c8ab15c..e4e418c 100644
--- a/refer
+++ b/refer
@@ -74,16 +74,12 @@
%D 2014
%J Bulletin of the German Historical Institute
%C German Historical Institute Washington DC
-%O https://www.ghi-dc.org/fileadmin/publications/Bulletin_Supplement/Supplement_9/supp9.pdf
-(Accessed 3rd January 2022)
%T Participatory Repression? Reflections on Popular Involvement with the Stasi
%A Gary Bruce
%D 2014
%J Bulletin of the German Historical Institute
%C German Historical Institute Washington DC
-%O https://www.ghi-dc.org/fileadmin/publications/Bulletin_Supplement/Supplement_9/supp9.pdf
-(Accessed 3rd January 2022)
%T N.S.A. Able to Foil Basic Safeguards of Privacy on Web
%J The New York Times
@@ -114,23 +110,20 @@
%A Peter Baker
%D June 2013
%J The New York Times
-%O https://www.nytimes.com/2013/06/07/us/nsa-verizon-calls.html
-(Accessed 17th February 2022)
+%O Accessed online on 17th February 2022
%T NSA collecting phone records of millions of Verizon customers daily
%A Glenn Greenwald
%D June 2013
%J The Guardian
-%O https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order
-(Accessed 17th February 2022)
+%O Accessed online on 17th February 2022
%T Anger swells after NSA phone records court order revelations
%J The Guardian
%D June 2013
%A Dan Roberts
%A Spencer Ackerman
-%O https://www.theguardian.com/world/2013/jun/06/obama-administration-nsa-verizon-records
-(Accessed 17th February 2022)
+%O Accessed online on 17th February 2022
-- lawmaking
@@ -138,8 +131,7 @@
%J The Register
%D Feb 2022
%A Agam Shah
-%O https://www.theregister.com/2022/02/05/us_house_passes_america_competes/
-(Accessed 6th February 2022)
+%O Accessed online on 6th February 2022
%A H.R.3773
%T 110th Congress (2007-2008): FISA Amendments Act of 2008
@@ -177,6 +169,12 @@
%O https://www.nytimes.com/2018/01/03/business/computer-flaws.html
(Accessed 7th February 2022)
+%T One-time Pad
+%A Dirk Rijmenants
+%D date unknown
+%O https://www.ciphermachinesandcryptology.com/en/onetimepad.htm
+(Accessed 26th February 2022)
+
-- quantum
%T Report on Post-Quantum Cryptography
@@ -219,7 +217,7 @@
%T Quantum computational advantage using photons
%A Han-Sen Zhong^et^al
%D 2020
-%G DOI: 10.1126/science.abe8770
+%O DOI: 10.1126/science.abe8770
%T Google Claims To Achieve Quantum Supremacy — IBM Pushes Back
%J NPR
@@ -227,3 +225,25 @@
%A Paolo Zialcita
%O https://www.npr.org/2019/10/23/772710977/google-claims-to-achieve-quantum-supremacy-ibm-pushes-back .
+
+%T The Hidden Truth Anonymity in Cyberspace: Deep Web
+%D 2018
+%A Saksham Gulati
+%A Shilpi Sharma
+%A Garima Agarwal
+%J Advances in Intelligent Systems and Computing
+%V 673
+%P 719–730
+%O DOI: 10.1007/978-981-10-7245-1_70
+
+%T China Cracks Down on Tor Anonymity Network
+%A David Talbot
+%D Oct 2009
+%J MIT Technology Review
+
+%T How China Is Blocking Tor
+%A Philipp Winter
+%A Stefan Lindskog
+%J Karlstad University
+%G arXiv:1204.0447 [cs.CR]
+%D Apr 2012