aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorroot <root@turin.home>2022-02-06 21:51:32 +0000
committerroot <root@turin.home>2022-02-06 21:51:32 +0000
commitea62f14753f24cfd81c94b3f967abfc153f0294d (patch)
tree96df65347d61b9cf55b21920730bc1c42b5e5973
parent2b747d8059afe9a65a6d3741320fa25c15990211 (diff)
Expanding on Intel Management Engine.
-rw-r--r--README.md2
-rw-r--r--paper.ms37
-rw-r--r--refer29
3 files changed, 57 insertions, 11 deletions
diff --git a/README.md b/README.md
index 7d9fce8..3770f27 100644
--- a/README.md
+++ b/README.md
@@ -4,4 +4,4 @@ Currently work in progress
View as webpage <https://mohit.uk/git-bin/epq/paper.html>
-View as pdf <https://mohit.uk/git-bin/epq/paper.html>
+View as pdf <https://mohit.uk/git-bin/epq/paper.pdf>
diff --git a/paper.ms b/paper.ms
index 347debd..ddc0340 100644
--- a/paper.ms
+++ b/paper.ms
@@ -1,3 +1,7 @@
+.R1
+short-label D.y
+sort spec
+.R2
.TL
Title
.AU
@@ -10,6 +14,10 @@ A problem (instability), a solution
is this a fair question to argue
define objectives
+.br
+How should we deal with encryption?
+.br
+What does the future hold for encryption?
topic sentences?
@@ -48,8 +56,8 @@ An argument is often made against digital privacy in the interest of
national security. With access to communications and usage history law
enforcement and government can quickly discover large amounts of
information useful in a criminal investigation or in preventing
-criminal activity. Graham explores the use of encryption by terrorists
-{CTC terrorists} which is often cited in a reason for giving
+criminal activity. Graham{#CTC terrorists} explores the use of
+encryption by terrorists which is often cited in a reason for giving
governments access to unencrypted Internet communications so that
suspicious activity can be flagged and investigated in order to
prevent a terror attack or in order to better respond in the case of
@@ -140,11 +148,26 @@ provide them with the ability to access information directly from the
target's hardware rather than having to intercept information in
transit. This would go for other hardware vendors such as AMD or ARM
also. Whether or not companies such as Intel would open backdoors to
-governments is up for debate, however we are aware that authorities
-have requested backdoor access from hardware manufacturers in the past
-(cite). Nonetheless, the potential exists for systems built into
-non-open hardware which most people, even those using open software
-use.
+governments is up for debate, however we are aware that in the case of
+the Intel Management there was potentially an ability for it to be
+disabled by US government authorities such as the NSA, demonstrating a
+level of leverage the US government potentially has over organisations
+including but not limited to Intel {register kill switch}{intel me
+bleepingcomputer}.
+Regardless of the level of influence governments might or
+might not hold over private corporations, the potential exists for
+systems built into non-open hardware which most people, even those
+using open software use, leaving them more open to exploitation from
+either state or private actors. Furthermore, there is a visible
+interest in increasing the presence of technologies on the hardware
+level, including the aforementioned Intel Management Engine, the
+Trusted Platform Module (cite), and recently Microsoft's Pluton (cite)
+subsystem, which will be present on hardware sold in the future. This
+variety of hardware within a single computer is a rather interesting
+and potentially worrying development, particularly with the clear
+influence and interest both the US and Chinese governments (cite
+both) are respectively showing (the US and China are the two largest
+chip manufacturers (cite, reword)).
Is discussion on this useful?
Individuals around the world have clearly expressed interest in
diff --git a/refer b/refer
index 173ac1e..e4a0cbe 100644
--- a/refer
+++ b/refer
@@ -71,6 +71,7 @@
%J Bulletin of the German Historical Institute
%C "German Historical Institute Washington DC
%O https://www.ghi-dc.org/fileadmin/publications/Bulletin_Supplement/Supplement_9/supp9.pdf
+(Accessed 3rd January 2022)
%T Participatory Repression? Reflections on Popular Involvement with the Stasi
%A Gary Bruce
@@ -78,6 +79,7 @@
%J Bulletin of the German Historical Institute
%C "German Historical Institute Washington DC
%O https://www.ghi-dc.org/fileadmin/publications/Bulletin_Supplement/Supplement_9/supp9.pdf
+(Accessed 3rd January 2022)
%T N.S.A. Able to Foil Basic Safeguards of Privacy on Web
%J The New York Times
@@ -86,18 +88,39 @@
%A Scott Shane
%D Sep 2013
%O https://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html
-Accessed 3rd February 2022
+(Accessed 3rd February 2022)
%T Photos of an NSA “upgrade” factory show Cisco router getting implant
%A Sean Gallagher
%J Ars Technica
%D May 2014
%O https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/
-Accessed 3rd February 2022
+(Accessed 3rd February 2022)
%T Revealed: The NSA's Secret Campaign to Crack, Undermine Internet Security
%J Pro Publica
%A Jeff Larson
%D Sep 2013
%O https://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption
-Accessed 3rd February 2022
+(Accessed 3rd February 2022)
+
+%T US House passes bill to boost chip manufacturing and R&D
+%J The Register
+%D Feb 2022
+%A Agam Shah
+%O https://www.theregister.com/2022/02/05/us_house_passes_america_competes/?td=keepreading-top
+(Accessed 6th February 2022)
+
+%T Intel ME controller chip has secret kill switch
+%J The Register
+%A Thomas Claburn
+%D Aug 2017
+%O https://www.theregister.com/2017/08/29/intel_management_engine_can_be_disabled/
+(Accessed 6th February 2022)
+
+%T Researchers Find a Way to Disable Much-Hated Intel ME Component Courtesy of the NSA
+%A Catalin Cimpanu
+%J BleepingComputer
+%D Aug 2017
+%O https://www.bleepingcomputer.com/news/hardware/researchers-find-a-way-to-disable-much-hated-intel-me-component-courtesy-of-the-nsa/
+(Accessed 6th February 2022)