aboutsummaryrefslogtreecommitdiff
path: root/paper.ms
diff options
context:
space:
mode:
authorroot <root@pi.home>2022-02-16 02:26:48 +0000
committerroot <root@pi.home>2022-02-16 02:26:48 +0000
commit28d2028002a9c578e056928d1458d10f3fc95127 (patch)
treeaf4e749c55c625a05715e54fc52787ec02283aca /paper.ms
parent232350106e4ffac05dac05e17c2c1f2733bd2e89 (diff)
Linking open technology to surveillance. 2700 words.
Diffstat (limited to 'paper.ms')
-rw-r--r--paper.ms12
1 files changed, 11 insertions, 1 deletions
diff --git a/paper.ms b/paper.ms
index 53ecfaa..21790bd 100644
--- a/paper.ms
+++ b/paper.ms
@@ -194,7 +194,17 @@ agencies and counterterrorism forces. The tools of mass surveillance
that once enabled investigation into crime or terror such as reading
messages/emails, listening to calls, tracking location, or analysing
metadata (cite?) may no longer be effective, thereby potentially
-preventing such investigation to occur.
+preventing such investigation to occur. For governments, this is
+arguably the result of such heavy surveillance in the first place.
+It's clear that knowledge such as the 2013 Snowden leaks had an impact
+on the public (cite), and that people are therby more interested in
+their privacy and preventing surveillance. The exception to this has
+been in China, where the government has unparalleled control over the
+flow of information over the internet. This has allowed the filtering
+of content, prevention from accessing sites, and the blocking of the
+anonymity network Tor which would allow users to circumvent measures
+put in place by the government {firewall} (cite for Tor). (research:
+would such measures even work in western world?)
In addition, the rate of development in unconventional computing
methods is increasing rapidly. Effective quantum computing will