diff options
| author | root <root@turin.home> | 2022-02-26 15:44:39 +0000 |
|---|---|---|
| committer | root <root@turin.home> | 2022-03-07 11:35:34 +0000 |
| commit | d915196f3c57d86e47675035aafbf82216efe745 (patch) | |
| tree | d112d6e5cc47dfd833c9391e4653f766df464752 /paper.ms | |
| parent | 185b30a2b70471422fcf26e8fb433458c691e1d4 (diff) | |
Todos and citations.
Diffstat (limited to 'paper.ms')
| -rw-r--r-- | paper.ms | 27 |
1 files changed, 19 insertions, 8 deletions
@@ -15,7 +15,7 @@ decrypted without the necessary keys, which in the case of RSA is ensured by the large primes involved and the current intractability of large prime factorisation. This allows for communication that is practically guaranteed to be private: a relatively new phenomenon in -communications, seen with inventions such as the one-tme pad (cite) +communications, seen with inventions such as the one-tme pad {Rijmenants} (cite) which was cryptographically secure and used by the both the KGB and NSA (cite), beyond the use of the Enigma and Lorentz machines by the Nazis which were both of which were decrypted by cryptanalysis methods @@ -104,7 +104,7 @@ prevent those attempting to evade the law from doing so, as shown in the case of terrorist organisations who have used more obscure software in the past and also in the case of the abundance of illegal activity that occurs on the so called dark web in the form of the -trade of drugs and child pornography among others (cite). Instead the +trade of drugs and child pornography among others {gulati deep web}. Instead the limitation of use of encryption on popular software will only decrease the privacy of those uninterested in criminal activity and instead using technology to communicate. In the case of platforms such as @@ -113,8 +113,8 @@ majority of communications (cite) will not contain anything illegal (reword) and that it is these conversations that will suffer from a lack of encryption. The information exposed by Edward Snowden in 2013 demonstrates that the US government has processed and collected vast -amounts of unencrypted data (cite) and likely continues to do so. In -the case of unencrypted messaging the problem remains and preventing +amounts of unencrypted data (cite) and possibly continues to do so. In +the case of unencrypted communication the problem remains and preventing end to end encryption will simply allow governments to maintain the status quo of being able to intercept and read all communications between its citizens and individuals outside of their jurisdictions. @@ -235,8 +235,15 @@ been in China, where the government has unparalleled control over the flow of information over the internet. This has allowed the filtering of content, prevention from accessing sites, and the blocking of the anonymity network Tor which would allow users to circumvent measures -put in place by the government {firewall} (cite for Tor). (research?: -would such measures even work in western world?) +put in place by the government {firewall}{talbot tor china}{winter +china tor} Whether such draconian measures could even be implemented +in the more democratic West is questionable, but the opportunity +clearly exists for governments to undermine the digital privacy of its +citizens. Any such measures, however, will face scrutiny from the +media and public in Western society and thereby open software such as +Tor is used to share significant amounts of information away from the +observation of law enforcement, allowing illegal activity to occur +{gulati}. In addition, the rate of development in unconventional computing methods is increasing rapidly. Effective quantum computing will @@ -274,7 +281,9 @@ the US and in China {quantum research in china}. Both in the US at Google {google supremacy nature} and in China {china quantum advantage}{science photons quantum advantage}. -(Is discussion on this useful?) +The question must be asked as to whether the discussion of encryption +and surveillance is necessary. + Individuals around the world have clearly expressed interest in matters of privacy and encryption (cite) and open source software allows those with the technical skills to become involved in the @@ -332,7 +341,9 @@ relating to mass surveillance and mishandling of data such as the 2013 Edward Snowden releases and the 2018 Facebook-Cambridge Analytica scandal ought to also be potentially considered a shock, not a surprise given the level of data that both governments and private -organisations have access to and responsibility for. +organisations have access to and responsibility for. Encryption +enables people to trust that their data that they wish to be private +truly is and allows .nr HY 0 .ad l |
