aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--Makefile2
-rw-r--r--formatting.ms2
-rw-r--r--paper.ms66
-rw-r--r--refer25
4 files changed, 89 insertions, 6 deletions
diff --git a/Makefile b/Makefile
index c34c29a..f16c2c0 100644
--- a/Makefile
+++ b/Makefile
@@ -5,7 +5,7 @@ default:
sed "s/^{/.[\n/g" |\
sed "s/}{/\n.]\n.[\n/g" |\
sed "s/{/\n.[\n/g" | sed "s/\}\ /\n.]\n/g" | sed "s/\}/\n.]\n/g" |\
- refer -Ss -p refer | tr "_" " "> target/temp
+ refer -Ss -p refer | tr "^" " "> target/temp
cat formatting.ms target/temp | groff -ket -Tpdf -ms -P-pa4 > target/paper.pdf
html: default
cat header.html > target/paper.html
diff --git a/formatting.ms b/formatting.ms
index c022b8a..1e1deef 100644
--- a/formatting.ms
+++ b/formatting.ms
@@ -35,4 +35,4 @@
.fzoom CR 750
.fzoom CB 900
.rm CH
-.nr HY 1
+.nr HY 14
diff --git a/paper.ms b/paper.ms
index a8b778e..347debd 100644
--- a/paper.ms
+++ b/paper.ms
@@ -3,10 +3,20 @@ Title
.AU
Mohit Agarwal
.AI
-January 2022
+February 2022
.LP
A problem (instability), a solution
+is this a fair question to argue
+
+define objectives
+
+topic sentences?
+
+Ars technica: seek alternate source
+
+Symbol, slogan, surprise, salient (sticks out), story
+
The Internet offers an arguable Utopian communication method. The
nature of computers and the information stored on them means that data
such as a book or film can be duplicated practically instantly. When
@@ -119,11 +129,61 @@ through torrents and access to hidden services over tor are possible
without significant regulation, regulation of encryption may prove
impossible. An arguably useful tool to the authorities does exist in
the hardware and infrastructure that users of the internet rely on.
-Firstly, the vast majority (cite) of users in the forseeable future
+Firstly, the vast majority (cite) of users in the foreseeable future
will continue to use the highly popular CPUs designed by Intel.
Concerns have already been expressed {Intel Management} with regard to
the Intel Management Engine that exists on modern processors produced
-by Intel.
+by Intel. Should governments chose that backdoor access is essential,
+then this presence in hardware around the world alongside an influence
+over Intel (a US based company) to give access to governments may
+provide them with the ability to access information directly from the
+target's hardware rather than having to intercept information in
+transit. This would go for other hardware vendors such as AMD or ARM
+also. Whether or not companies such as Intel would open backdoors to
+governments is up for debate, however we are aware that authorities
+have requested backdoor access from hardware manufacturers in the past
+(cite). Nonetheless, the potential exists for systems built into
+non-open hardware which most people, even those using open software
+use.
+
+Is discussion on this useful?
+Individuals around the world have clearly expressed interest in
+matters of privacy and encryption (cite) and open source software
+allows those with the technical skills to become involved in the
+development of technology that enables strong encryption and avoids
+state surveillance. Measures taken by governments to prevent this
+development will doubtless be limited unless extreme actions such as
+those seen in China are taken. Otherwise, development will continue to
+occur in both free and non free societies in support of individual
+freedoms. The assertion of `Linus' law` that "given enough eyeballs,
+all bugs are shallow" (cite - CathBaz) creates a serious inability
+for actors such as governments to engineer backdoors into software as
+the NSA previously has (cite) or to prevent the development of
+software altogether (find example). On the other hand, a significant
+amount of the software and hardware
+
+The discussion of encryption and related technologies has arguably
+limited impact. State actors such as the NSA will continue to act
+against individual freedoms and attempt to find or introduce backdoors
+in technology that is widely used as part of its actions purportedly
+in the interest of `national security`. Although public reactions to
+information such as the 2013 Edward Snowden releases have been very
+strong, they have not had significant effects on legislature, the
+funding received by the NSA, and quite possibly the level of
+surveillance carried out by the NSA (cite all). Thus, from recent
+history, discussions in public or private spheres are unlikely to
+influence decisions made inside already secretive agencies where
+governments are ready to except that sacrifices must be made for the
+greater good. Of course, the issue arises when surveillance exists
+that does not exist simply to protect a nation, but instead mass,
+indiscriminate surveillance is carried out on citizens not suspected
+of any criminal or terrorist activity such as the Optic Nerve
+program in the United Kingdom (cite), however governments nonetheless
+prove willing to fund the activities of surveillance agencies.
+Furthermore, there are options available to authorities that are
+regularly made use of. (Give example from Graham)
+
+Ms Pluton
{firewall}
diff --git a/refer b/refer
index 5cc8b6e..173ac1e 100644
--- a/refer
+++ b/refer
@@ -60,7 +60,7 @@
%O https://ctc.usma.edu/how-terrorists-use-encryption/ (Accessed 22 January 2022)
%T International statement: End-to-end encryption and public safety
-%A Home_Office
+%A Home^Office
%D Oct 2020
%O https://www.gov.uk/government/publications/international-statement-end-to-end-encryption-and-public-safety
(Accessed 29 January 2021)
@@ -78,3 +78,26 @@
%J Bulletin of the German Historical Institute
%C "German Historical Institute Washington DC
%O https://www.ghi-dc.org/fileadmin/publications/Bulletin_Supplement/Supplement_9/supp9.pdf
+
+%T N.S.A. Able to Foil Basic Safeguards of Privacy on Web
+%J The New York Times
+%A Nicole Perlroth
+%A Jeff Larson
+%A Scott Shane
+%D Sep 2013
+%O https://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html
+Accessed 3rd February 2022
+
+%T Photos of an NSA “upgrade” factory show Cisco router getting implant
+%A Sean Gallagher
+%J Ars Technica
+%D May 2014
+%O https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/
+Accessed 3rd February 2022
+
+%T Revealed: The NSA's Secret Campaign to Crack, Undermine Internet Security
+%J Pro Publica
+%A Jeff Larson
+%D Sep 2013
+%O https://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption
+Accessed 3rd February 2022