diff options
| -rw-r--r-- | Makefile | 12 | ||||
| -rw-r--r-- | formatting.ms | 6 | ||||
| -rw-r--r-- | paper.ms (renamed from paper) | 89 |
3 files changed, 52 insertions, 55 deletions
@@ -1,12 +1,16 @@ default: pdf build: ls -1 | grep target || mkdir target - wc paper - cat paper|\ + wc paper.ms + cat paper.ms|\ sed "s/^{/.[\n/g" |\ sed "s/}{/\n.]\n.[\n/g" |\ sed "s/{/\n.[\n/g" | sed "s/\}\ /\n.]\n/g" | sed "s/\}/\n.]\n/g" |\ - refer -Ss -p refer | tr "^" " "> target/temp + refer -C -Ss -p refer |\ + tr "^" " "> target/temp + #sed -E "s|([^\"\'\>=])(http[s]?://[^[:space:]]*)|\1\n.pdfhref W -D \"\2\" -A -- \2\n|g" |\ + #sed -E "s|([^\"\'\>=])(http[s]?://[^[:space:]]*)|\1\n.pdfhref W \2\n|g" |\ + pdf: build cat formatting.ms target/temp |\ groff -ket -Tpdf -ms -P-pa4 > target/paper.pdf @@ -16,6 +20,8 @@ html: build groff -Tascii -c -ms |\ sed "1,2d" | ansi2html -piml >> target/paper.html echo "</pre>" >> target/paper.html +read: + zathura target/paper.pdf& clean: rm -rf target install: pdf html diff --git a/formatting.ms b/formatting.ms index dd372f5..45471ae 100644 --- a/formatting.ms +++ b/formatting.ms @@ -1,7 +1,5 @@ -.\" text width -.nr LL 5.25i -.\" left margin -.nr PO 1.525i +.nr LL 5.00i +.nr PO 1.65i .\" top margin .nr HM 1.0i .\" bottom margin @@ -9,49 +9,29 @@ Mohit Agarwal .AI February 2022 .LP -A problem (instability), a solution - -is this a fair question to argue - -What does the future hold for encryption? - -topic sentences? - -Ars technica: seek alternate source - -Symbol, slogan, surprise, salient (sticks out), story - -The Internet offers an arguably Utopian communication method. The -nature of computers and the information stored on them means that data -such as a book or film can be duplicated practically instantly. When -sharing information on the Internet, the physical limitations of -traditional methods do not apply. To give someone a book is either to -lose the copy yourself or to obtain or to produce another physical -copy of that book. With the Internet, however, information can exist -in a more absolute state, separated entirely from any physical media. -Millions of people can download a single book as easily as one person -could, and the traditional limitations that lead us to 'own' -individual property no longer exist. In this way, the Internet -eliminates the ownership of information in whatever forms it -perpetuated through the attachment of information to media such as -books or celluloid film, and the copying of information can take place -in its purest state: of literal information, and then being stored as -pure information, although on a physical media such as a hard drive, -for all meaningful reasons (due to the large capacities and low cost -of modern drives) unattached to anything physical whatsoever. Although -this was true for other methods of sharing information, such as -through radio broadcasts, information received via the Internet can be -easily stored, processed, and accessed at any time, as well as giving -anyone the ability to broadcast their own information rather than -receive it, as usage of broadcasting towers was and remains limited, -whereas the internet may be used to present new information by anyone. -A key example of this might be Wikipedia. Wikipedia allows individuals -to contribute to entries that form a vast encyclopedia. - -The way we respond to encryption as a society will clearly be -significant, and the success of government responses to encryption in -relation to issues such as terror and crime are rather significant. A -failure of effective response could allow terrorism to occur in ways +Encryption offers a level of security and confidence for communications +that has not previously been seen. This offers individuals with the +ability to communicate with each other in a way that is practically +immune from eavesdropping of any sort. Naturally, this does mean that +malicious actors such as criminals and terrorists be able to use +encryption in order to commit crimes or enable acts of terror. In +response to the threats of encryption and communications technology +generally, governments have often engaged in signals intelligence +(SIGINT) such as phone line tapping. Modern SIGINT initiatives have +become incredibly complex and sophisticated and have grown greatly as +popular adoption of technology has grown. Part of government interest +in SIGINT is a direct response to percieved threads, such as the +Patriot Act in the US which followed the 2001 terrorist attacks with +the objective of strengthening national security (cite). State +sponsored SIGINT programmes aim to respond to encryption and other +technological developments with the primary interest of overcoming it +in order to prevent terror and crime. These measures have, however, +had arguably limited efffectiveness and have violated the privacy of +individuals who are not suspected of being a threat to national +security. The way we respond to encryption as a society will clearly +be significant, and the success of government responses to encryption +in relation to issues such as terror and crime are rather significant. +A failure of effective response could allow terrorism to occur in ways previously unseen, however an overreaction threatens people's civil liberties and could easily be exploited for reasons other than prevention of crime and terror. The successes and failures of @@ -228,6 +208,22 @@ prove willing to fund the activities of surveillance agencies. Furthermore, there are options available to authorities that are regularly made use of. (Give example from Graham) +Modern cryptographic algorithms are `cryptographically secure`; the +underlying theoretical concepts mean that breaking the encryption to +intercept a communication is possible only through a brute-force +attack and is therefore, due to the nature of the algorithm. This +however, does not consider implementational flaws. + +.nr HY 0 +.ad l +Intro + Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008 + +Cryptography + https://wikiless.org/wiki/Kerckhoffs%27s_principle?lang=en + Timing Attacks + RSA + Spectre and Meltdown (disucss speculative execution) https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html https://www.nytimes.com/2018/01/03/business/computer-flaws.html @@ -253,14 +249,11 @@ Government https://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption https://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html !! https://wikiless.org/wiki/Dual_EC_DRBG - -- > https://www.reuters.com/article/us-usa-security-rsa-idUSBRE9BJ1C220131220 - https://web.archive.org/web/20131223121638/http://blogs.rsa.com/news-media-2/rsa-response/ + https://www.reuters.com/article/us-usa-security-rsa-idUSBRE9BJ1C220131220 + https://web.archive.org/web/20131223121638/http://blogs.rsa.com/news-media-2/rsa-response/ https://www.technologyreview.com/2012/04/04/186902/how-china-blocks-the-tor-anonymity-network/ https://www.nytimes.com/2016/09/03/technology/nso-group-how-spy-tech-firms-let-governments-see-everything-on-a-smartphone.html Leahy Law {firewall} - -.nr HY 0 -.ad l |
