aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--formatting.ms2
-rw-r--r--macros2
-rwxr-xr-xmake2
-rw-r--r--paper.ms60
-rw-r--r--refer2
5 files changed, 35 insertions, 33 deletions
diff --git a/formatting.ms b/formatting.ms
index c6c6590..06eb11a 100644
--- a/formatting.ms
+++ b/formatting.ms
@@ -30,7 +30,7 @@
.rm CH
.ds CF %
.ds FAM SabonU
-.fzoom CR 1200
+.fzoom CR 900
.fzoom CB 900
.rm CH
.nr HY 0
diff --git a/macros b/macros
index f4b6c14..69a869a 100644
--- a/macros
+++ b/macros
@@ -8,6 +8,6 @@
.\" * Horizontal line
.de HLINE
.ce
-\fC~~~~~~~~~~~~~~~~~~~~\fR
+\f[CI]~~~~~~~~~~~~~~~~~~~~\fR
.ec
..
diff --git a/make b/make
index f123477..7e13522 100755
--- a/make
+++ b/make
@@ -14,6 +14,8 @@ cat paper.ms|\
grep -v "^REMOVEME\n" |\
tr "^" " " |\
sed "s/^ //" |\
+ perl -0pe 's/\nREMOVEME\.\n/. /g' |
+ perl -0pe 's/\nREMOVEME,\n/, /g' |
perl -0pe 's/\nREMOVEME//g' |
perl -0pe 's/\n\n\n/\n\n/g' |
cat macros - > target/temp
diff --git a/paper.ms b/paper.ms
index 60b9758..f882d18 100644
--- a/paper.ms
+++ b/paper.ms
@@ -283,27 +283,28 @@ methods is increasing rapidly. Effective quantum computing will
result in existing popular cryptographic algorithms such as RSA, which
is used for communications and digital signatures, no longer being
secure {Lily Chen quantum}.
-Significant research such as at IBM in recent years (cite) has shown
+Significant research in recent years has shown
feasibility in current ideas surrounding quantum computing and
-promising results in development towards quantum supremacy and in the
+promising results in development towards quantum supremacy and the
future the breakdown of current cryptographic methods.
-Indeed, both in the US at Google {google supremacy nature} and in China {china
-quantum advantage}{science photons quantum advantage} at a university,
-claims of `quantum supremacy' have been made,
+Indeed, both in the US at Google {google supremacy nature} and in China
+at a major university
+{china quantum advantage}{science photons quantum advantage},
+claims of \[oq]quantum supremacy\[cq] have been made,
suggesting that quantum computers will soon
become powerful enough to start making current encryption methods
-obselete.
+obsolete.
Although this will not be an overnight transformation, changes
will be made by those implementing cryptography, both in the open
source space and in industry, as well as in government where
government agencies must act in order to protect their data. This
-change will take place naturally and many have already started to
+change will take place naturally and some have begun to
consider methods for post-quantum cryptography {nist alagic}.
Regulatory considerations about post-quantum cryptography are already
-being made and arguments can be made that regulation should be written
+being made and arguments can be made that regulation should soon be written
that institutes standards and requirements in order to prepare for a
future with effective quantum computing {bruno post quantum}. Once
-more, however an issue reveals itself with the speed of regulatory
+more, however, an issue reveals itself with the speed of regulatory
change and the progress of technology. Changes will likely be made by
open software in order to maintain secure encryption, such as those
used by the open source web servers to encrypt Interet traffic, as
@@ -313,30 +314,27 @@ in software that is less popular and legacy software which may not be
open to the scrutiny of open software and may lead to
vulnerabilities. Furthermore, the usage of post-quantum cryptography
by the public and the potential that it may help terrorists and
-criminals to communicate might not be addressed in a significant way.
-The issue of regulation being insufficient may further be realised by
-post-quantum cryptography due to its open nature: the US National
+criminals to communicate might not be addressed in any meaningful way.
+This lack of high level interest, initiative or funding from
+governments has arguable prompted more independent development in the
+public sphere:
+the US National
Institute of Standards and Technology (NIST) made a public request for
nominations of post-quantum cryptographic algorithms (cite), leading
to standards that will clearly influence future lawmaking (cite).
-(reword last few sentences) This adoption of open processes and the
+This adoption of open processes and the
open auditing and implementation of future cryptographic standards is
most striking when compared with the \fIDual_EC_DRBG\fR algorithm.
-This algorithm, which contained a vulnerability was included in NIST
+This algorithm, which contained a vulnerability, was included in NIST
standards. This vulnerability allowed the NSA to potentially decrypt
Internet traffic such as emails (cite). The NSA also allegedly paid
-the firm RSA Security in order to implement the algorith with backdoor in its
+the firm RSA Security in order to implement the algorithm with its
+backdoor in their
popular security products {menn nsa contract} and although the NSA
denies wrongdoing there was clearly NSA involvement with the company
that remains significant in the enterprise security space {goodin rsa
denial}{perlroth government}.
-The question must be asked as to whether the discussion of encryption
-and surveillance is necessary. Governments and law enforcement clearly
-have alternative methods to direcrlty analysing communications in
-order to stop crime or terror which might better respect the privacy
-of the general public. Metadata analysis has proved
-
Individuals around the world have clearly expressed interest in
matters of privacy and encryption (cite) and open source software
allows those with the technical skills to become involved in the
@@ -349,8 +347,9 @@ freedoms. The assertion of \[oq]Linus' law\[cq] that , \[lq]given enough eyeball
all bugs are shallow\[rq] (cite - CathBaz) creates a serious inability
for actors such as governments to engineer backdoors into software as
the NSA previously has (cite) or to prevent the development of
-software altogether (find example). On the other hand, a significant
-amount of the software and hardware
+software altogether (find example). On the other hand, the vast
+majority of the software and hardware used by the general public is
+proprietary.
The discussion of encryption and related technologies has arguably
limited impact. State actors such as the NSA will continue to act
@@ -398,7 +397,7 @@ exploited by any party with sufficient resources. Intel has released
multiple patches for Spectre, however, there remain concerns that
there is a potential for attacks in modern processors including new
processors made after 2018, and are therefore potentially a real
-threat to security {kocher spectre}
+threat to security {kocher spectre}.
.HLINE
@@ -426,7 +425,8 @@ cryptography in less popular open source applications is arguably
expected, yet there is nonetheless widespread adoption in more popular
software and proprietry software. Companies such as Facebook have
pushed for end to end encryption in their products and the software
-industry at large has adopted encrypted standards such as HTTPS. There
+industry at large has adopted encrypted standards such as
+\f[C]HTTPS\fR. There
are seemingly two sources of resistance to fully encryted
communications. The first of these is the largest, which is government
intervention. Government positions around the world which are opposed
@@ -460,22 +460,22 @@ IME/Pluton -- backdoors
Heatbleed (2014) (occured in open source software)
Government
- https://rules.house.gov/bill/117/hr-4521
+ https://rules.house.gov/bill/117/hr-4521 .
- https://www.technologyreview.com/2012/04/04/186902/how-china-blocks-the-tor-anonymity-network/
+ https://www.technologyreview.com/2012/04/04/186902/how-china-blocks-the-tor-anonymity-network/ .
Privacy
Apple and App Tracking Transparency
https://www.flurry.com/blog/ios-14-5-opt-in-rate-att-restricted-app-tracking-transparency-worldwide-us-daily-latest-update/
- https://www.bloomberg.com/news/articles/2021-07-14/facebook-fb-advertisers-impacted-by-apple-aapl-privacy-ios-14-changes
+ https://www.bloomberg.com/news/articles/2021-07-14/facebook-fb-advertisers-impacted-by-apple-aapl-privacy-ios-14-changes .
crowd supply boosts open hardware: linux magazine
https://ooni.org/post/2021-italy-blocks-gutenberg-book-publishing-website/#findings
https://ooni.org/post/2021-how-signal-private-messenger-blocked-around-the-world/
-https://ooni.org/post/2021-russia-blocks-tor/
+https://ooni.org/post/2021-russia-blocks-tor/ .
https://www.openrightsgroup.org/
TODO : recite bulletin
-https://www.ghi-dc.org/publication/stasi-at-home-and-abroad-domestic-order-and-foreign-intelligence
+https://www.ghi-dc.org/publication/stasi-at-home-and-abroad-domestic-order-and-foreign-intelligence .
diff --git a/refer b/refer
index cb52a89..207199d 100644
--- a/refer
+++ b/refer
@@ -250,7 +250,7 @@
%T Post-quantum encryption and privacy regulation: Can the law keep pace with technology?
%A Luigi Bruno
%A Isabella Spano
-%O https://universitypress.unisob.na.it/ojs/index.php/ejplt/article/view/1225
+%O https://universitypress.unisob.na.it/ojs/index.php/ejplt/article/view/1225 .
%T The Hidden Truth Anonymity in Cyberspace: Deep Web