aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--Makefile27
-rw-r--r--formatting.ms4
-rw-r--r--header.html2
-rw-r--r--paper (renamed from paper.ms)65
-rw-r--r--refer10
5 files changed, 85 insertions, 23 deletions
diff --git a/Makefile b/Makefile
index f16c2c0..428a0c4 100644
--- a/Makefile
+++ b/Makefile
@@ -1,15 +1,18 @@
-default:
+default: pdf
+build:
ls -1 | grep target || mkdir target
- wc paper.ms
- cat paper.ms |\
+ wc paper
+ cat paper|\
sed "s/^{/.[\n/g" |\
sed "s/}{/\n.]\n.[\n/g" |\
sed "s/{/\n.[\n/g" | sed "s/\}\ /\n.]\n/g" | sed "s/\}/\n.]\n/g" |\
refer -Ss -p refer | tr "^" " "> target/temp
- cat formatting.ms target/temp | groff -ket -Tpdf -ms -P-pa4 > target/paper.pdf
-html: default
+pdf: build
+ cat formatting.ms target/temp |\
+ groff -ket -Tpdf -ms -P-pa4 > target/paper.pdf
+html: build
cat header.html > target/paper.html
- cat formatting.ms target/temp| sed "s/.nr LL*/.nr LL 7i/g" |\
+ cat formatting.ms target/temp| sed "s/.nr LL*/.nr LL 6i/g" |\
groff -Tascii -c -ms |\
sed "1,2d" | ansi2html -piml >> target/paper.html
echo "</pre>" >> target/paper.html
@@ -17,6 +20,16 @@ read:
zathura target/paper.pdf&
clean:
rm -rf targep
-install: default html
+ install: default html
+ cp target/paper.html /var/www/git-bin/epq
+ cp target/paper.pdf /var/www/git-bin/epq
+ groff -Tascii -c -ms |\
+ sed "1,2d" | ansi2html -piml >> target/paper.html
+ echo "</pre>" >> target/paper.html
+read:
+ zathura target/paper.pdf&
+clean:
+ rm -rf targep
+ install: default html
cp target/paper.html /var/www/git-bin/epq
cp target/paper.pdf /var/www/git-bin/epq
diff --git a/formatting.ms b/formatting.ms
index 1e1deef..dd372f5 100644
--- a/formatting.ms
+++ b/formatting.ms
@@ -9,9 +9,9 @@
.\" header/footer width
.nr LT \n[LL]
.\" point size
-.nr PS 10pt
+.nr PS 11pt
.\" line height
-.nr VS 13p
+.nr VS 14p
.\" paragraph indent
.\" .nr PI 0m
.\" interparagraph space
diff --git a/header.html b/header.html
index 53e75f1..cdf2d74 100644
--- a/header.html
+++ b/header.html
@@ -1,3 +1,5 @@
+<html>
+<meta name="viewport" content="width=device-width, initial-scale=1">
<style>
html {
line-height: 1.6;
diff --git a/paper.ms b/paper
index e47f3d9..19a249a 100644
--- a/paper.ms
+++ b/paper
@@ -58,14 +58,13 @@ prevention of crime and terror. The successes and failures of
government responses can be judged in various ways.
.IP i. 5
-Have responses stopped a significant amount of crime
+To what extent does encryption enable either crime or terror?
.IP ii. 5
-Have responses stopped a significant amount of terror
+Does the increased mainstream adoption of encryption better enable
+crime or terror?
.IP iii. 5
-Are these responses open to exploitation
-.IP iv. 5
-Are these responses to extreme
-.PP
+Is combatting encryption an effective way to combat crime/terror?
+.LP
An argument is often made against digital privacy in the interest of
national security. With access to communications and usage history law
@@ -121,8 +120,8 @@ In order to conduct the vast amounts of surveillance they did in the
GDR (German Democratic Republic) in support of the ruling party
{Jarausch}, the Stasi gathered information from a vast network of
informants who greatly outnumbered Stasi agents {Bruce 2014}. Whilst
-in Nazi Germany there may have been around 1 Gestapo agent for every
-2300 citizens, in the GDR it was closer to 1 informant or officer for
+in Nazi Germany there may have been around one Gestapo agent for every
+2300 citizens, in the GDR it was closer to one informant or officer for
every 63 citizens. Those living in the GDR often had experiences
involving investigation by the Stasi and there was clearly an
understanding amongst citizens {funder} of the GDR that one had to be
@@ -133,7 +132,14 @@ citizens. A key distinction, however, is that in societies such as the
UK, this work is not carried out by a vast network of informants,
there are no gargantuan gargantuan stores of paper, and there are no
hundreds of miles of film (cite all) documenting and aiding the
-surveillance of the authorities. Instead, there
+surveillance of the authorities. Instead, the level of surveillance
+that large, secretive groups of individuals once had to carry out in
+order to enable a surveillance state can be performed instead through
+bureaucracies and technological methods. In modern times, governments
+can operate with a very limited number of operatives `on the ground`,
+and instead focus attention on the giant amounts of data they have for
+processing in order to make the findings they intend to: be it crime,
+terrorism, or - as was the case with the Gestapo and Stasi - descent.
As with any technology, regulation has followed behind development in
an attempt to control its limits. Much as automotive regulation
@@ -154,7 +160,7 @@ impossible. An arguably useful tool to the authorities does exist in
the hardware and infrastructure that users of the internet rely on.
Firstly, the vast majority (cite) of users in the foreseeable future
will continue to use the highly popular CPUs designed by Intel.
-Concerns have already been expressed {Intel Management} with regard to
+Concerns have already been expressed {Intel Management portnoy} with regard to
the Intel Management Engine that exists on modern processors produced
by Intel. Should governments chose that backdoor access is essential,
then this presence in hardware around the world alongside an influence
@@ -180,9 +186,10 @@ Trusted Platform Module (cite), and recently Microsoft's Pluton (cite)
subsystem, which will be present on hardware sold in the future. This
variety of hardware within a single computer is a rather interesting
and potentially worrying development, particularly with the clear
-influence and interest both the US and Chinese governments (cite
-both) are respectively showing (the US and China are the two largest
-chip manufacturers (cite, reword)).
+level influence, interest, and competitiveness both the US {US House
+chip manufacturing bill} and Chinese governments (cite) are
+respectively showing (the US and China are the two largest chip
+manufacturers (cite, reword)).
Is discussion on this useful?
Individuals around the world have clearly expressed interest in
@@ -221,6 +228,38 @@ prove willing to fund the activities of surveillance agencies.
Furthermore, there are options available to authorities that are
regularly made use of. (Give example from Graham)
+Spectre and Meltdown (disucss speculative execution)
+ https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
+ https://www.nytimes.com/2018/01/03/business/computer-flaws.html
+ https://support.apple.com/en-us/HT208394
+ https://www.ibm.com/blogs/psirt/potential-cpu-security-issue/
+ https://www.ibm.com/blogs/psirt/potential-impact-processors-power-family/
+ -- Speculative execution?
+
+IME/Pluton -- backdoors
+ https://www.techrepublic.com/article/is-the-intel-management-engine-a-backdoor/
+ https://www.techrepublic.com/article/why-the-nsa-may-not-need-backdoors/
+ Disabled on new ThinkPads: https://www.theregister.com/2022/01/20/microsoft_amd_pluton_lenovo/
+
+Heatbleed (2014) (occured in open source software)
+
+RISC V
+
+Government
+ https://rules.house.gov/bill/117/hr-4521
+
+ https://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo
+ https://archive.nytimes.com/www.nytimes.com/interactive/2013/09/05/us/documents-reveal-nsa-campaign-against-encryption.html
+ https://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption
+ https://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html
+ !! https://wikiless.org/wiki/Dual_EC_DRBG
+ -- > https://www.reuters.com/article/us-usa-security-rsa-idUSBRE9BJ1C220131220
+ https://web.archive.org/web/20131223121638/http://blogs.rsa.com/news-media-2/rsa-response/
+ https://www.technologyreview.com/2012/04/04/186902/how-china-blocks-the-tor-anonymity-network/
+ https://www.nytimes.com/2016/09/03/technology/nso-group-how-spy-tech-firms-let-governments-see-everything-on-a-smartphone.html
+
+ Leahy Law
+
{firewall}
.nr HY 0
diff --git a/refer b/refer
index e4a0cbe..e05666d 100644
--- a/refer
+++ b/refer
@@ -108,7 +108,7 @@
%J The Register
%D Feb 2022
%A Agam Shah
-%O https://www.theregister.com/2022/02/05/us_house_passes_america_competes/?td=keepreading-top
+%O https://www.theregister.com/2022/02/05/us_house_passes_america_competes/
(Accessed 6th February 2022)
%T Intel ME controller chip has secret kill switch
@@ -124,3 +124,11 @@
%D Aug 2017
%O https://www.bleepingcomputer.com/news/hardware/researchers-find-a-way-to-disable-much-hated-intel-me-component-courtesy-of-the-nsa/
(Accessed 6th February 2022)
+
+%T Researchers Discover Two Major Flaws in the World’s Computers
+%J The New York Times
+%D Jan 2018
+%A Cade Metz
+%A Nicole Perlroth
+%O https://www.nytimes.com/2018/01/03/business/computer-flaws.html
+(Accessed 7th February 2022)