diff options
Diffstat (limited to 'paper.ms')
| -rw-r--r-- | paper.ms | 66 |
1 files changed, 63 insertions, 3 deletions
@@ -3,10 +3,20 @@ Title .AU Mohit Agarwal .AI -January 2022 +February 2022 .LP A problem (instability), a solution +is this a fair question to argue + +define objectives + +topic sentences? + +Ars technica: seek alternate source + +Symbol, slogan, surprise, salient (sticks out), story + The Internet offers an arguable Utopian communication method. The nature of computers and the information stored on them means that data such as a book or film can be duplicated practically instantly. When @@ -119,11 +129,61 @@ through torrents and access to hidden services over tor are possible without significant regulation, regulation of encryption may prove impossible. An arguably useful tool to the authorities does exist in the hardware and infrastructure that users of the internet rely on. -Firstly, the vast majority (cite) of users in the forseeable future +Firstly, the vast majority (cite) of users in the foreseeable future will continue to use the highly popular CPUs designed by Intel. Concerns have already been expressed {Intel Management} with regard to the Intel Management Engine that exists on modern processors produced -by Intel. +by Intel. Should governments chose that backdoor access is essential, +then this presence in hardware around the world alongside an influence +over Intel (a US based company) to give access to governments may +provide them with the ability to access information directly from the +target's hardware rather than having to intercept information in +transit. This would go for other hardware vendors such as AMD or ARM +also. Whether or not companies such as Intel would open backdoors to +governments is up for debate, however we are aware that authorities +have requested backdoor access from hardware manufacturers in the past +(cite). Nonetheless, the potential exists for systems built into +non-open hardware which most people, even those using open software +use. + +Is discussion on this useful? +Individuals around the world have clearly expressed interest in +matters of privacy and encryption (cite) and open source software +allows those with the technical skills to become involved in the +development of technology that enables strong encryption and avoids +state surveillance. Measures taken by governments to prevent this +development will doubtless be limited unless extreme actions such as +those seen in China are taken. Otherwise, development will continue to +occur in both free and non free societies in support of individual +freedoms. The assertion of `Linus' law` that "given enough eyeballs, +all bugs are shallow" (cite - CathBaz) creates a serious inability +for actors such as governments to engineer backdoors into software as +the NSA previously has (cite) or to prevent the development of +software altogether (find example). On the other hand, a significant +amount of the software and hardware + +The discussion of encryption and related technologies has arguably +limited impact. State actors such as the NSA will continue to act +against individual freedoms and attempt to find or introduce backdoors +in technology that is widely used as part of its actions purportedly +in the interest of `national security`. Although public reactions to +information such as the 2013 Edward Snowden releases have been very +strong, they have not had significant effects on legislature, the +funding received by the NSA, and quite possibly the level of +surveillance carried out by the NSA (cite all). Thus, from recent +history, discussions in public or private spheres are unlikely to +influence decisions made inside already secretive agencies where +governments are ready to except that sacrifices must be made for the +greater good. Of course, the issue arises when surveillance exists +that does not exist simply to protect a nation, but instead mass, +indiscriminate surveillance is carried out on citizens not suspected +of any criminal or terrorist activity such as the Optic Nerve +program in the United Kingdom (cite), however governments nonetheless +prove willing to fund the activities of surveillance agencies. +Furthermore, there are options available to authorities that are +regularly made use of. (Give example from Graham) + +Ms Pluton {firewall} |
