aboutsummaryrefslogtreecommitdiff
path: root/paper.ms
diff options
context:
space:
mode:
Diffstat (limited to 'paper.ms')
-rw-r--r--paper.ms16
1 files changed, 8 insertions, 8 deletions
diff --git a/paper.ms b/paper.ms
index 63572db..2179035 100644
--- a/paper.ms
+++ b/paper.ms
@@ -15,7 +15,7 @@ that book, which can be a difficult process. With the Internet,
however, information can exist in a more absolute state, separated
entirely from any physical media. Millions of people can download a
single book as easily as one person could, and the traditional
-limitations that lead us to `own' individual property no longer exist.
+limitations that lead us to 'own' individual property no longer exist.
In this way, the Internet eliminates the ownership of information in
whatever forms it perpetuated through the attachment of information
to media such as books or celluloid film, and the copying of
@@ -58,13 +58,13 @@ user-friendly software such as the Tails operating system or Telegram
(Graham citation 28), terrorists organisations have shown an ability
to make use of more obscure and complicated systems, as well as use
publicly available source code in order to construct software for
-operatives to use. Messaging technologies and their support for
-`end-to-end encryption' is a particularly significant issue.
-Introduction of end-to-end encryption being introduced by large
-companies such as Facebook has raised concern {conversation facebook}
-over the potential for usage by criminals and a lack of ability for
-Facebook or law enforcement to obtain conversation between criminals
-which may be vital in an investigation.
+operatives to use. Although the issue of popular messaging
+technologies and their support for `end-to-end encryption' is an often
+discussed issue. Introduction of end-to-end encryption being
+introduced by large companies such as Facebook has raised concern
+{conversation facebook} over the potential for usage by criminals and
+a lack of ability for Facebook or law enforcement to obtain
+conversation between criminals which may be vital in an investigation.
Concerns exist with digital technologies on at a hardware level. The
Intel Management Engine that exists {Intel Management}