aboutsummaryrefslogtreecommitdiff
path: root/paper.ms
diff options
context:
space:
mode:
Diffstat (limited to 'paper.ms')
-rw-r--r--paper.ms39
1 files changed, 33 insertions, 6 deletions
diff --git a/paper.ms b/paper.ms
index 17a6a46..698ef59 100644
--- a/paper.ms
+++ b/paper.ms
@@ -266,7 +266,7 @@ not all exhausted due to technological change. Social engineering
methods; communications traffic analysis such as phone records;
metadata analysis from the underlying infrastructure of the Internet,
including public blockchains and Internet Service Provider data; and
-traditional methods such as searching for contraband goods are all
+traditional methods, such as searching for contraband goods are all
available to law enforcement despite measures used by criminals or
terrorists such as encryption. Indeed, one could argue that the
limitations on law enforcement investigations due to technology have a
@@ -361,7 +361,9 @@ a phone for the FBI following a terrorist attack (cite) it gained
significant media attention and demonstrated that the defence of users
privacy was a virtue for modern businesses, regardless of the fact
that the FBI was able to unlock the phone independently which is
-rather overlooked.
+rather overlooked. To users today, both to those with experience and
+ability in technology, and to the general public, in privacy is
+seemingly becoming a major selling point.
The discussion of encryption and related technologies has arguably
limited impact. State actors such as the NSA will continue to act
@@ -427,17 +429,17 @@ arguably has moved itself towards encrypted standards. Open source
initiatives have pioneered free implementations of secure
cryptographic standards, allowing any user to use these tools directly
in order to send information, as occurs with the popular PGP
-implementation GPG. Additionaly the open implementation of
+implementation GPG. Additionally the open implementation of
cryptographic tools enables developers to integrate secure versions of
these tools into new programs, allowing for the easy development of
programs that allow encrypted communications. The demand for
cryptography in less popular open source applications is arguably
expected, yet there is nonetheless widespread adoption in more popular
-software and proprietry software. Companies such as Facebook have
+software and proprietary software. Companies such as Facebook have
pushed for end to end encryption in their products and the software
industry at large has adopted encrypted standards such as
\f[C]HTTPS\fR. There
-are seemingly two sources of resistance to fully encryted
+are seemingly two sources of resistance to fully encrypted
communications. The first of these is the largest, which is government
intervention. Government positions around the world which are opposed
to encryption seemingly have double standards. Just as the Enigma and
@@ -449,12 +451,37 @@ to date cryptographic systems in order to keep their own
communications secure, yet fight hard against encryption in the name
of national security and to fight crime. In some ways this is a valid
argument: wide availability to cryptography arguably lowers the
-barrier to entry for terror or cime and reduces the ability law
+barrier to entry for terror or crime and reduces the ability law
enforcement has to deal with it. Nonetheless, it seems that reducing
the availability of encryption to the pubic would not decrease the
opportunity for criminals or terrorists to do harm (todo - discuss
earlier).
+Often we see two possible future realities: one with a perfect
+surveillance state ruled by fear and one with ultimate privacy and
+total encryption. Both are open to significant abuse with those acting
+on behalf of the ruling state violating the privacy, basic freedoms
+and rights of the people. In the later criminals are able to use
+technology both to hide their activities and enable their crimes
+without fear of police interference; creating a near anarchic
+existence. It seems that in the West, representations of the former in
+dystopian cultural works such as those by George Orwell, Isaac Asimov,
+Arthur C. Clarke or Margaret Atwood, alongside journalistic coverage of
+government surveillance and oppression in China form our view against
+highly invasive state surveillance. Yet media coverage of criminals
+and terrorists using technology and encryption, particularly following
+events of terror; media and government discussing the risks of
+technology; and the coverage of law enforcement using surveillance
+tools to stop criminals shape our view of the later scenario. I feel
+however, that this is a fallacious dichotomy that we have collectively
+created. In the West it seems that we have come to far for complete
+surveillance to be effectively implemented, as the tools to overcome
+such a regime already exist and there is a widespread sentiment of
+resistance amongst the public and in governments and courts against
+such invasive measures. Yet, even in a world of widespread encryption,
+governments and law enforcement would demonstrably still be able to
+conduct surveillance and investigation at some level.
+
.nr HY 0
.ad l
IME/Pluton -- backdoors