diff options
Diffstat (limited to 'paper.ms')
| -rw-r--r-- | paper.ms | 39 |
1 files changed, 33 insertions, 6 deletions
@@ -266,7 +266,7 @@ not all exhausted due to technological change. Social engineering methods; communications traffic analysis such as phone records; metadata analysis from the underlying infrastructure of the Internet, including public blockchains and Internet Service Provider data; and -traditional methods such as searching for contraband goods are all +traditional methods, such as searching for contraband goods are all available to law enforcement despite measures used by criminals or terrorists such as encryption. Indeed, one could argue that the limitations on law enforcement investigations due to technology have a @@ -361,7 +361,9 @@ a phone for the FBI following a terrorist attack (cite) it gained significant media attention and demonstrated that the defence of users privacy was a virtue for modern businesses, regardless of the fact that the FBI was able to unlock the phone independently which is -rather overlooked. +rather overlooked. To users today, both to those with experience and +ability in technology, and to the general public, in privacy is +seemingly becoming a major selling point. The discussion of encryption and related technologies has arguably limited impact. State actors such as the NSA will continue to act @@ -427,17 +429,17 @@ arguably has moved itself towards encrypted standards. Open source initiatives have pioneered free implementations of secure cryptographic standards, allowing any user to use these tools directly in order to send information, as occurs with the popular PGP -implementation GPG. Additionaly the open implementation of +implementation GPG. Additionally the open implementation of cryptographic tools enables developers to integrate secure versions of these tools into new programs, allowing for the easy development of programs that allow encrypted communications. The demand for cryptography in less popular open source applications is arguably expected, yet there is nonetheless widespread adoption in more popular -software and proprietry software. Companies such as Facebook have +software and proprietary software. Companies such as Facebook have pushed for end to end encryption in their products and the software industry at large has adopted encrypted standards such as \f[C]HTTPS\fR. There -are seemingly two sources of resistance to fully encryted +are seemingly two sources of resistance to fully encrypted communications. The first of these is the largest, which is government intervention. Government positions around the world which are opposed to encryption seemingly have double standards. Just as the Enigma and @@ -449,12 +451,37 @@ to date cryptographic systems in order to keep their own communications secure, yet fight hard against encryption in the name of national security and to fight crime. In some ways this is a valid argument: wide availability to cryptography arguably lowers the -barrier to entry for terror or cime and reduces the ability law +barrier to entry for terror or crime and reduces the ability law enforcement has to deal with it. Nonetheless, it seems that reducing the availability of encryption to the pubic would not decrease the opportunity for criminals or terrorists to do harm (todo - discuss earlier). +Often we see two possible future realities: one with a perfect +surveillance state ruled by fear and one with ultimate privacy and +total encryption. Both are open to significant abuse with those acting +on behalf of the ruling state violating the privacy, basic freedoms +and rights of the people. In the later criminals are able to use +technology both to hide their activities and enable their crimes +without fear of police interference; creating a near anarchic +existence. It seems that in the West, representations of the former in +dystopian cultural works such as those by George Orwell, Isaac Asimov, +Arthur C. Clarke or Margaret Atwood, alongside journalistic coverage of +government surveillance and oppression in China form our view against +highly invasive state surveillance. Yet media coverage of criminals +and terrorists using technology and encryption, particularly following +events of terror; media and government discussing the risks of +technology; and the coverage of law enforcement using surveillance +tools to stop criminals shape our view of the later scenario. I feel +however, that this is a fallacious dichotomy that we have collectively +created. In the West it seems that we have come to far for complete +surveillance to be effectively implemented, as the tools to overcome +such a regime already exist and there is a widespread sentiment of +resistance amongst the public and in governments and courts against +such invasive measures. Yet, even in a world of widespread encryption, +governments and law enforcement would demonstrably still be able to +conduct surveillance and investigation at some level. + .nr HY 0 .ad l IME/Pluton -- backdoors |
