aboutsummaryrefslogtreecommitdiff
path: root/paper.ms
diff options
context:
space:
mode:
Diffstat (limited to 'paper.ms')
-rw-r--r--paper.ms27
1 files changed, 20 insertions, 7 deletions
diff --git a/paper.ms b/paper.ms
index ddc0340..e47f3d9 100644
--- a/paper.ms
+++ b/paper.ms
@@ -13,10 +13,6 @@ A problem (instability), a solution
is this a fair question to argue
-define objectives
-.br
-How should we deal with encryption?
-.br
What does the future hold for encryption?
topic sentences?
@@ -25,7 +21,7 @@ Ars technica: seek alternate source
Symbol, slogan, surprise, salient (sticks out), story
-The Internet offers an arguable Utopian communication method. The
+The Internet offers an arguably Utopian communication method. The
nature of computers and the information stored on them means that data
such as a book or film can be duplicated practically instantly. When
sharing information on the Internet, the physical limitations of
@@ -52,6 +48,25 @@ whereas the internet may be used to present new information by anyone.
A key example of this might be Wikipedia. Wikipedia allows individuals
to contribute to entries that form a vast encyclopedia.
+The way we respond to encryption as a society will clearly be
+significant, and the success of government responses to encryption in
+relation to issues such as terror and crime are rather significant. A
+failure of effective response could allow terrorism to occur in ways
+previously unseen, however an overreaction threatens people's civil
+liberties and could easily be exploited for reasons other than
+prevention of crime and terror. The successes and failures of
+government responses can be judged in various ways.
+
+.IP i. 5
+Have responses stopped a significant amount of crime
+.IP ii. 5
+Have responses stopped a significant amount of terror
+.IP iii. 5
+Are these responses open to exploitation
+.IP iv. 5
+Are these responses to extreme
+.PP
+
An argument is often made against digital privacy in the interest of
national security. With access to communications and usage history law
enforcement and government can quickly discover large amounts of
@@ -206,8 +221,6 @@ prove willing to fund the activities of surveillance agencies.
Furthermore, there are options available to authorities that are
regularly made use of. (Give example from Graham)
-Ms Pluton
-
{firewall}
.nr HY 0