aboutsummaryrefslogtreecommitdiff
path: root/paper.ms
diff options
context:
space:
mode:
Diffstat (limited to 'paper.ms')
-rw-r--r--paper.ms27
1 files changed, 19 insertions, 8 deletions
diff --git a/paper.ms b/paper.ms
index 3f107ac..73af97c 100644
--- a/paper.ms
+++ b/paper.ms
@@ -15,7 +15,7 @@ decrypted without the necessary keys, which in the case of RSA is
ensured by the large primes involved and the current intractability of
large prime factorisation. This allows for communication that is
practically guaranteed to be private: a relatively new phenomenon in
-communications, seen with inventions such as the one-tme pad (cite)
+communications, seen with inventions such as the one-tme pad {Rijmenants} (cite)
which was cryptographically secure and used by the both the KGB and
NSA (cite), beyond the use of the Enigma and Lorentz machines by the
Nazis which were both of which were decrypted by cryptanalysis methods
@@ -104,7 +104,7 @@ prevent those attempting to evade the law from doing so, as shown in
the case of terrorist organisations who have used more obscure
software in the past and also in the case of the abundance of illegal
activity that occurs on the so called dark web in the form of the
-trade of drugs and child pornography among others (cite). Instead the
+trade of drugs and child pornography among others {gulati deep web}. Instead the
limitation of use of encryption on popular software will only decrease
the privacy of those uninterested in criminal activity and instead
using technology to communicate. In the case of platforms such as
@@ -113,8 +113,8 @@ majority of communications (cite) will not contain anything illegal
(reword) and that it is these conversations that will suffer from a
lack of encryption. The information exposed by Edward Snowden in 2013
demonstrates that the US government has processed and collected vast
-amounts of unencrypted data (cite) and likely continues to do so. In
-the case of unencrypted messaging the problem remains and preventing
+amounts of unencrypted data (cite) and possibly continues to do so. In
+the case of unencrypted communication the problem remains and preventing
end to end encryption will simply allow governments to maintain the
status quo of being able to intercept and read all communications
between its citizens and individuals outside of their jurisdictions.
@@ -235,8 +235,15 @@ been in China, where the government has unparalleled control over the
flow of information over the internet. This has allowed the filtering
of content, prevention from accessing sites, and the blocking of the
anonymity network Tor which would allow users to circumvent measures
-put in place by the government {firewall} (cite for Tor). (research?:
-would such measures even work in western world?)
+put in place by the government {firewall}{talbot tor china}{winter
+china tor} Whether such draconian measures could even be implemented
+in the more democratic West is questionable, but the opportunity
+clearly exists for governments to undermine the digital privacy of its
+citizens. Any such measures, however, will face scrutiny from the
+media and public in Western society and thereby open software such as
+Tor is used to share significant amounts of information away from the
+observation of law enforcement, allowing illegal activity to occur
+{gulati}.
In addition, the rate of development in unconventional computing
methods is increasing rapidly. Effective quantum computing will
@@ -274,7 +281,9 @@ the US and in China {quantum research in china}. Both in the US at
Google {google supremacy nature} and in China {china quantum
advantage}{science photons quantum advantage}.
-(Is discussion on this useful?)
+The question must be asked as to whether the discussion of encryption
+and surveillance is necessary.
+
Individuals around the world have clearly expressed interest in
matters of privacy and encryption (cite) and open source software
allows those with the technical skills to become involved in the
@@ -332,7 +341,9 @@ relating to mass surveillance and mishandling of data such as the 2013
Edward Snowden releases and the 2018 Facebook-Cambridge Analytica
scandal ought to also be potentially considered a shock, not a
surprise given the level of data that both governments and private
-organisations have access to and responsibility for.
+organisations have access to and responsibility for. Encryption
+enables people to trust that their data that they wish to be private
+truly is and allows
.nr HY 0
.ad l