aboutsummaryrefslogtreecommitdiff
path: root/paper.ms
diff options
context:
space:
mode:
Diffstat (limited to 'paper.ms')
-rw-r--r--paper.ms227
1 files changed, 0 insertions, 227 deletions
diff --git a/paper.ms b/paper.ms
deleted file mode 100644
index e47f3d9..0000000
--- a/paper.ms
+++ /dev/null
@@ -1,227 +0,0 @@
-.R1
-short-label D.y
-sort spec
-.R2
-.TL
-Title
-.AU
-Mohit Agarwal
-.AI
-February 2022
-.LP
-A problem (instability), a solution
-
-is this a fair question to argue
-
-What does the future hold for encryption?
-
-topic sentences?
-
-Ars technica: seek alternate source
-
-Symbol, slogan, surprise, salient (sticks out), story
-
-The Internet offers an arguably Utopian communication method. The
-nature of computers and the information stored on them means that data
-such as a book or film can be duplicated practically instantly. When
-sharing information on the Internet, the physical limitations of
-traditional methods do not apply. To give someone a book is either to
-lose the copy yourself or to obtain or to produce another physical
-copy of that book. With the Internet, however, information can exist
-in a more absolute state, separated entirely from any physical media.
-Millions of people can download a single book as easily as one person
-could, and the traditional limitations that lead us to 'own'
-individual property no longer exist. In this way, the Internet
-eliminates the ownership of information in whatever forms it
-perpetuated through the attachment of information to media such as
-books or celluloid film, and the copying of information can take place
-in its purest state: of literal information, and then being stored as
-pure information, although on a physical media such as a hard drive,
-for all meaningful reasons (due to the large capacities and low cost
-of modern drives) unattached to anything physical whatsoever. Although
-this was true for other methods of sharing information, such as
-through radio broadcasts, information received via the Internet can be
-easily stored, processed, and accessed at any time, as well as giving
-anyone the ability to broadcast their own information rather than
-receive it, as usage of broadcasting towers was and remains limited,
-whereas the internet may be used to present new information by anyone.
-A key example of this might be Wikipedia. Wikipedia allows individuals
-to contribute to entries that form a vast encyclopedia.
-
-The way we respond to encryption as a society will clearly be
-significant, and the success of government responses to encryption in
-relation to issues such as terror and crime are rather significant. A
-failure of effective response could allow terrorism to occur in ways
-previously unseen, however an overreaction threatens people's civil
-liberties and could easily be exploited for reasons other than
-prevention of crime and terror. The successes and failures of
-government responses can be judged in various ways.
-
-.IP i. 5
-Have responses stopped a significant amount of crime
-.IP ii. 5
-Have responses stopped a significant amount of terror
-.IP iii. 5
-Are these responses open to exploitation
-.IP iv. 5
-Are these responses to extreme
-.PP
-
-An argument is often made against digital privacy in the interest of
-national security. With access to communications and usage history law
-enforcement and government can quickly discover large amounts of
-information useful in a criminal investigation or in preventing
-criminal activity. Graham{#CTC terrorists} explores the use of
-encryption by terrorists which is often cited in a reason for giving
-governments access to unencrypted Internet communications so that
-suspicious activity can be flagged and investigated in order to
-prevent a terror attack or in order to better respond in the case of
-an attack. Graham describes the extensive use of end to end encryption
-used by terrorists in order to avoid interception by the authorities.
-Due to US usage of intercepted communications to uncover and prevent a
-number of al-Qa'ida plots, the terrorist organisation and other
-terrorist groups have increasingly used encrypted communications (read
-citation from Graham). An significant factor is the use of
-non-mainstreams software in early use of encryption by terrorists,
-including a program that built a wrapper around the popular, secure,
-and open source PGP called \fIMujahedeen secrets\fR. Although now
-terrorists and criminals use widely available, popular, and
-user-friendly software such as the Tails operating system or Telegram
-(Graham citation 28), terrorists organisations have shown an ability
-to make use of more obscure and complicated systems, as well as use
-publicly available source code in order to construct software for
-operatives to use.
-
-Although the issue of popular messaging technologies and their support
-for 'end-to-end encryption' is often discussed, the argument that the
-introduction of end-to-end encryption by large companies such as
-Facebook gives an advantage to criminals {conversation Facebook}{home
-office} is arguably an entirely invalid one. By preventing the usage
-of true end-to-end encryption in industry, we will not be able to
-prevent those attempting to evade the law from doing so, as shown in
-the case of terrorist organisations who have used more obscure
-software in the past and also in the case of the abundance of illegal
-activity that occurs on the so called dark web in the form of the
-trade of drugs and child pornography among others (cite). Instead the
-limitation of use of encryption on popular software will only decrease
-the privacy of those uninterested in criminal activity and instead
-using technology to communicate. In the case of platforms such as
-Instagram (which is owned by Facebook) it is quite clear that the vast
-majority of communications (cite) will not contain anything illegal
-(reword) and that it is these conversations that will suffer from a
-lack of encryption. The information exposed by Edward Snowden in 2013
-demonstrates that the US government has processed and collected vast
-amounts of unencrypted data (cite) and likely continues to do so. In
-the case of unencrypted messaging the problem remains and preventing
-end to end encryption will simply allow governments to maintain the
-status quo of being able to intercept and read all communications
-between its citizens and individuals outside of their jurisdictions.
-
-In order to conduct the vast amounts of surveillance they did in the
-GDR (German Democratic Republic) in support of the ruling party
-{Jarausch}, the Stasi gathered information from a vast network of
-informants who greatly outnumbered Stasi agents {Bruce 2014}. Whilst
-in Nazi Germany there may have been around 1 Gestapo agent for every
-2300 citizens, in the GDR it was closer to 1 informant or officer for
-every 63 citizens. Those living in the GDR often had experiences
-involving investigation by the Stasi and there was clearly an
-understanding amongst citizens {funder} of the GDR that one had to be
-wary of an informant or agent listening in. In modern western society
-there is a similar collective understanding that governments
-attempting to carry out surveillance on a massive scale on their own
-citizens. A key distinction, however, is that in societies such as the
-UK, this work is not carried out by a vast network of informants,
-there are no gargantuan gargantuan stores of paper, and there are no
-hundreds of miles of film (cite all) documenting and aiding the
-surveillance of the authorities. Instead, there
-
-As with any technology, regulation has followed behind development in
-an attempt to control its limits. Much as automotive regulation
-followed the increase in popularity of cars in areas such as the UK
-and US, regulation will no doubt follow the newfound popularity of
-heavy encryption. There are however, difference in the case of
-encryption when compared to cars. The rate of change with modern
-technology is far greater. There are already discussions about quantum
-computers and their potential to overcome current encryption methods.
-In the case of encryption regulation will continuously struggle to
-control encryption methods due in part to how quickly they change, but
-perhaps moreso due to their decentralised nature, where a government
-cannot prevent the existence of software that enables encryption which
-is open source and reproducible internationally. Just as media privacy
-through torrents and access to hidden services over tor are possible
-without significant regulation, regulation of encryption may prove
-impossible. An arguably useful tool to the authorities does exist in
-the hardware and infrastructure that users of the internet rely on.
-Firstly, the vast majority (cite) of users in the foreseeable future
-will continue to use the highly popular CPUs designed by Intel.
-Concerns have already been expressed {Intel Management} with regard to
-the Intel Management Engine that exists on modern processors produced
-by Intel. Should governments chose that backdoor access is essential,
-then this presence in hardware around the world alongside an influence
-over Intel (a US based company) to give access to governments may
-provide them with the ability to access information directly from the
-target's hardware rather than having to intercept information in
-transit. This would go for other hardware vendors such as AMD or ARM
-also. Whether or not companies such as Intel would open backdoors to
-governments is up for debate, however we are aware that in the case of
-the Intel Management there was potentially an ability for it to be
-disabled by US government authorities such as the NSA, demonstrating a
-level of leverage the US government potentially has over organisations
-including but not limited to Intel {register kill switch}{intel me
-bleepingcomputer}.
-Regardless of the level of influence governments might or
-might not hold over private corporations, the potential exists for
-systems built into non-open hardware which most people, even those
-using open software use, leaving them more open to exploitation from
-either state or private actors. Furthermore, there is a visible
-interest in increasing the presence of technologies on the hardware
-level, including the aforementioned Intel Management Engine, the
-Trusted Platform Module (cite), and recently Microsoft's Pluton (cite)
-subsystem, which will be present on hardware sold in the future. This
-variety of hardware within a single computer is a rather interesting
-and potentially worrying development, particularly with the clear
-influence and interest both the US and Chinese governments (cite
-both) are respectively showing (the US and China are the two largest
-chip manufacturers (cite, reword)).
-
-Is discussion on this useful?
-Individuals around the world have clearly expressed interest in
-matters of privacy and encryption (cite) and open source software
-allows those with the technical skills to become involved in the
-development of technology that enables strong encryption and avoids
-state surveillance. Measures taken by governments to prevent this
-development will doubtless be limited unless extreme actions such as
-those seen in China are taken. Otherwise, development will continue to
-occur in both free and non free societies in support of individual
-freedoms. The assertion of `Linus' law` that "given enough eyeballs,
-all bugs are shallow" (cite - CathBaz) creates a serious inability
-for actors such as governments to engineer backdoors into software as
-the NSA previously has (cite) or to prevent the development of
-software altogether (find example). On the other hand, a significant
-amount of the software and hardware
-
-The discussion of encryption and related technologies has arguably
-limited impact. State actors such as the NSA will continue to act
-against individual freedoms and attempt to find or introduce backdoors
-in technology that is widely used as part of its actions purportedly
-in the interest of `national security`. Although public reactions to
-information such as the 2013 Edward Snowden releases have been very
-strong, they have not had significant effects on legislature, the
-funding received by the NSA, and quite possibly the level of
-surveillance carried out by the NSA (cite all). Thus, from recent
-history, discussions in public or private spheres are unlikely to
-influence decisions made inside already secretive agencies where
-governments are ready to except that sacrifices must be made for the
-greater good. Of course, the issue arises when surveillance exists
-that does not exist simply to protect a nation, but instead mass,
-indiscriminate surveillance is carried out on citizens not suspected
-of any criminal or terrorist activity such as the Optic Nerve
-program in the United Kingdom (cite), however governments nonetheless
-prove willing to fund the activities of surveillance agencies.
-Furthermore, there are options available to authorities that are
-regularly made use of. (Give example from Graham)
-
-{firewall}
-
-.nr HY 0
-.ad l