From 11e3e6e472781b2078c9179e344abd42ece2cb53 Mon Sep 17 00:00:00 2001 From: root Date: Tue, 25 Jan 2022 23:00:12 +0000 Subject: Minor changes --- Makefile | 1 + formatting.ms | 2 +- paper.ms | 22 ++++++++++++---------- 3 files changed, 14 insertions(+), 11 deletions(-) diff --git a/Makefile b/Makefile index 651d684..6b64181 100644 --- a/Makefile +++ b/Makefile @@ -1,6 +1,7 @@ default: ls target || mkdir target cat formatting.ms paper.ms |\ + sed "s/^{/.[\n/g" |\ sed "s/}{/\n.]\n.[\n/g" |\ sed "s/{/\n.[\n/g" | sed "s/\}\ /\n.]\n/g" | sed "s/\}/\n.]\n/g" |\ refer -Ss -p refer |\ diff --git a/formatting.ms b/formatting.ms index b553c04..ea2536e 100644 --- a/formatting.ms +++ b/formatting.ms @@ -34,7 +34,7 @@ .fzoom CR 750 .fzoom CB 900 .rm CH -.nr HY 1 +.nr HY 0 .R1 accumulate .R2 diff --git a/paper.ms b/paper.ms index 9275254..63572db 100644 --- a/paper.ms +++ b/paper.ms @@ -45,24 +45,26 @@ governments access to unencrypted Internet communications so that suspicious activity can be flagged and investigated in order to prevent a terror attack or in order to better respond in the case of an attack. Graham describes the extensive use of end to end encryption -used by terrorists in order to avoid interception by the autorities. +used by terrorists in order to avoid interception by the authorities. Due to U.S. usage of intercepted communications to uncover and prevent a number of al-Qa'ida plots, the terrorist organisation and other terrorist groups have increasingly used encrypted communications (read citation from Graham). An significant factor is the use of non-mainstreams software in early use of encryption by terrorists, -including a program that built a rapper around the popular, secure, +including a program that built a wrapper around the popular, secure, and open source PGP called \fIMujahedeen secrets\fR. Although now terrorists and criminals use widely available, popular, and user-friendly software such as the Tails operating system or Telegram -(Graham citation 28), Messaging -technologies and their support for `end-to-end encryption' is a -particularly significant issue. Introduction of end-to-end encryption -being introduced by large companies such as Facebook has raised -concern {conversation facebook} over the potential for usage by -criminals and a lack of ability for Facebook or law enforcement to -obtain conversation between criminals which may be vital in an -investigation. +(Graham citation 28), terrorists organisations have shown an ability +to make use of more obscure and complicated systems, as well as use +publicly available source code in order to construct software for +operatives to use. Messaging technologies and their support for +`end-to-end encryption' is a particularly significant issue. +Introduction of end-to-end encryption being introduced by large +companies such as Facebook has raised concern {conversation facebook} +over the potential for usage by criminals and a lack of ability for +Facebook or law enforcement to obtain conversation between criminals +which may be vital in an investigation. Concerns exist with digital technologies on at a hardware level. The Intel Management Engine that exists {Intel Management} -- cgit v1.2.3