From ab036b410ef57fc650aa0646ec7bf4a500e2d654 Mon Sep 17 00:00:00 2001 From: root Date: Tue, 8 Feb 2022 16:24:14 +0000 Subject: Rethinking opening. 1900 words. --- paper.ms | 27 ++++++++++++++++++++------- 1 file changed, 20 insertions(+), 7 deletions(-) diff --git a/paper.ms b/paper.ms index ddc0340..e47f3d9 100644 --- a/paper.ms +++ b/paper.ms @@ -13,10 +13,6 @@ A problem (instability), a solution is this a fair question to argue -define objectives -.br -How should we deal with encryption? -.br What does the future hold for encryption? topic sentences? @@ -25,7 +21,7 @@ Ars technica: seek alternate source Symbol, slogan, surprise, salient (sticks out), story -The Internet offers an arguable Utopian communication method. The +The Internet offers an arguably Utopian communication method. The nature of computers and the information stored on them means that data such as a book or film can be duplicated practically instantly. When sharing information on the Internet, the physical limitations of @@ -52,6 +48,25 @@ whereas the internet may be used to present new information by anyone. A key example of this might be Wikipedia. Wikipedia allows individuals to contribute to entries that form a vast encyclopedia. +The way we respond to encryption as a society will clearly be +significant, and the success of government responses to encryption in +relation to issues such as terror and crime are rather significant. A +failure of effective response could allow terrorism to occur in ways +previously unseen, however an overreaction threatens people's civil +liberties and could easily be exploited for reasons other than +prevention of crime and terror. The successes and failures of +government responses can be judged in various ways. + +.IP i. 5 +Have responses stopped a significant amount of crime +.IP ii. 5 +Have responses stopped a significant amount of terror +.IP iii. 5 +Are these responses open to exploitation +.IP iv. 5 +Are these responses to extreme +.PP + An argument is often made against digital privacy in the interest of national security. With access to communications and usage history law enforcement and government can quickly discover large amounts of @@ -206,8 +221,6 @@ prove willing to fund the activities of surveillance agencies. Furthermore, there are options available to authorities that are regularly made use of. (Give example from Graham) -Ms Pluton - {firewall} .nr HY 0 -- cgit v1.2.3