From f99481ad484caa2bc34ec101c0baa8845f6dcb16 Mon Sep 17 00:00:00 2001 From: root Date: Tue, 25 Jan 2022 19:21:41 +0000 Subject: Writing, read Graham in Sentinel --- paper.ms | 43 ++++++++++++++++++++++++++++++++++++++++--- 1 file changed, 40 insertions(+), 3 deletions(-) (limited to 'paper.ms') diff --git a/paper.ms b/paper.ms index 6ac936f..9275254 100644 --- a/paper.ms +++ b/paper.ms @@ -4,7 +4,7 @@ Title Mohit Agarwal .AI January 2022 -.PP +.LP The Internet offers a potentially Utopian vision of human interaction. The nature of computers and the information stored on them means that a large file such as a book can be duplicated practically instantly. @@ -30,7 +30,44 @@ accessed at any time, as well as giving anyone the ability to broadcast their own information rather than receive it, as usage of broadcasting towers was and remains limited, whereas the internet may be used to present new information by anyone. A key example of this -might be Wikipedia. +might be Wikipedia. Wikipedia allows individuals to contribute to +entries that form a vast encyclopedia. + -- todo: "Take part in information, not only consume it" --- todo: copism + +An argument is often made against digital privacy in the interest of +national security. With access to communications and usage history law +enforcement and government can quickly discover large amounts of +information useful in a criminal investigation or in preventing +criminal activity. Graham explores the use of encryption by terrorists +{CTC terrorists} which is often cited in a reason for giving +governments access to unencrypted Internet communications so that +suspicious activity can be flagged and investigated in order to +prevent a terror attack or in order to better respond in the case of +an attack. Graham describes the extensive use of end to end encryption +used by terrorists in order to avoid interception by the autorities. +Due to U.S. usage of intercepted communications to uncover and prevent +a number of al-Qa'ida plots, the terrorist organisation and other +terrorist groups have increasingly used encrypted communications (read +citation from Graham). An significant factor is the use of +non-mainstreams software in early use of encryption by terrorists, +including a program that built a rapper around the popular, secure, +and open source PGP called \fIMujahedeen secrets\fR. Although now +terrorists and criminals use widely available, popular, and +user-friendly software such as the Tails operating system or Telegram +(Graham citation 28), Messaging +technologies and their support for `end-to-end encryption' is a +particularly significant issue. Introduction of end-to-end encryption +being introduced by large companies such as Facebook has raised +concern {conversation facebook} over the potential for usage by +criminals and a lack of ability for Facebook or law enforcement to +obtain conversation between criminals which may be vital in an +investigation. + +Concerns exist with digital technologies on at a hardware level. The +Intel Management Engine that exists {Intel Management} + +{Stasiland}{firewall} + .nr HY 0 +.ad l -- cgit v1.2.3