.TL Title .AU Mohit Agarwal .AI January 2022 .LP A problem (instability), a solution The Internet offers an arguable Utopian communication method. The nature of computers and the information stored on them means that data such as a book or film can be duplicated practically instantly. When sharing information on the Internet, the physical limitations of traditional methods do not apply. To give someone a book is either to lose the copy yourself or to obtain or to produce another physical copy of that book. With the Internet, however, information can exist in a more absolute state, separated entirely from any physical media. Millions of people can download a single book as easily as one person could, and the traditional limitations that lead us to 'own' individual property no longer exist. In this way, the Internet eliminates the ownership of information in whatever forms it perpetuated through the attachment of information to media such as books or celluloid film, and the copying of information can take place in its purest state: of literal information, and then being stored as pure information, although on a physical media such as a hard drive, for all meaningful reasons (due to the large capacities and low cost of modern drives) unattached to anything physical whatsoever. Although this was true for other methods of sharing information, such as through radio broadcasts, information received via the Internet can be easily stored, processed, and accessed at any time, as well as giving anyone the ability to broadcast their own information rather than receive it, as usage of broadcasting towers was and remains limited, whereas the internet may be used to present new information by anyone. A key example of this might be Wikipedia. Wikipedia allows individuals to contribute to entries that form a vast encyclopedia. An argument is often made against digital privacy in the interest of national security. With access to communications and usage history law enforcement and government can quickly discover large amounts of information useful in a criminal investigation or in preventing criminal activity. Graham explores the use of encryption by terrorists {CTC terrorists} which is often cited in a reason for giving governments access to unencrypted Internet communications so that suspicious activity can be flagged and investigated in order to prevent a terror attack or in order to better respond in the case of an attack. Graham describes the extensive use of end to end encryption used by terrorists in order to avoid interception by the authorities. Due to US usage of intercepted communications to uncover and prevent a number of al-Qa'ida plots, the terrorist organisation and other terrorist groups have increasingly used encrypted communications (read citation from Graham). An significant factor is the use of non-mainstreams software in early use of encryption by terrorists, including a program that built a wrapper around the popular, secure, and open source PGP called \fIMujahedeen secrets\fR. Although now terrorists and criminals use widely available, popular, and user-friendly software such as the Tails operating system or Telegram (Graham citation 28), terrorists organisations have shown an ability to make use of more obscure and complicated systems, as well as use publicly available source code in order to construct software for operatives to use. Although the issue of popular messaging technologies and their support for 'end-to-end encryption' is often discussed, the argument that the introduction of end-to-end encryption by large companies such as Facebook gives an advantage to criminals {conversation Facebook}{home office} is arguably an entirely invalid one. By preventing the usage of true end-to-end encryption in industry, we will not be able to prevent those attempting to evade the law from doing so, as shown in the case of terrorist organisations who have used more obscure software in the past and also in the case of the abundance of illegal activity that occurs on the so called dark web in the form of the trade of drugs and child pornography among others (cite). Instead the limitation of use of encryption on popular software will only decrease the privacy of those uninterested in criminal activity and instead using technology to communicate. In the case of platforms such as Instagram (which is owned by Facebook) it is quite clear that the vast majority of communications (cite) will not contain anything illegal (reword) and that it is these conversations that will suffer from a lack of encryption. The information exposed by Edward Snowden in 2013 demonstrates that the US government has processed and collected vast amounts of unencrypted data (cite) and likely continues to do so. In the case of unencrypted messaging the problem remains and preventing end to end encryption will simply allow governments to maintain the status quo of being able to intercept and read all communications between its citizens and individuals outside of their jurisdictions. In order to conduct the vast amounts of surveillance they did in the GDR (German Democratic Republic) in support of the ruling party {Jarausch}, the Stasi gathered information from a vast network of informants who greatly outnumbered Stasi agents {Bruce 2014}. Whilst in Nazi Germany there may have been around 1 Gestapo agent for every 2300 citizens, in the GDR it was closer to 1 informant or officer for every 63 citizens. Those living in the GDR often had experiences involving investigation by the Stasi and there was clearly an understanding amongst citizens {funder} of the GDR that one had to be wary of an informant or agent listening in. In modern western society there is a similar collective understanding that governments attempting to carry out surveillance on a massive scale on their own citizens. A key distinction, however, is that in societies such as the UK, this work is not carried out by a vast network of informants, there are no gargantuan gargantuan stores of paper, and there are no hundreds of miles of film (cite all) documenting and aiding the surveillance of the authorities. Instead, there As with any technology, regulation has followed behind development in an attempt to control its limits. Much as automotive regulation followed the increase in popularity of cars in areas such as the UK and US, regulation will no doubt follow the newfound popularity of heavy encryption. There are however, difference in the case of encryption when compared to cars. The rate of change with modern technology is far greater. There are already discussions about quantum computers and their potential to overcome current encryption methods. In the case of encryption regulation will continuously struggle to control encryption methods due in part to how quickly they change, but perhaps moreso due to their decentralised nature, where a government cannot prevent the existence of software that enables encryption which is open source and reproducible internationally. Just as media privacy through torrents and access to hidden services over tor are possible without significant regulation, regulation of encryption may prove impossible. Concerns exist with digital technologies on at a hardware level. The Intel Management Engine that exists {Intel Management} {firewall} .nr HY 0 .ad l