%T Stasiland %A Anna Funder %D 2003 %I Granta Books %G ISBN 9781783787340 %T Global digital population as of January 2021 %A Joseph Johnson %D 2021 %J Statista %O https://www.statista.com/statistics/617136/digital-population-worldwide/" %T Americans’ Internet Access: 2000-2015 %A Andrew Perrin %A Maeve Duggan %J Pew Research Center %D 2015 %O https://www.pewresearch.org/internet/2015/06/26/americans-internet-access-2000-2015 %A van Mill, David %T Freedom of Speech %J The Stanford Encyclopedia of Philosophy %E Edward N. Zalta %O https://plato.stanford.edu/archives/spr2021/entries/freedom-speech/ %D 2021 %C Metaphysics Research Lab, Stanford University %T Why Twitter’s Mission Statement Matters %A Justin Fox %D 2014 %J Harvard Business Review %O https://hbr.org/2014/11/why-twitters-mission-statement-matters %T The great firewall of China: Xi Jinping’s internet shutdown %A Elizabeth C. Economy %D 2018 %J The Guardian %O https://www.theguardian.com/news/2018/jun/29/the-great-firewall-of-china-xi-jinpings-internet-shutdown . %T Facebook’s push for end-to-end encryption is good news for user privacy, as well as terrorists and paedophiles %J The Conversation %A Roberto Musotto %A David S. Wall %D December 2019 %O https://theconversation.com/facebooks-push-for-end-to-end-encryption-is-good-news-for-user-privacy-as-well-as-terrorists-and-paedophiles-128782 Accessed 22 January 2022 %T How Terrorists Use Encryption %V Volume 9, Issue 6 %A Robert Graham %D June 2016 %J CTC Sentinel %O https://ctc.usma.edu/how-terrorists-use-encryption/ Accessed 22 January 2022 %T The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States (9/11 Report) %A National^Commission^on^Terrorist^Attacks^Upon^the^United^States %D July 2004 %A Daniel Byman %D 2014 %T The Intelligence War on Terrorism %J Intelligence and National Security %V 29:6 %P 837-863 %G DOI: 10.1080/02684527.2013.851876 %T International statement: End-to-end encryption and public safety %A Home^Office %D Oct 2020 %O https://www.gov.uk/government/publications/international-statement-end-to-end-encryption-and-public-safety Accessed 29 January 2021 %T Between Myth and Reality: The Stasi Legacy in German History %A Konrad Jarausch %D 2014 %J Bulletin of the German Historical Institute %C German Historical Institute Washington DC %O https://www.ghi-dc.org/publication/stasi-at-home-and-abroad-domestic-order-and-foreign-intelligence . %T Participatory Repression? Reflections on Popular Involvement with the Stasi %A Gary Bruce %D 2014 %J Bulletin of the German Historical Institute %C German Historical Institute Washington DC %O https://www.ghi-dc.org/publication/stasi-at-home-and-abroad-domestic-order-and-foreign-intelligence . %T N.S.A. Able to Foil Basic Safeguards of Privacy on Web %J The New York Times %A Nicole Perlroth %A Jeff Larson %A Scott Shane %D Sep 2013 %O https://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html Accessed 3rd February 2022 %T Photos of an NSA “upgrade” factory show Cisco router getting implant %A Sean Gallagher %J Ars Technica %D May 2014 %O https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/ Accessed 3rd February 2022 %T Revealed: The NSA's Secret Campaign to Crack, Undermine Internet Security %J Pro Publica %A Jeff Larson %D Sep 2013 %O https://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption Accessed 3rd February 2022 %T U.S. Confirms That It Gathers Online Data Overseas %A Charlie Savage %A Edward Wyatt %A Peter Baker %D June 2013 %J The New York Times %O Accessed online on 17th February 2022 %T NSA collecting phone records of millions of Verizon customers daily %A Glenn Greenwald %D June 2013 %J The Guardian %O Accessed online on 17th February 2022 %T Anger swells after NSA phone records court order revelations %J The Guardian %D June 2013 %A Dan Roberts %A Spencer Ackerman %O Accessed online on 17th February 2022 -- lawmaking %T US House passes bill to boost chip manufacturing and R&D %J The Register %D Feb 2022 %A Agam Shah %O Accessed online on 6th February 2022 %A H.R.3773 %T 110th Congress (2007-2008): FISA Amendments Act of 2008 %D 2008 %A H.R.3162 %T 107th Congress (2001-2002): Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of 2001 %D 2001 -- Intel management engine %T Intel's Management Engine is a security hazard, and users need a way to disable it %A Erica Portnoy %A Peter Eckersley %D May 2017 %J Electronic Frontier Foundation %O https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it Accessed 22 January 2022 %T Intel ME controller chip has secret kill switch %J The Register %A Thomas Claburn %D Aug 2017 %O Accessed online on 6th February 2022 %T Researchers Find a Way to Disable Much-Hated Intel ME Component Courtesy of the NSA %A Catalin Cimpanu %J BleepingComputer %D Aug 2017 %O https://www.bleepingcomputer.com/news/hardware/researchers-find-a-way-to-disable-much-hated-intel-me-component-courtesy-of-the-nsa/ Accessed 6th February 2022 -- Spectre, meltdown %T Researchers Discover Two Major Flaws in the World’s Computers %J The New York Times %D Jan 2018 %A Cade Metz %A Nicole Perlroth %O https://www.nytimes.com/2018/01/03/business/computer-flaws.html Accessed 7th February 2022 %T One-time Pad %A Dirk Rijmenants %D n.d. %O https://www.ciphermachinesandcryptology.com/en/onetimepad.htm Accessed 26th February 2022 -- quantum %T Report on Post-Quantum Cryptography %A Lily Chen %A Stephen Jordan %A Yi-Kai Liu %A Dustin Moody %A Rene Peralta %A Ray Perlner %A Daniel Smith-Tone %J National Institute of Standards and Technology %D April 2016 %O https://nvlpubs.nist.gov/nistpubs/ir/2016/nist.ir.8105.pdf . %T Quantum information research in China %A Qiang Zhang %A Feihu Xu %A Li Li %A Nai-Le Liu %A Jian-Wei Pan %D Nov 2019 %J Quantum Science and Technology %V 4 040503 %O https://iopscience.iop.org/article/10.1088/2058-9565/ab4bea/ . %T Physicists in China challenge Google’s ‘quantum advantage’ %A Philip Ball %D Dec 2020 %J Nature %O https://www.nature.com/articles/d41586-020-03434-7 Accessed 13th January 2022 %T Hello quantum world! Google publishes landmark quantum supremacy claim %A Elizabeth Gibney %D Oct 2019 %J Nature %O https://www.nature.com/articles/d41586-019-03213-z Accessed 13th January 2022 %T Quantum computational advantage using photons %A Han-Sen Zhong^et^al %D 2020 %O DOI: 10.1126/science.abe8770 %T Google Claims To Achieve Quantum Supremacy — IBM Pushes Back %J NPR %D Oct 2019 %A Paolo Zialcita %O https://www.npr.org/2019/10/23/772710977/google-claims-to-achieve-quantum-supremacy-ibm-pushes-back . %T Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process %D July 2020 %J National Institute of Standards and Technology %R NISTIR 8309 %O DOI: 10.6028/NIST.IR.8309 %A Gorjan Alagic %A Jacob Alperin-Sheriff %A Daniel Apon %A David Cooper %A Quynh Dang %A John Kelsey %A Yi-Kai Liu %A Carl Miller %A Dustin Moody %A Rene Peralta %A Ray Perlner %A Angela Robinson %A Daniel Smith-Tone %J European Journal of Privacy Law & Technologies %D 2021 %N 1 %T Post-quantum encryption and privacy regulation: Can the law keep pace with technology? %A Luigi Bruno %A Isabella Spano %O https://universitypress.unisob.na.it/ojs/index.php/ejplt/article/view/1225 . %T The Hidden Truth Anonymity in Cyberspace: Deep Web %D 2018 %A Saksham Gulati %A Shilpi Sharma %A Garima Agarwal %J Advances in Intelligent Systems and Computing %V 673 %P 719–730 %O DOI: 10.1007/978-981-10-7245-1_70 %T China Cracks Down on Tor Anonymity Network %A David Talbot %D Oct 2009 %J MIT Technology Review %T How China Is Blocking Tor %A Philipp Winter %A Stefan Lindskog %J Karlstad University %G arXiv:1204.0447 [cs.CR] %D Apr 2012 %A Chen Chen^et^al %T Xuantie-910: A Commercial Multi-Core 12-Stage Pipeline Out-of-Order 64-bit High Performance RISC-V Processor with Vector Extension %D 2020 %J ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA) %O DOI: 10.1109/isca45697.2020.00016 %T Instruction Sets Should Be Free: The Case For RISC-V %A Krste Asanović %A David A. Patterson %J Electrical Engineering and Computer Sciences %C University of California at Berkeley %R UCB/EECS-2014-146 %D Aug 2014 %T Exclusive: Secret contract tied NSA and security industry pioneer %A Joseph Menn %J Reuters %D Dec 2013 %O https://www.reuters.com/article/us-usa-security-rsa-idUSBRE9BJ1C220131220 Accessed 5 March 2022 %T RSA issues non-denying denial of NSA deal to favor flawed crypto code %J Ars Technica %A Dan Goodin %D Dec 2013 %O https://arstechnica.com/information-technology/2013/12/rsa-issues-non-denying-denial-of-nsa-deal-to-favor-flawed-crypto-code/ Accessed 5 March 2022 %T Government Announces Steps to Restore Confidence on Encryption Standards %A Nicole Perlroth %D September 2013 %J The New York Times %O https://bits.blogs.nytimes.com/2013/09/10/government-announces-steps-to-restore-confidence-on-encryption-standards/ Accessed 5 March 2022 %A Paul Kocher %A Jann Horn %A Anders Fogh %A Daniel Genkin %A Daniel Gruss %A Werner Haas %A Mike Hamburg %A Moritz Lipp %A Stefan Mangard %A Thomas Prescher %A Michael Schwarz %A Yuval Yarom %T Spectre Attacks: Exploiting Speculative Execution %D 2019 %O DOI: 10.1109/SP.2019.00002 %T GCHQ taps fibre-optic cables for secret access to world's communications %J The Guardian %D June 2013 %A Ewen MacAskill %A Julian Borger %A Nick Hopkins %A Nick Davies %A James Ball %O Accessed online on 2 April 2022 %T The Cold War Broadcast That Gave East German Dissidents A Voice %J NPR %D November 2014 %A Esme Nicholson %O Accessed online on 2 April 2022 %A The^Federal^Archives %T About the Stasi Records Archive %D n.d. %O https://www.stasi-unterlagen-archiv.de/en/archives/about-the-archives/ Accessed 2 April 2022 %D n.d. %O https://eur-lex.europa.eu/procedure/EN/201286 Accessed 25 March 2022 %A EUR-Lex %T Procedure 2012/0011/COD %O https://hbr.org/2018/04/gdpr-and-the-end-of-the-internets-grand-bargain Accessed 25 March 2022 %T GDPR and the End of the Internet’s Grand Bargain %D April 2018 %A Larry Downes %J Harvard Business Review %T Is the Intel Management Engine a backdoor? %A Jack Wallen %D July 2016 %J TechRepublic %O https://www.techrepublic.com/article/is-the-intel-management-engine-a-backdoor/ Accessed 25 March 2022 %T Why Windows 11 is forcing everyone to use TPM chips %J The Verge %A Tom Warren %D June 2021 %O https://www.theverge.com/2021/6/25/22550376/microsoft-windows-11-tpm-chips-requirement-security Accessed 25 March 2022 %T Coming to a laptop near you: A new type of security chip from Microsoft %A Dan Goodin %D January 2022 %J Ars Technica %O Accessed online 25 March 2022 %K pluton %T Pixel 6: Setting a new standard for mobile security %A Dave Kleidermacher %A Jesse Seed %A Brandon Barbello %A Stephan Somogyi %J Google Security Blog %D October 2021 %O https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html Accessed 25 March 2022 %T Why Big Tech should embrace the ‘right to repair’ revolution %J Financial Times %A Dave Lee %D August 2021 %O Accessed online on 25 March 2022 %T A Notebook You Can Repair %J New York Times Wirecutter %A Thorin Klosowski %D October 2021 %O https://www.nytimes.com/wirecutter/reviews/framework-laptop/ Accessed 25 March 2022 %T Post-Quantum Cryptography, Call for Proposals %D 2017 %J National Institute of Standards and Technology Computer Security Resource Center %A Lily Chen %A Dustin Moody %A Yi-Kai Liu %O https://csrc.nist.gov/Projects/post-quantum-cryptography/post-quantum-cryptography-standardization/Call-for-Proposals Accessed 25 March 2022 %A Alessandro Barenghi %A G.M. Bertoni %A Emanuele Parrinello %A Gerardo Pelosi %D September 2009 %J Conference: Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2009, Lausanne, Switzerland, 6 September 2009 %T Low Voltage Fault Attacks on the RSA Cryptosystem %O DOI: 10.1109/FDTC.2009.30 %T Timing Attacks on RSA: Revealing Your Secrets through the Fourth Dimension %D n.d. %A Wing H. Wong %O https://www.cs.sjsu.edu/faculty/stamp/students/article.html Accessed 25 March 2022 %T Cache-Timing Attacks on RSA Key Generation %D 2019 %J IACR Transactions on Cryptographic Hardware and Embedded Systems %V 2019:4 %P 213–242 %O DOI: 10.13154/tches.v2019.i4.213-242 %A Alejandro Cabrera Aldaya %A Cesar Pereida García %A Luis Manuel Alvarez %A Billy Bob Brumley %A Tim Cook %D February 2016 %O https://www.apple.com/customer-letter/ Accessed 25 March 2022 %T Inside the FBI's encryption battle with Apple %A Danny Yadron %A Spencer Ackerman %A Sam Thielman %J The Guardian %O Accessed online on 25 March 2022 %D Feb 2016