aboutsummaryrefslogtreecommitdiff
path: root/refer
blob: d2f688d438f2cbfb4671416fa83fb0d676890884 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
%T Stasiland
%A Anna Funder
%D 2003
%I Granta Books
%G ISBN 9781783787340

%T Global digital population as of January 2021
%A Joseph Johnson
%D 2021
%J Statista
%O https://www.statista.com/statistics/617136/digital-population-worldwide/ .

%T Americans’ Internet Access: 2000-2015
%A Andrew Perrin 
%A Maeve Duggan
%J Pew Research Center
%D 2015
%O https://www.pewresearch.org/internet/2015/06/26/americans-internet-access-2000-2015 .

%A van Mill, David
%T Freedom of Speech
%J The Stanford Encyclopedia of Philosophy
%E Edward N. Zalta
%O https://plato.stanford.edu/archives/spr2021/entries/freedom-speech/ .
%D 2021
%C Metaphysics Research Lab, Stanford University

%T Why Twitter’s Mission Statement Matters
%A Justin Fox
%D 2014
%J Harvard Business Review
%O https://hbr.org/2014/11/why-twitters-mission-statement-matters .

%T The great firewall of China: Xi Jinping’s internet shutdown
%A Elizabeth C. Economy
%D 2018
%J The Guardian

%T  Facebook’s push for end-to-end encryption is good news for user privacy, as well as terrorists and paedophiles
%J The Conversation
%A Roberto Musotto
%A David S. Wall 
%D December 2019
%O https://theconversation.com/facebooks-push-for-end-to-end-encryption-is-good-news-for-user-privacy-as-well-as-terrorists-and-paedophiles-128782 Accessed 22 January 2022

%T How Terrorists Use Encryption
%V Volume 9, Issue 6
%A Robert Graham
%D June 2016
%J CTC Sentinel 
%O https://ctc.usma.edu/how-terrorists-use-encryption/ Accessed 22 January 2022

%T The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States (9/11 Report)
%A National^Commission^on^Terrorist^Attacks^Upon^the^United^States 
%D July 2004

%A Daniel Byman
%D 2014
%T The Intelligence War on Terrorism 
%J Intelligence and National Security
%V 29:6 
%P 837-863 
%G DOI: 10.1080/02684527.2013.851876

%T International statement: End-to-end encryption and public safety
%A Home^Office
%D Oct 2020
%O https://www.gov.uk/government/publications/international-statement-end-to-end-encryption-and-public-safety
Accessed 29 January 2021

%T Between Myth and Reality: The Stasi Legacy in German History
%A Konrad Jarausch
%D 2014
%J Bulletin of the German Historical Institute
%C German Historical Institute Washington DC
%O https://www.ghi-dc.org/publication/stasi-at-home-and-abroad-domestic-order-and-foreign-intelligence .

%T Participatory Repression? Reflections on Popular Involvement with the Stasi
%A Gary Bruce
%D 2014
%J Bulletin of the German Historical Institute
%C German Historical Institute Washington DC
%O https://www.ghi-dc.org/publication/stasi-at-home-and-abroad-domestic-order-and-foreign-intelligence .

%T N.S.A. Able to Foil Basic Safeguards of Privacy on Web
%J The New York Times
%A Nicole Perlroth
%A Jeff Larson 
%A Scott Shane
%D Sep 2013
%O https://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html
Accessed 3rd February 2022

%T Photos of an NSA “upgrade” factory show Cisco router getting implant
%A Sean Gallagher
%J Ars Technica
%D May 2014
%O https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/
Accessed 3rd February 2022

%T Revealed: The NSA's Secret Campaign to Crack, Undermine Internet Security
%J Pro Publica
%A Jeff Larson
%D Sep 2013
%O https://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption
Accessed 3rd February 2022

%T U.S. Confirms That It Gathers Online Data Overseas
%A Charlie Savage
%A Edward Wyatt 
%A Peter Baker
%D June 2013
%J The New York Times
%O Accessed online on 17th February 2022

%T NSA collecting phone records of millions of Verizon customers daily
%A Glenn Greenwald
%D June 2013
%J The Guardian
%O Accessed online on 17th February 2022

%T Anger swells after NSA phone records court order revelations
%J The Guardian
%D June 2013
%A Dan Roberts
%A Spencer Ackerman
%O Accessed online on 17th February 2022

-- lawmaking

%T US House passes bill to boost chip manufacturing and R&D
%J The Register
%D Feb 2022
%A Agam Shah
%O Accessed online on 6th February 2022

%A H.R.3773 
%T 110th Congress (2007-2008): FISA Amendments Act of 2008
%D 2008

%A H.R.3162
%T 107th Congress (2001-2002): Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of 2001
%D 2001

-- Intel management engine

%T Intel's Management Engine is a security hazard, and users need a way to disable it
%A Erica Portnoy 
%A Peter Eckersley
%D May 2017
%J Electronic Frontier Foundation
%O https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it Accessed 22 January 2022

%T Intel ME controller chip has secret kill switch
%J The Register 
%A Thomas Claburn
%D Aug 2017
%O Accessed online on 6th February 2022

%T Researchers Find a Way to Disable Much-Hated Intel ME Component Courtesy of the NSA
%A Catalin Cimpanu
%J BleepingComputer
%D Aug 2017
%O https://www.bleepingcomputer.com/news/hardware/researchers-find-a-way-to-disable-much-hated-intel-me-component-courtesy-of-the-nsa/
Accessed 6th February 2022

-- Spectre, meltdown

%T Researchers Discover Two Major Flaws in the World’s Computers
%J The New York Times
%D Jan 2018
%A Cade Metz 
%A Nicole Perlroth
%O https://www.nytimes.com/2018/01/03/business/computer-flaws.html
Accessed 7th February 2022

%T One-time Pad
%A Dirk Rijmenants
%D n.d.
%O https://www.ciphermachinesandcryptology.com/en/onetimepad.htm
Accessed 26th February 2022

-- quantum

%T Report on Post-Quantum Cryptography 
%A Lily Chen 
%A Stephen Jordan 
%A Yi-Kai Liu 
%A Dustin Moody 
%A Rene Peralta 
%A Ray Perlner 
%A Daniel Smith-Tone 
%J National Institute of Standards and Technology 
%D April 2016
%O https://nvlpubs.nist.gov/nistpubs/ir/2016/nist.ir.8105.pdf .

%T Quantum information research in China
%A Qiang Zhang
%A Feihu Xu
%A Li Li
%A Nai-Le Liu
%A Jian-Wei Pan
%D Nov 2019
%J Quantum Science and Technology
%V 4 040503 
%O https://iopscience.iop.org/article/10.1088/2058-9565/ab4bea/ .

%T Physicists in China challenge Google’s ‘quantum advantage’
%A Philip Ball 
%D Dec 2020
%J Nature
%O https://www.nature.com/articles/d41586-020-03434-7
Accessed 13th January 2022

%T Hello quantum world! Google publishes landmark quantum supremacy claim
%A Elizabeth Gibney 
%D Oct 2019
%J Nature
%O https://www.nature.com/articles/d41586-019-03213-z
Accessed 13th January 2022

%T Quantum computational advantage using photons
%A Han-Sen Zhong^et^al
%D 2020
%O DOI: 10.1126/science.abe8770

%T Google Claims To Achieve Quantum Supremacy — IBM Pushes Back
%J NPR
%D Oct 2019
%A Paolo Zialcita
%O https://www.npr.org/2019/10/23/772710977/google-claims-to-achieve-quantum-supremacy-ibm-pushes-back .

%T Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process
%D July 2020
%J National Institute of Standards and Technology 
%R NISTIR 8309
%O DOI: 10.6028/NIST.IR.8309
%A Gorjan Alagic
%A Jacob Alperin-Sheriff
%A Daniel Apon
%A David Cooper
%A Quynh Dang
%A John Kelsey
%A Yi-Kai Liu
%A Carl Miller
%A Dustin Moody
%A Rene Peralta
%A Ray Perlner
%A Angela Robinson
%A Daniel Smith-Tone

%J European Journal of Privacy Law & Technologies  
%D 2021  
%N 1
%T Post-quantum encryption and privacy regulation: Can the law keep pace with technology? 
%A Luigi Bruno  
%A Isabella Spano
%O https://universitypress.unisob.na.it/ojs/index.php/ejplt/article/view/1225 .


%T The Hidden Truth Anonymity in Cyberspace: Deep Web
%D 2018
%A Saksham Gulati
%A Shilpi Sharma 
%A Garima Agarwal
%J Advances in Intelligent Systems and Computing
%V 673
%P 719–730
%O DOI: 10.1007/978-981-10-7245-1_70

%T China Cracks Down on Tor Anonymity Network
%A David Talbot
%D Oct 2009
%J MIT Technology Review

%T How China Is Blocking Tor
%A Philipp Winter
%A Stefan Lindskog
%J Karlstad University
%G arXiv:1204.0447 [cs.CR]
%D Apr 2012

%A Chen Chen^et^al
%T Xuantie-910: A Commercial Multi-Core 12-Stage Pipeline Out-of-Order 64-bit High Performance RISC-V Processor with Vector Extension
%D 2020
%J ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA)
%O DOI: 10.1109/isca45697.2020.00016 

%T Instruction Sets Should Be Free: The Case For RISC-V
%A Krste Asanović
%A David A. Patterson
%J Electrical Engineering and Computer Sciences
%C University of California at Berkeley
%R UCB/EECS-2014-146
%D Aug 2014


%T Exclusive: Secret contract tied NSA and security industry pioneer
%A Joseph Menn
%J Reuters
%D Dec 2013
%O https://www.reuters.com/article/us-usa-security-rsa-idUSBRE9BJ1C220131220
Accessed 5 March 2022

%T RSA issues non-denying denial of NSA deal to favor flawed crypto code
%J Ars Technica
%A Dan Goodin 
%D Dec 2013 
%O https://arstechnica.com/information-technology/2013/12/rsa-issues-non-denying-denial-of-nsa-deal-to-favor-flawed-crypto-code/
Accessed 5 March 2022

%T Government Announces Steps to Restore Confidence on Encryption Standards
%A Nicole Perlroth
%D September 2013 
%J The New York Times
%O https://bits.blogs.nytimes.com/2013/09/10/government-announces-steps-to-restore-confidence-on-encryption-standards/
Accessed 5 March 2022

%A Paul Kocher
%A Jann Horn
%A Anders Fogh
%A Daniel Genkin
%A Daniel Gruss
%A Werner Haas
%A Mike Hamburg
%A Moritz Lipp
%A Stefan Mangard
%A Thomas Prescher
%A Michael Schwarz
%A Yuval Yarom
%T Spectre Attacks: Exploiting Speculative Execution
%D 2019
%O DOI: 10.1109/SP.2019.00002

%T GCHQ taps fibre-optic cables for secret access to world's communications
%J The Guardian
%D June 2013
%A Ewen MacAskill
%A Julian Borger
%A Nick Hopkins
%A Nick Davies
%A James Ball
%O Accessed online on 2 April 2022

%T The Cold War Broadcast That Gave East German Dissidents A Voice
%J NPR
%D November 2014
%A Esme Nicholson
%O Accessed online on 2 April 2022

%A The^Federal^Archives
%T About the Stasi Records Archive 
%D n.d.
%O https://www.stasi-unterlagen-archiv.de/en/archives/about-the-archives/ Accessed 2 April 2022

%D n.d.
%O https://eur-lex.europa.eu/procedure/EN/201286 Accessed 25 March 2022
%A EUR-Lex
%T Procedure 2012/0011/COD

%O https://hbr.org/2018/04/gdpr-and-the-end-of-the-internets-grand-bargain Accessed 25 March 2022
%T GDPR and the End of the Internet’s Grand Bargain
%D April 2018
%A Larry Downes
%J Harvard Business Review

%T Is the Intel Management Engine a backdoor? 
%A Jack Wallen
%D July 2016
%J TechRepublic
%O https://www.techrepublic.com/article/is-the-intel-management-engine-a-backdoor/
Accessed 25 March 2022

%T Why Windows 11 is forcing everyone to use TPM chips
%J The Verge
%A Tom Warren
%D June 2021
%O https://www.theverge.com/2021/6/25/22550376/microsoft-windows-11-tpm-chips-requirement-security Accessed 25 March 2022

%T Coming to a laptop near you: A new type of security chip from Microsoft
%A Dan Goodin
%D January 2022
%J Ars Technica
%O Accessed online 25 March 2022
%K pluton

%T Pixel 6: Setting a new standard for mobile security
%A Dave Kleidermacher
%A Jesse Seed
%A Brandon Barbello
%A Stephan Somogyi
%J Google Security Blog
%D October 2021
%O https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html
Accessed 25 March 2022

%T Why Big Tech should embrace the ‘right to repair’ revolution
%J Financial Times
%A Dave Lee
%D August 2021
%O Accessed online on 25 March 2022

%T A Notebook You Can Repair
%J New York Times Wirecutter
%A Thorin Klosowski
%D October 2021
%O https://www.nytimes.com/wirecutter/reviews/framework-laptop/
Accessed 25 March 2022

%T Post-Quantum Cryptography, Call for Proposals
%D 2017
%J National Institute of Standards and Technology Computer Security Resource Center
%A Lily Chen
%A Dustin Moody
%A Yi-Kai Liu
%O https://csrc.nist.gov/Projects/post-quantum-cryptography/post-quantum-cryptography-standardization/Call-for-Proposals
Accessed 25 March 2022

%A Alessandro Barenghi
%A G.M. Bertoni
%A Emanuele Parrinello
%A Gerardo Pelosi
%D September 2009
%J Conference: Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2009, Lausanne, Switzerland, 6 September 2009
%T Low Voltage Fault Attacks on the RSA Cryptosystem
%O DOI: 10.1109/FDTC.2009.30


%T Timing Attacks on RSA: Revealing Your Secrets through the Fourth Dimension
%D n.d.
%A Wing H. Wong
%O https://www.cs.sjsu.edu/faculty/stamp/students/article.html
Accessed 25 March 2022

%T Cache-Timing Attacks on RSA Key Generation
%D 2019
%J IACR Transactions on Cryptographic Hardware and Embedded Systems
%V 2019:4
%P 213–242
%O DOI: 10.13154/tches.v2019.i4.213-242
%A Alejandro Cabrera Aldaya 
%A Cesar Pereida García 
%A Luis Manuel Alvarez 
%A Billy Bob Brumley 

%A Tim Cook
%D February 2016
%O https://www.apple.com/customer-letter/
Accessed 25 March 2022

%T Inside the FBI's encryption battle with Apple
%A Danny Yadron
%A Spencer Ackerman 
%A Sam Thielman
%J The Guardian
%O Accessed online on 25 March 2022
%D Feb 2016

%A Signal
%D October 2021
%T Grand jury subpoena for Signal user data, Central District of California (again!)
%O https://signal.org/bigbrother/cd-california-grand-jury/
Accessed 26 March 2022

%J Ars Technica
%A Cyrus Farivar 
%D October 2016
%T FBI demands Signal user data, but there’s not much to hand over
%O Accessed online on 26 March 2022