blob: 1ef00f4919a01d06cd075795465144935e66c8f7 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
|
%T Stasiland
%A Anna Funder
%D 2003
%I Granta Books
%G ISBN 9781783787340
%T Global digital population as of January 2021
%A Joseph Johnson
%D 2021
%J Statista
%O https://www.statista.com/statistics/617136/digital-population-worldwide/"
%T Americans’ Internet Access: 2000-2015
%A Andrew Perrin
%A Maeve Duggan
%J Pew Research Center
%D 2015
%O https://www.pewresearch.org/internet/2015/06/26/americans-internet-access-2000-2015
%A van Mill, David
%T Freedom of Speech
%J The Stanford Encyclopedia of Philosophy
%E Edward N. Zalta
%O https://plato.stanford.edu/archives/spr2021/entries/freedom-speech/
%D 2021
%C Metaphysics Research Lab, Stanford University
%T Why Twitter’s Mission Statement Matters
%A Justin Fox
%D 2014
%J Harvard Business Review
%O https://hbr.org/2014/11/why-twitters-mission-statement-matters
%T The great firewall of China: Xi Jinping’s internet shutdown
%A Elizabeth C. Economy
%D 2018
%J The Guardian
%O https://www.theguardian.com/news/2018/jun/29/the-great-firewall-of-china-xi-jinpings-internet-shutdown .
%T Facebook’s push for end-to-end encryption is good news for user privacy, as well as terrorists and paedophiles
%J The Conversation
%A Roberto Musotto
%A David S. Wall
%D December 2019
%O https://theconversation.com/facebooks-push-for-end-to-end-encryption-is-good-news-for-user-privacy-as-well-as-terrorists-and-paedophiles-128782 (Accessed 22 January 2022)
%T How Terrorists Use Encryption
%V Volume 9, Issue 6
%A Robert Graham
%D June 2016
%J CTC Sentinel
%O https://ctc.usma.edu/how-terrorists-use-encryption/ (Accessed 22 January 2022)
%T The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States (9/11 Report)
%A National^Commission^on^Terrorist^Attacks^Upon^the^United^States
%D July 2004
%A Daniel Byman
%D 2014
%T The Intelligence War on Terrorism
%J Intelligence and National Security
%V 29:6
%P 837-863
%G DOI: 10.1080/02684527.2013.851876
%T International statement: End-to-end encryption and public safety
%A Home^Office
%D Oct 2020
%O https://www.gov.uk/government/publications/international-statement-end-to-end-encryption-and-public-safety
(Accessed 29 January 2021)
%T Between Myth and Reality: The Stasi Legacy in German History
%A Konrad Jarausch
%D 2014
%J Bulletin of the German Historical Institute
%C German Historical Institute Washington DC
%O https://www.ghi-dc.org/publication/stasi-at-home-and-abroad-domestic-order-and-foreign-intelligence .
%T Participatory Repression? Reflections on Popular Involvement with the Stasi
%A Gary Bruce
%D 2014
%J Bulletin of the German Historical Institute
%C German Historical Institute Washington DC
%O https://www.ghi-dc.org/publication/stasi-at-home-and-abroad-domestic-order-and-foreign-intelligence .
%T N.S.A. Able to Foil Basic Safeguards of Privacy on Web
%J The New York Times
%A Nicole Perlroth
%A Jeff Larson
%A Scott Shane
%D Sep 2013
%O https://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html
(Accessed 3rd February 2022)
%T Photos of an NSA “upgrade” factory show Cisco router getting implant
%A Sean Gallagher
%J Ars Technica
%D May 2014
%O https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/
(Accessed 3rd February 2022)
%T Revealed: The NSA's Secret Campaign to Crack, Undermine Internet Security
%J Pro Publica
%A Jeff Larson
%D Sep 2013
%O https://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption
(Accessed 3rd February 2022)
%T U.S. Confirms That It Gathers Online Data Overseas
%A Charlie Savage
%A Edward Wyatt
%A Peter Baker
%D June 2013
%J The New York Times
%O Accessed online on 17th February 2022
%T NSA collecting phone records of millions of Verizon customers daily
%A Glenn Greenwald
%D June 2013
%J The Guardian
%O Accessed online on 17th February 2022
%T Anger swells after NSA phone records court order revelations
%J The Guardian
%D June 2013
%A Dan Roberts
%A Spencer Ackerman
%O Accessed online on 17th February 2022
-- lawmaking
%T US House passes bill to boost chip manufacturing and R&D
%J The Register
%D Feb 2022
%A Agam Shah
%O Accessed online on 6th February 2022
%A H.R.3773
%T 110th Congress (2007-2008): FISA Amendments Act of 2008
%D (2008)
-- Intel management engine
%T Intel's Management Engine is a security hazard, and users need a way to disable it
%A Erica Portnoy
%A Peter Eckersley
%D May 2017
%J Electronic Frontier Foundation
%O https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it (Accessed 22 January 2022)
%T Intel ME controller chip has secret kill switch
%J The Register
%A Thomas Claburn
%D Aug 2017
%O Accessed online on 6th February 2022
%T Researchers Find a Way to Disable Much-Hated Intel ME Component Courtesy of the NSA
%A Catalin Cimpanu
%J BleepingComputer
%D Aug 2017
%O https://www.bleepingcomputer.com/news/hardware/researchers-find-a-way-to-disable-much-hated-intel-me-component-courtesy-of-the-nsa/
(Accessed 6th February 2022)
-- Spectre, meltdown
%T Researchers Discover Two Major Flaws in the World’s Computers
%J The New York Times
%D Jan 2018
%A Cade Metz
%A Nicole Perlroth
%O https://www.nytimes.com/2018/01/03/business/computer-flaws.html
(Accessed 7th February 2022)
%T One-time Pad
%A Dirk Rijmenants
%D n.d.
%O https://www.ciphermachinesandcryptology.com/en/onetimepad.htm
(Accessed 26th February 2022)
-- quantum
%T Report on Post-Quantum Cryptography
%A Lily Chen
%A Stephen Jordan
%A Yi-Kai Liu
%A Dustin Moody
%A Rene Peralta
%A Ray Perlner
%A Daniel Smith-Tone
%J National Institute of Standards and Technology
%D April 2016
%O https://nvlpubs.nist.gov/nistpubs/ir/2016/nist.ir.8105.pdf .
%T Quantum information research in China
%A Qiang Zhang
%A Feihu Xu
%A Li Li
%A Nai-Le Liu
%A Jian-Wei Pan
%D Nov 2019
%J Quantum Science and Technology
%V 4 040503
%O https://iopscience.iop.org/article/10.1088/2058-9565/ab4bea/ .
%T Physicists in China challenge Google’s ‘quantum advantage’
%A Philip Ball
%D Dec 2020
%J Nature
%O https://www.nature.com/articles/d41586-020-03434-7
(Accessed 13th January 2022)
%T Hello quantum world! Google publishes landmark quantum supremacy claim
%A Elizabeth Gibney
%D Oct 2019
%J Nature
%O https://www.nature.com/articles/d41586-019-03213-z
(Accessed 13th January 2022)
%T Quantum computational advantage using photons
%A Han-Sen Zhong^et^al
%D 2020
%O DOI: 10.1126/science.abe8770
%T Google Claims To Achieve Quantum Supremacy — IBM Pushes Back
%J NPR
%D Oct 2019
%A Paolo Zialcita
%O https://www.npr.org/2019/10/23/772710977/google-claims-to-achieve-quantum-supremacy-ibm-pushes-back .
%T Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process
%D July 2020
%J National Institute of Standards and Technology
%R NISTIR 8309
%O DOI: 10.6028/NIST.IR.8309
%A Gorjan Alagic
%A Jacob Alperin-Sheriff
%A Daniel Apon
%A David Cooper
%A Quynh Dang
%A John Kelsey
%A Yi-Kai Liu
%A Carl Miller
%A Dustin Moody
%A Rene Peralta
%A Ray Perlner
%A Angela Robinson
%A Daniel Smith-Tone
%J European Journal of Privacy Law & Technologies
%D 2021
%N 1
%T Post-quantum encryption and privacy regulation: Can the law keep pace with technology?
%A Luigi Bruno
%A Isabella Spano
%O https://universitypress.unisob.na.it/ojs/index.php/ejplt/article/view/1225 .
%T The Hidden Truth Anonymity in Cyberspace: Deep Web
%D 2018
%A Saksham Gulati
%A Shilpi Sharma
%A Garima Agarwal
%J Advances in Intelligent Systems and Computing
%V 673
%P 719–730
%O DOI: 10.1007/978-981-10-7245-1_70
%T China Cracks Down on Tor Anonymity Network
%A David Talbot
%D Oct 2009
%J MIT Technology Review
%T How China Is Blocking Tor
%A Philipp Winter
%A Stefan Lindskog
%J Karlstad University
%G arXiv:1204.0447 [cs.CR]
%D Apr 2012
%A Chen Chen^et^al
%T Xuantie-910: A Commercial Multi-Core 12-Stage Pipeline Out-of-Order 64-bit High Performance RISC-V Processor with Vector Extension
%D 2020
%J ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA)
%O DOI: 10.1109/isca45697.2020.00016
%T Instruction Sets Should Be Free: The Case For RISC-V
%A Krste Asanović
%A David A. Patterson
%J Electrical Engineering and Computer Sciences
%C University of California at Berkeley
%R UCB/EECS-2014-146
%D Aug 2014
%T Exclusive: Secret contract tied NSA and security industry pioneer
%A Joseph Menn
%J Reuters
%D Dec 2013
%O https://www.reuters.com/article/us-usa-security-rsa-idUSBRE9BJ1C220131220
(Accessed 5 March 2022)
%T RSA issues non-denying denial of NSA deal to favor flawed crypto code
%J Ars Technica
%A Dan Goodin
%D Dec 2013
%O https://arstechnica.com/information-technology/2013/12/rsa-issues-non-denying-denial-of-nsa-deal-to-favor-flawed-crypto-code/
(Accessed 5 March 2022)
%T Government Announces Steps to Restore Confidence on Encryption Standards
%A Nicole Perlroth
%D September 2013
%J The New York Times
%O https://bits.blogs.nytimes.com/2013/09/10/government-announces-steps-to-restore-confidence-on-encryption-standards/
(Accessed 5 March 2022)
%A Paul Kocher
%A Jann Horn
%A Anders Fogh
%A Daniel Genkin
%A Daniel Gruss
%A Werner Haas
%A Mike Hamburg
%A Moritz Lipp
%A Stefan Mangard
%A Thomas Prescher
%A Michael Schwarz
%A Yuval Yarom
%T Spectre Attacks: Exploiting Speculative Execution
%D 2019
%O DOI: 10.1109/SP.2019.00002
%T GCHQ taps fibre-optic cables for secret access to world's communications
%J The Guardian
%D June 2013
%A Ewen MacAskill
%A Julian Borger
%A Nick Hopkins
%A Nick Davies
%A James Ball
%O Accessed online on 2 April 2022
%T The Cold War Broadcast That Gave East German Dissidents A Voice
%J NPR
%D November 2014
%A Esme Nicholson
%O Accessed online on 2 April 2022
%A The^Federal^Archives
%T About the Stasi Records Archive
%D n.d.
%O https://www.stasi-unterlagen-archiv.de/en/archives/about-the-archives/ Accessed 2 April 2022
%D n.d.
%O https://eur-lex.europa.eu/procedure/EN/201286 Accessed 25 March 2022
%A EUR-Lex
%T Procedure 2012/0011/COD
%O https://hbr.org/2018/04/gdpr-and-the-end-of-the-internets-grand-bargain Accessed 25 March 2022
%T GDPR and the End of the Internet’s Grand Bargain
%D April 2018
%A Larry Downes
%J Harvard Business Review
|