| |
YiShinLaiSecondEssay 4 - 01 Mar 2020 - Main.EbenMoglen
|
|
META TOPICPARENT | name="SecondEssay" |
| | -- By YiShinLai - 03 Feb 2020 | |
< < | When Phil Zimmerman first made available to the masses Pretty Good Privacy (PGP), an end-to-end encryption program, in 1991, he seemed to have been ahead of his time. Internet, in most countries, was in its infancy stage. E-commerce was virtually non-existent, and internet privacy was not thought about, much less talked about. | > > | When Phil Zimmerman first made available to the masses Pretty Good Privacy (PGP), an end-to-end encryption program, in 1991, he seemed to have been ahead of his time. Internet, in most countries, was in its infancy stage. E-commerce was virtually non-existent, and internet privacy was not thought about, much less talked about.
Not the right adjective. "Strong public-key encryption" would have been the right designation. This again gives the knowledgeable reader the uneasy feeling you're talking about something you don't know.
As an introduction, what does this paragraph do? It doesn't state your idea, and it doesn't say anything more than that Zimmerman did something long ago.
| | Encryption and Hacking | | Third, we need to look within and ask ourselves what inherently is important to us when it comes to privacy. Do we want someone to always be able to see or know what exactly we do, where exactly we are, who exactly we meet, and what exactly we say? If the answer is no, then if we do not take steps to protect what is ours now, we should not be surprised if it is one day taken away.
| |
> > |
"The Government," as I said last time, is not a monolith. One of the improvements that didn't happen here was a more realistic summary of the various government positions.
This draft presents the problem as though the platform companies weren't offering better messaging and data security to their users in the post-Snowden world. Keeping others from surveilling the users they surveil has become more valuable to them, and confuses their users better. Your essay can improve by considering the effect of that dynamic.
| |
You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable.
To restrict access to your paper simply delete the "#" character on the next two lines: |
|
|
|
This site is powered by the TWiki collaboration platform. All material on this collaboration platform is the property of the contributing authors. All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
|
|
| |