hws/hw06.tex
changeset 534 62985f147c85
parent 496 cc4f49397abc
parent 523 7a6e8f603e08
--- a/hws/hw06.tex	Tue Sep 26 12:03:24 2017 +0100
+++ b/hws/hw06.tex	Tue Sep 26 12:10:41 2017 +0100
@@ -1,37 +1,65 @@
 \documentclass{article}
 \usepackage{../style}
 
-
 \begin{document}
 
 \section*{Homework 6}
 
-\HEADER
+\begin{enumerate}
+\item What are good uses of anonymity services like Tor?
 
-\begin{enumerate}
-\item Explain briefly the purpose of the certification authority in
-  the public-private key encryption scheme.
+\item What is meant by the notion \emph{forward privacy}?
+
+\item What is a \emph{re-identification attack}?
 
-\item Explain briefly what is meant by a certification authority
-  becoming ``too big to fail'' when it has issued a large number 
-  of certificates.
+\item Imagine you have a completely `innocent' email message,
+      like birthday wishes to your grandmother. Why should you
+      still encrypt this message and your grandmother take the
+      effort to decrypt it? 
 
-\item In which situations does it make sense to install
-  invalid (self-signed) certificates?
+      (Hint: The answer has nothing to do with preserving the
+      privacy of your grandmother and nothing to do with
+      keeping her birthday wishes supersecret. Also nothing to
+      do with you and grandmother testing the latest
+      encryption technology, nor just for the sake of it.)
 
-
-%\item Zero-knowledge protocols depend on three main properties called
-%  completeness, soundness and zero-knowledge.  Explain what they mean?
-
-%\item Why do zero-knowledge protocols require an NP-problem as building
-%  block?
+\item One part of achieving privacy (but not the only one) is to
+  properly encrypt your conversations on the Internet.  But this is
+  fiercely resisted by some spy agencies.  These agencies (and some
+  politicians for that matter) argue that, for example, ISIL's
+  recruiters broadcast messages on, say, Twitter, and get people to
+  follow them. Then they move potential recruits to Twitter Direct
+  Messaging to evaluate if they are a legitimate recruit. If yes, they
+  move them to an encrypted mobile-messaging app. The spy agencies
+  argue that although they can follow the conversations on Twitter,
+  they ``go dark'' on the encrypted message app. To counter this
+  ``going-dark problem'', the spy agencies push for the implementation
+  of back-doors in iMessage and Facebook and Skype and everything else
+  UK or US-made, which they can use eavesdrop on conversations without
+  the conversants' knowledge or consent.\medskip
+   
+      What is the fallacy in the spy agencies going-dark argument?
+      (Hint: Think what would happen if the spy agencies and certain
+      politicians get their wish.)
+       
+\item DNA data is very sensitive and can easily violate the privacy of
+  (living) people. To get around this, two scientists from Denmark
+  proposed to create a \emph{necrogenomic database} which would record
+  the DNA data of all Danish citizens and residents at the time of
+  their \emph{death}. By matching these to information about illnesses
+  and ailments in life, helpful evidence could be gathered about the
+  genetic origins of diseases.  The idea is that the privacy of dead
+  people cannot be violated.
 
-%\item Why is it a good choice in a ZKP to flip a coin when requesting a 
-%  proof from the person who knows the secret?
+      What is the fallacy behind this reasoning?
 
-\item \POSTSCRIPT
-\end{enumerate}
+\item A few years ago a Google executive tried to allay worries about
+  Google pooring over all your emails on Gmail. He said something
+  along the lines: you are watched by an algorithm; this is like being
+  naked in front of your dog. What is wrong with this argument?
 
+\item \POSTSCRIPT  
+\end{enumerate} 
 \end{document}
 
 %%% Local Variables: