--- a/hws/hw06.tex Tue Sep 26 12:03:24 2017 +0100
+++ b/hws/hw06.tex Tue Sep 26 12:10:41 2017 +0100
@@ -1,37 +1,65 @@
\documentclass{article}
\usepackage{../style}
-
\begin{document}
\section*{Homework 6}
-\HEADER
+\begin{enumerate}
+\item What are good uses of anonymity services like Tor?
-\begin{enumerate}
-\item Explain briefly the purpose of the certification authority in
- the public-private key encryption scheme.
+\item What is meant by the notion \emph{forward privacy}?
+
+\item What is a \emph{re-identification attack}?
-\item Explain briefly what is meant by a certification authority
- becoming ``too big to fail'' when it has issued a large number
- of certificates.
+\item Imagine you have a completely `innocent' email message,
+ like birthday wishes to your grandmother. Why should you
+ still encrypt this message and your grandmother take the
+ effort to decrypt it?
-\item In which situations does it make sense to install
- invalid (self-signed) certificates?
+ (Hint: The answer has nothing to do with preserving the
+ privacy of your grandmother and nothing to do with
+ keeping her birthday wishes supersecret. Also nothing to
+ do with you and grandmother testing the latest
+ encryption technology, nor just for the sake of it.)
-
-%\item Zero-knowledge protocols depend on three main properties called
-% completeness, soundness and zero-knowledge. Explain what they mean?
-
-%\item Why do zero-knowledge protocols require an NP-problem as building
-% block?
+\item One part of achieving privacy (but not the only one) is to
+ properly encrypt your conversations on the Internet. But this is
+ fiercely resisted by some spy agencies. These agencies (and some
+ politicians for that matter) argue that, for example, ISIL's
+ recruiters broadcast messages on, say, Twitter, and get people to
+ follow them. Then they move potential recruits to Twitter Direct
+ Messaging to evaluate if they are a legitimate recruit. If yes, they
+ move them to an encrypted mobile-messaging app. The spy agencies
+ argue that although they can follow the conversations on Twitter,
+ they ``go dark'' on the encrypted message app. To counter this
+ ``going-dark problem'', the spy agencies push for the implementation
+ of back-doors in iMessage and Facebook and Skype and everything else
+ UK or US-made, which they can use eavesdrop on conversations without
+ the conversants' knowledge or consent.\medskip
+
+ What is the fallacy in the spy agencies going-dark argument?
+ (Hint: Think what would happen if the spy agencies and certain
+ politicians get their wish.)
+
+\item DNA data is very sensitive and can easily violate the privacy of
+ (living) people. To get around this, two scientists from Denmark
+ proposed to create a \emph{necrogenomic database} which would record
+ the DNA data of all Danish citizens and residents at the time of
+ their \emph{death}. By matching these to information about illnesses
+ and ailments in life, helpful evidence could be gathered about the
+ genetic origins of diseases. The idea is that the privacy of dead
+ people cannot be violated.
-%\item Why is it a good choice in a ZKP to flip a coin when requesting a
-% proof from the person who knows the secret?
+ What is the fallacy behind this reasoning?
-\item \POSTSCRIPT
-\end{enumerate}
+\item A few years ago a Google executive tried to allay worries about
+ Google pooring over all your emails on Gmail. He said something
+ along the lines: you are watched by an algorithm; this is like being
+ naked in front of your dog. What is wrong with this argument?
+\item \POSTSCRIPT
+\end{enumerate}
\end{document}
%%% Local Variables: