Editing 504: Legal Hacks

Jump to: navigation, search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 8: Line 8:
  
 
==Explanation==
 
==Explanation==
 +
[[Megan]] notices that an {{w|Internet Service Provider}} (ISP) is blocking access to some webpages. [[Cueball]] is thankful that cryptology offers a way around such censorship. Encryption, sometimes called "cryptography," or "crypto" for short, is the art of transmitting messages that can only be read by the intended receiver(s) by using mathematical techniques to systematically re-arrange the data in the message. For example, if each letter of the alphabet has a number assigned to it (A = 1, B = 2, C = 3), and so on, and the person receiving your message already knows a nice long, hard-to-guess number (say, the exact latitude-and-longitude coordinates of the treehouse you used to play in as kids), then you can 'rotate' or 'shuffle' each of the letters in your message by the digits of your hard-to-guess number so that only someone who knows that number will be able to decode the message.
  
[[Megan]] notices that an {{w|Internet Service Provider}} (ISP) is blocking access to some webpages. [[Cueball]] is thankful that cryptography offers a way around such censorship.  
+
One popular and effective way to encrypt messages is called {{w|RSA_(algorithm)|"RSA,"}} after the last initials of the three cryptographers who invented it. The RSA technique relies on the fact that it is much easier to multiply two medium-sized numbers together than it is to factor a large number back into two medium numbers. For example, given the numbers 13 and 17, most middle schoolers can figure out that 13 * 17 = 221, but given only the number 253, it is much harder to figure out what numbers can be multiplied together to arrive there. This principle holds (and intensifies) as numbers get larger, so that a number with 600 digits (or a phrase with 400 letters) can be used to make a code virtually unbreakable with present technology.
  
Encryption, the study and use of which is known as "cryptography," or "crypto" for short ("crypto" in more recent years has tended to be short for "cryptocurrency", but not in this case), is the art of transmitting messages that can only be read by the intended receiver(s) by using mathematical techniques to conceal ("encrypt") the data in the message. One common and effective way to encrypt messages is the {{w|RSA_(algorithm)|RSA algorithm}}, which is based on the difficulty of {{w|integer factorization}} for products of two prime numbers.
+
Being able to share unbreakable codes and decrypt other people's codes gives countries a military advantage - for example, in World War II, the Americans and British were often able to figure out where a German attack would be coming and send reinforcements there, because they had cracked the German codes. Because of this, the United States government initially tried to keep the mathematical details of the RSA technique inside the country by classifying the techniques as a weapon. It is a crime to share certain kinds of weapons technology with other countries without permission. Amateur and professional cryptographers, angry about the attempt to restrict their work, lobbied the government to change the rule and stop treating cryptography as a weapon, in part so that they could continue to collaborate with colleagues overseas, and in part because they wanted the ability to pass secret messages that the government could not easily decrypt.
  
Being able to share unbreakable codes and decrypt other people's codes gives countries a military advantage - for example, in World War II, the Americans and British were often able to figure out where a German attack would be coming and send reinforcements there, because they had cracked the {{w|Enigma_machine|German codes}}. Because of this, the {{w|Export_of_cryptography_from_the_United_States|United States government initially tried to keep}} the mathematical details of strong encryption algorithms (including RSA) inside the country by classifying the algorithms as a weapon. It is a crime to share certain kinds of weapons technology with other countries without permission. Amateur and professional cryptographers, angry about the attempt to restrict their work, lobbied the government to change the rule and stop treating cryptography as a weapon, in part so that they could continue to collaborate with colleagues overseas, and in part because they wanted the ability to pass secret messages that the government could not easily decrypt. The export restrictions were gradually loosened and would have mostly been lifted by the year 2000.
+
In the comic, [[Megan]] makes the provocative and counter-intuitive point that perhaps the cryptographic community could have best ensured easy access to the RSA technique by *allowing* the government to treat RSA as a weapon, and then, once everyone is certain that RSA is a weapon, invoking the Second Amendment to the United States Constitution, which says that "A well regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms, shall not be infringed." In other words, if RSA were a weapon, perhaps the government would be powerless to stop ordinary people from 'bearing,' i.e., obtaining and using, that weapon.
 
 
In the comic, [[Megan]] makes the provocative and counter-intuitive point that perhaps the cryptographic community could have best ensured easy access to the RSA technique by *allowing* the government to treat RSA as a weapon, and then, once everyone is certain that RSA is a weapon, invoking the {{w|Second Amendment to the United States Constitution}}, commonly known as the "{{w|Right to keep and bear arms in the United States|right to bear arms}}" amendment (that is, the right to own and use weapons). In other words, if RSA were a weapon, it would be granted constitutional protections.
 
 
 
This interpretation is likely a reference to the very strong social and political movements opposing arms control in the United States.  The legal basis for this movement is the position that most or all laws prohibiting private ownership of firearms (and potentially other weapons), violate the Second Amendment. Accordingly, publicly referring to the Second Amendment tends to imply opposition to gun control. Megan's implication is that, by connecting RSA to this debate, crypto enthusiasts would gain a large group of unlikely allies who are strongly committed to keeping weapons legal and unrestricted. They could also invoke the legal cover of the Constitution, allowing them to fight restrictions in court.
 
  
 
[[Cueball]] is surprised and impressed by this point, and pauses to contemplate Megan's strategy.
 
[[Cueball]] is surprised and impressed by this point, and pauses to contemplate Megan's strategy.
  
It should be noted that there are major weaknesses in this argument. The Second Amendment only applies in the United States, meaning that imports and exports of munitions could still be banned. It might provide some protections against the ability of the US government to restrict RSA within US borders, but it could still be restricted in other countries, potentially hampering its use in global communications.
+
The title text claims that this is a reasonable interpretation of the Constitution, because cryptography (a modern weapon) is analogous to muskets and cannons (the weaponry in use in the 1780s, when the Second Amendment was drafted). As evidence for the analogy, the title text points out that Jefferson would have been a big fan of cryptography, which is plausible, because President Thomas Jefferson (the 3rd President of the United States) was an amateur scientist who enjoyed studying a very wide variety of fields (in fact, he invented the {{w|Jefferson_disk|Jefferson disk}} , an encryption device that was quite advanced for its time). The point is somewhat facetious, because it is hard to imagine a modern technique that Jefferson would *not* "be totally into." Also, the mere fact that an early President was a fan of a technique is not very good legal evidence that the technique would be covered by a particular Amendment.
 
 
The title text claims that this is a reasonable interpretation of the Constitution, because cryptography (a modern weapon) is analogous to muskets and cannons (the weaponry in use in the 1780s, when the Second Amendment was drafted). As evidence for the analogy, the title text points out that Jefferson would have been a big fan of cryptography, which is plausible, because President {{w|Thomas Jefferson}} (the 3rd President of the United States) was an amateur scientist who enjoyed studying a very wide variety of fields (in fact, he invented the {{w|Jefferson disk}}, an encryption device that was quite advanced for its time). The point is somewhat facetious, because it is hard to imagine a modern technique that Jefferson would ''not'' "be totally into." Also, the mere assertion that an early President would have been a fan of a technique is not very good evidence that the technique would be legally permitted by a particular Amendment.
 
  
 
==Transcript==
 
==Transcript==
Line 38: Line 33:
  
 
:[She is now turned around in the chair looking at Cueball, who is in-panel again.]
 
:[She is now turned around in the chair looking at Cueball, who is in-panel again.]
:Megan: Once they get complacent, we break out the second amendment
+
:Megan: Once they get complacent, we break out the second amendment.
 
:[Cueball has his hand on his chin, contemplatively.]
 
:[Cueball has his hand on his chin, contemplatively.]
 
:Cueball: ...Damn.
 
:Cueball: ...Damn.

Please note that all contributions to explain xkcd may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see explain xkcd:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel | Editing help (opens in new window)