From 085bb990d1dc0c212da28c127d7a69b75b2dc166 Mon Sep 17 00:00:00 2001 From: djoate <56777051+djoate@users.noreply.github.com> Date: Sun, 24 Nov 2019 00:49:48 -0500 Subject: [PATCH] Key /providers/ This covers * Global Mass Surveillance - The Fourteen Eyes * Key Disclosure Law * What is a warrant canary? --- _includes/panel.html | 2 +- _includes/sections/fourteen-eyes.html | 66 +-- _includes/sections/key-disclosure-law.html | 117 +++-- _includes/sections/warrant-canary.html | 24 +- pages/providers.html | 18 +- weblate-source-file.yml | 570 ++++++++++++--------- 6 files changed, 444 insertions(+), 353 deletions(-) diff --git a/_includes/panel.html b/_includes/panel.html index ed21ee28..20f02696 100644 --- a/_includes/panel.html +++ b/_includes/panel.html @@ -5,7 +5,7 @@ {% else %}
{% endif %} -

{{include.title}}

+

{{include.title | translate_text}}

{{include.body}} diff --git a/_includes/sections/fourteen-eyes.html b/_includes/sections/fourteen-eyes.html index 153921fe..850e8b7e 100644 --- a/_includes/sections/fourteen-eyes.html +++ b/_includes/sections/fourteen-eyes.html @@ -1,45 +1,53 @@ -

Global Mass Surveillance - The Fourteen Eyes

+

{% t Global Mass Surveillance - The Fourteen Eyes %}

+ +{% t UKUSA Agreement %} + +

{% t The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes); however, Five Eyes and third-party countries can and do spy on each other. %}

-UKUSA Agreement -

The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes); however, Five Eyes and third-party countries can and do spy on each other.

+ {% capture five_eyes_card %} +
    +
  1. {% t Australia %}
  2. +
  3. {% t Canada %}
  4. +
  5. {% t New Zealand %}
  6. +
  7. {% t United Kingdom %}
  8. +
  9. {% t United States of America %}
  10. +
+ {% endcapture %} + {% include panel.html color="danger" title="Five Eyes" - body=' -
    -
  1. Australia
  2. -
  3. Canada
  4. -
  5. New Zealand
  6. -
  7. United Kingdom
  8. -
  9. United States of America
  10. -
- ' + body=five_eyes_card %} + {% capture nine_eyes_card %} +
    +
  1. {% t Denmark %}
  2. +
  3. {% t France %}
  4. +
  5. {% t Netherlands %}
  6. +
  7. {% t Norway %}
  8. +
+ {% endcapture %} + {% include panel.html color="warning" title="Nine Eyes" - body=' -
    -
  1. Denmark
  2. -
  3. France
  4. -
  5. Netherlands
  6. -
  7. Norway
  8. -
- ' + body=nine_eyes_card %} + {% capture fourteen_eyes_card %} +
    +
  1. {% t Belgium %}
  2. +
  3. {% t Germany %}
  4. +
  5. {% t Italy %}
  6. +
  7. {% t Spain %}
  8. +
  9. {% t Sweden %}
  10. +
+ {% endcapture %} + {% include panel.html color="secondary" title="Fourteen Eyes" - body=' -
    -
  1. Belgium
  2. -
  3. Germany
  4. -
  5. Italy
  6. -
  7. Spain
  8. -
  9. Sweden
  10. -
- ' + body=fourteen_eyes_card %}
diff --git a/_includes/sections/key-disclosure-law.html b/_includes/sections/key-disclosure-law.html index b1f7e698..5b543a96 100644 --- a/_includes/sections/key-disclosure-law.html +++ b/_includes/sections/key-disclosure-law.html @@ -1,88 +1,93 @@ -

Key Disclosure Law

+

{% t Key Disclosure Law %}

-

Who is required to hand over the encryption keys to authorities?

+

{% t Who is required to hand over the encryption keys to authorities? %}

-

Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.

Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).

+

{% t Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.

Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data). %}

+ {% capture apply_card %} +
    +
  1. {% t Antigua and Barbuda %}
  2. +
  3. {% t Australia %}
  4. +
  5. {% t Canada %}
  6. +
  7. {% t France %}
  8. +
  9. {% t India %}
  10. +
  11. {% t Ireland %}
  12. +
  13. {% t Norway %}
  14. +
  15. {% t Russia %}
  16. +
  17. {% t South Africa %}
  18. +
  19. {% t United Kingdom %}
  20. +
+ {% endcapture %} + {% include panel.html color="danger" title="Key disclosure laws apply" - body=' -
    -
  1. Antigua and Barbuda
  2. -
  3. Australia
  4. -
  5. Canada
  6. -
  7. France
  8. -
  9. India
  10. -
  11. Ireland
  12. -
  13. Norway
  14. -
  15. Russia
  16. -
  17. South Africa
  18. -
  19. United Kingdom
  20. -
- ' + body=apply_card %} + {% capture mayapply_card %} +
    +
  1. {% t Belgium * %}
  2. +
  3. {% t Estonia %}
  4. +
  5. {% t Finland * %}
  6. +
  7. {% t New Zealand %} ({% t unclear %})
  8. +
  9. {% t The Netherlands * %}
  10. +
  11. {% t United States %} ({% t see related info %})
  12. +
+ {% endcapture %} + {% include panel.html color="warning" title="Key disclosure laws may apply" - body=' -
    -
  1. Belgium *
  2. -
  3. Estonia
  4. -
  5. Finland *
  6. -
  7. New Zealand (unclear)
  8. -
  9. The Netherlands *
  10. -
  11. United States (see related info)
  12. -
- ' + body=mayapply_card %} + {% capture dontapply_card %} +
    +
  1. {% t Czech Republic %}
  2. +
  3. {% t Germany %}
  4. +
  5. {% t Iceland %}
  6. +
  7. {% t Italy %}
  8. +
  9. {% t Poland %}
  10. +
  11. {% t Sweden %} ({% t proposed %})
  12. +
  13. {% t Switzerland %}
  14. +
+ {% endcapture %} + {% include panel.html color="success" title="Key disclosure laws don't apply" - body=' -
    -
  1. Czech Republic
  2. -
  3. Germany
  4. -
  5. Iceland
  6. -
  7. Italy
  8. -
  9. Poland
  10. -
  11. Sweden (proposed)
  12. -
  13. Switzerland
  14. -
- ' + body=dontapply_card %}
-

* (people who know how to access a system may be ordered to share their knowledge, however, this doesn't apply to the suspect itself or family members.)

+

{% t * (people who know how to access a system may be ordered to share their knowledge, however, this doesn't apply to the suspect itself or family members.) %}

-

Related Information

+

{% t Related Information %}

-

Why is it not recommended to choose a US-based service?

+

{% t Why is it not recommended to choose a US-based service? %}

-USA +{% t USA %} -

Services based in the United States are not recommended because of the country's surveillance programs and use of National Security Letters (NSLs) with accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and transform the service into a tool of mass surveillance.

+

{% t Services based in the United States are not recommended because of the country's surveillance programs and use of National Security Letters (NSLs) with accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and transform the service into a tool of mass surveillance. %}

-

An example of this is Lavabit – a secure email service created by Ladar Levison. The FBI requested Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access -communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.

+

{% t An example of this is Lavabit – a secure email service created by Ladar Levison. The FBI requested Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.%}

-

Ultimately, Levison turned over the SSL keys and shut down the service at the same time. The US government then threatened Levison with arrest, saying that shutting down the service was a violation of the court order.

+

{% t Ultimately, Levison turned over the SSL keys and shut down the service at the same time. The US government then threatened Levison with arrest, saying that shutting down the service was a violation of the court order. %}

-

Related Information

+

{% t Related Information %}

diff --git a/_includes/sections/warrant-canary.html b/_includes/sections/warrant-canary.html index 2f128248..edfb04b0 100644 --- a/_includes/sections/warrant-canary.html +++ b/_includes/sections/warrant-canary.html @@ -1,22 +1,22 @@ -

What is a warrant canary?

+

{% t What is a warrant canary? %}

-Warrant Canary Example +{% t Warrant Canary Example %} -

A warrant canary is a posted document stating that an organization has not received any secret subpoenas during a specific period of time. If this document fails to be updated during the specified time then the user is to assume that the service has received such a subpoena and should stop using the service.

+

{% t A warrant canary is a posted document stating that an organization has not received any secret subpoenas during a specific period of time. If this document fails to be updated during the specified time then the user is to assume that the service has received such a subpoena and should stop using the service. %}

-

Warrant Canary Examples:

+

{% t Warrant Canary Examples: %}

    -
  1. https://proxy.sh/canary
  2. -
  3. https://www.ivpn.net/resources/canary.txt
  4. -
  5. https://www.bolehvpn.net/canary.txt
  6. -
  7. https://www.ipredator.se/static/downloads/canary.txt
  8. +
  9. {% t https://proxy.sh/canary %}
  10. +
  11. {% t https://www.ivpn.net/resources/canary.txt %}
  12. +
  13. {% t https://www.bolehvpn.net/canary.txt %}
  14. +
  15. {% t https://www.ipredator.se/static/downloads/canary.txt %}
-

Related Warrant Canary Information

+

{% t Related Warrant Canary Information %}

diff --git a/pages/providers.html b/pages/providers.html index ad29b36b..7292470e 100644 --- a/pages/providers.html +++ b/pages/providers.html @@ -12,15 +12,15 @@ translate: true
diff --git a/weblate-source-file.yml b/weblate-source-file.yml index c0a1c3fe..b73057a9 100644 --- a/weblate-source-file.yml +++ b/weblate-source-file.yml @@ -1544,6 +1544,321 @@ How_do_you_counter_the_I_have_nothing_to_hide?_argument?_reddit.com: | httpspapers.ssrn.comsol3papers.cfm?abstract_id998565: | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565 +Global_Mass_Surveillance__The_Fourteen_Eyes: | + Global Mass Surveillance - The Fourteen Eyes + +UKUSA_Agreement: | + UKUSA Agreement + +The_UKUSA_Agreement_is_an_agreement_between_the_United_Kingdom_United_States_Australia_Canada_and: | + The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes); however, Five Eyes and third-party countries can and do spy on each other. + +Australia: | + Australia + +Canada: | + Canada + +New_Zealand: | + New Zealand + +United_Kingdom: | + United Kingdom + +United_States_of_America: | + United States of America + +Five_Eyes: | + Five Eyes + +Denmark: | + Denmark + +France: | + France + +Netherlands: | + Netherlands + +Norway: | + Norway + +Nine_Eyes: | + Nine Eyes + +Belgium: | + Belgium + +Germany: | + Germany + +Italy: | + Italy + +Spain: | + Spain + +Sweden: | + Sweden + +Fourteen_Eyes: | + Fourteen Eyes + +Key_Disclosure_Law: | + Key Disclosure Law + +Who_is_required_to_hand_over_the_encryption_keys_to_authorities?: | + Who is required to hand over the encryption keys to authorities? + +Mandatory_a_hrefhttpsen.wikipedia.orgwikiKey_disclosure_lawkey_disclosure_lawsa_require_: | + Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.

Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data). + +httpsen.wikipedia.orgwikiKey_disclosure_lawAntigua_and_Barbuda: | + https://en.wikipedia.org/wiki/Key_disclosure_law#Antigua_and_Barbuda + +Antigua_and_Barbuda: | + Antigua and Barbuda + +httpsen.wikipedia.orgwikiKey_disclosure_lawAustralia: | + https://en.wikipedia.org/wiki/Key_disclosure_law#Australia + +httpsen.wikipedia.orgwikiKey_disclosure_lawCanada: | + https://en.wikipedia.org/wiki/Key_disclosure_law#Canada + +httpsen.wikipedia.orgwikiKey_disclosure_lawFrance: | + https://en.wikipedia.org/wiki/Key_disclosure_law#France + +httpsen.wikipedia.orgwikiKey_disclosure_lawIndia: | + https://en.wikipedia.org/wiki/Key_disclosure_law#India + +India: | + India + +httpsen.wikipedia.orgwikiKey_disclosure_lawIreland: | + https://en.wikipedia.org/wiki/Key_disclosure_law#Ireland + +Ireland: | + Ireland + +httpsedri.orgnorwayintroducesforcedbiometricauthentication: | + https://edri.org/norway-introduces-forced-biometric-authentication/ + +httpswww.bloomberg.comnewsarticles20180320telegramlosesbidtostoprussiafromgettingenc: | + https://www.bloomberg.com/news/articles/2018-03-20/telegram-loses-bid-to-stop-russia-from-getting-encryption-keys + +Russia: | + Russia + +httpsen.wikipedia.orgwikiKey_disclosure_lawSouth_Africa: | + https://en.wikipedia.org/wiki/Key_disclosure_law#South_Africa + +South_Africa: | + South Africa + +httpsen.wikipedia.orgwikiKey_disclosure_lawUnited_Kingdom: | + https://en.wikipedia.org/wiki/Key_disclosure_law#United_Kingdom + +Key_disclosure_laws_apply: | + Key disclosure laws apply + +httpsen.wikipedia.orgwikiKey_disclosure_lawBelgium: | + https://en.wikipedia.org/wiki/Key_disclosure_law#Belgium + +Belgium_: | + Belgium * + +httpswww.riigiteataja.eeakt106012016019: | + https://www.riigiteataja.ee/akt/106012016019 + +Estonia: | + Estonia + +httpsen.wikipedia.orgwikiKey_disclosure_lawFinland: | + https://en.wikipedia.org/wiki/Key_disclosure_law#Finland + +Finland_: | + Finland * + +httpsen.wikipedia.orgwikiKey_disclosure_lawNew_Zealand: | + https://en.wikipedia.org/wiki/Key_disclosure_law#New_Zealand + +unclear: | + unclear + +httpsen.wikipedia.orgwikiKey_disclosure_lawThe_Netherlands: | + https://en.wikipedia.org/wiki/Key_disclosure_law#The_Netherlands + +The_Netherlands_: | + The Netherlands * + +httpsen.wikipedia.orgwikiKey_disclosure_lawUnited_States: | + https://en.wikipedia.org/wiki/Key_disclosure_law#United_States + +United_States: | + United States + +see_related_info: | + see related info + +Key_disclosure_laws_may_apply: | + Key disclosure laws may apply + +httpsen.wikipedia.orgwikiKey_disclosure_lawCzech_Republic: | + https://en.wikipedia.org/wiki/Key_disclosure_law#Czech_Republic + +Czech_Republic: | + Czech Republic + +httpsen.wikipedia.orgwikiKey_disclosure_lawGermany: | + https://en.wikipedia.org/wiki/Key_disclosure_law#Germany + +httpsen.wikipedia.orgwikiKey_disclosure_lawIceland: | + https://en.wikipedia.org/wiki/Key_disclosure_law#Iceland + +Iceland: | + Iceland + +httpsiclg.compracticeareascybersecuritylawsandregulationsitaly: | + https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/italy + +httpsen.wikipedia.orgwikiKey_disclosure_lawPoland: | + https://en.wikipedia.org/wiki/Key_disclosure_law#Poland + +Poland: | + Poland + +httpsen.wikipedia.orgwikiKey_disclosure_lawSweden: | + https://en.wikipedia.org/wiki/Key_disclosure_law#Sweden + +proposed: | + proposed + +httpswww.wikipedia.orgwikiKey_disclosure_lawSwitzerland: | + https://www.wikipedia.org/wiki/Key_disclosure_law#Switzerland + +Switzerland: | + Switzerland + +Key_disclosure_laws_dont_apply: | + Key disclosure laws don't apply + +_people_who_know_how_to_access_a_system_may_be_ordered_to_share_their_knowledge_stronghowever_t: | + * (people who know how to access a system may be ordered to share their knowledge, however, this doesn't apply to the suspect itself or family members.) + +Related_Information: | + Related Information + +httpsen.wikipedia.orgwikiKey_disclosure_law: | + https://en.wikipedia.org/wiki/Key_disclosure_law + +Wikipedia_page_on_key_disclosure_law: | + Wikipedia page on key disclosure law + +httpslaw.stackexchange.comquestions1523canauscitizenberequiredtoprovidetheauthenticati: | + https://law.stackexchange.com/questions/1523/can-a-us-citizen-be-required-to-provide-the-authentication-key-for-encrypted-dat + +law.stackexchange.com_question_about_key_disclosure_law_in_US: | + law.stackexchange.com question about key disclosure law in US + +httpspeertube.mastodon.hostvideoswatche09915eb59624830a02f8da5c2b59e71: | + https://peertube.mastodon.host/videos/watch/e09915eb-5962-4830-a02f-8da5c2b59e71 + +DEFCON_20_Crypto_and_the_Cops_the_Law_of_Key_Disclosure_and_Forced_Decryption: | + DEFCON 20: Crypto and the Cops: the Law of Key Disclosure and Forced Decryption + +Why_is_it_not_recommended_to_choose_a_USbased_service?: | + Why is it not recommended to choose a US-based service? + +USA: | + USA + +Services_based_in_the_United_States_are_not_recommended_because_of_the_countrys_surveillance_program: | + Services based in the United States are not recommended because of the country's surveillance programs and use of National Security Letters (NSLs) with accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and transform the service into a tool of mass surveillance. + +An_example_of_this_is_a_hrefhttpsen.wikipedia.orgwikiLavabitSuspension_and_gag_orderLavabi: | + An example of this is Lavabit – a secure email service created by Ladar Levison. The FBI requested Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's. + +Ultimately_Levison_turned_over_the_SSL_keys_and_a_hrefhttpswww.theguardian.comcommentisfree2: | + Ultimately, Levison turned over the SSL keys and shut down the service at the same time. The US government then threatened Levison with arrest, saying that shutting down the service was a violation of the court order. + +httpswww.bestvpn.comtheultimateprivacyguideavoidus: | + https://www.bestvpn.com/the-ultimate-privacy-guide/#avoidus + +Avoid_all_US_and_UK_based_services: | + Avoid all US and UK based services + +httpsen.wikipedia.orgwikiSurespotHistory: | + https://en.wikipedia.org/wiki/Surespot#History + +Proof_that_warrant_canaries_work_based_on_the_surespot_example.: | + Proof that warrant canaries work based on the surespot example. + +httpsen.wikipedia.orgwikiUKUSA_Agreement: | + https://en.wikipedia.org/wiki/UKUSA_Agreement + +The_United_Kingdom__United_States_of_America_Agreement_UKUSA: | + The United Kingdom – United States of America Agreement (UKUSA) + +httpsen.wikipedia.orgwikiLavabitSuspension_and_gag_order: | + https://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order + +Lavabit_Suspension_and_gag_order: | + Lavabit: Suspension and gag order + +Key_disclosure_law: | + Key disclosure law + +httpsen.wikipedia.orgwikiPortalMass_surveillance: | + https://en.wikipedia.org/wiki/Portal:Mass_surveillance + +Wikipedia_Portal_Mass_surveillance: | + Wikipedia Portal: Mass_surveillance + +What_is_a_warrant_canary?: | + What is a warrant canary? + +Warrant_Canary_Example: | + Warrant Canary Example + +A_warrant_canary_is_a_posted_document_stating_that_an_organization_has_not_received_any_secret_subpoe: | + A warrant canary is a posted document stating that an organization has not received any secret subpoenas during a specific period of time. If this document fails to be updated during the specified time then the user is to assume that the service has received such a subpoena and should stop using the service. + +Warrant_Canary_Examples: | + Warrant Canary Examples: + +httpsproxy.shcanary: | + https://proxy.sh/canary + +httpswww.ivpn.netresourcescanary.txt: | + https://www.ivpn.net/resources/canary.txt + +httpswww.bolehvpn.netcanary.txt: | + https://www.bolehvpn.net/canary.txt + +httpswww.ipredator.sestaticdownloadscanary.txt: | + https://www.ipredator.se/static/downloads/canary.txt + +Related_Warrant_Canary_Information: | + Related Warrant Canary Information + +httpswww.eff.orgdeeplinks201404warrantcanaryfaq: | + https://www.eff.org/deeplinks/2014/04/warrant-canary-faq + +Warrant_Canary_Frequently_Asked_Questions: | + Warrant Canary Frequently Asked Questions + +httpsen.wikipedia.orgwikiWarrant_canaryCompanies_and_organizations_with_warrant_canaries: | + https://en.wikipedia.org/wiki/Warrant_canary#Companies_and_organizations_with_warrant_canaries + +Companies_and_organizations_with_warrant_canaries: | + Companies and organizations with warrant canaries + +httpswww.schneier.comblogarchives201503australia_outla.html: | + https://www.schneier.com/blog/archives/2015/03/australia_outla.html + +Warrant_canary_criticism_by_Bruce_Schneier_and_an_example_of_a_law_against_warrant_canaries.: | + Warrant canary criticism by Bruce Schneier and an example of a law against warrant canaries. + httpsplay.google.comstoreappsdetails?idorg.mozilla.firefox: | https://play.google.com/store/apps/details?id=org.mozilla.firefox @@ -2381,6 +2696,15 @@ httpsplay.google.comstoreappsdetails?idcom.abunchtell.writeas: | Click_on_whatever_service_you_need_to_view_our_recommendations.: | Click on whatever service you need to view our recommendations. +Who_is_required_to_hand_over_the_encryption_keys_to_authorities?: | + Who is required to hand over the encryption keys to authorities? + +Why_is_it_not_recommended_to_choose_a_USbased_service?: | + Why is it not recommended to choose a US-based service? + +What_is_a_warrant_canary?: | + What is a warrant canary? + httpsplay.google.comstoreappsdetails?idorg.thoughtcrime.securesms: | https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms @@ -2522,249 +2846,3 @@ httpsplay.google.comstoreappsdetails?idcom.nextcloud.client: | httpsitunes.apple.comusappnextcloudid1125420102?mt8: | https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8 -httpsplay.google.comstoreappsdetails?idorg.mozilla.firefox: | - https://play.google.com/store/apps/details?id=org.mozilla.firefox - -httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser: | - https://play.google.com/store/apps/details?id=org.torproject.torbrowser - -httpsplay.google.comstoreappsdetails?idcom.etesync.syncadapter: | - https://play.google.com/store/apps/details?id=com.etesync.syncadapter - -httpsplay.google.comstoreappsdetails?idcom.nextcloud.client: | - https://play.google.com/store/apps/details?id=com.nextcloud.client - -httpsitunes.apple.comusappnextcloudid1125420102?mt8: | - https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8 - -httpswww.clawsmail.orgdownloads.php?sectiondownloads: | - https://www.claws-mail.org/downloads.php?section=downloads - -httpsplay.google.comstoreappsdetails?idorg.sufficientlysecure.keychain: | - https://play.google.com/store/apps/details?id=org.sufficientlysecure.keychain - -httpsgit.gnupg.orgcgibingitweb.cgi?pgnupg.git: | - https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git - -httpsplay.google.comstoreappsdetails?idorg.mozilla.firefoxsend: | - https://play.google.com/store/apps/details?id=org.mozilla.firefoxsend - -httpsplay.google.comstoreappsdetails?idcom.github.catfriend1.syncthingandroid: | - https://play.google.com/store/apps/details?id=com.github.catfriend1.syncthingandroid - -httpsgithub.comsyncthing?typesource: | - https://github.com/syncthing?type=source - -Prefer_the_classic_site?_View_a_singlepage_layout.: | - Prefer the classic site? View a single-page layout. - -Privacy?_I_dont_have_anything_to_hide.: | - Privacy? I don't have anything to hide. - -How_do_you_counter_the_I_have_nothing_to_hide?_argument?_reddit.com: | - How do you counter the "I have nothing to hide?" argument? (reddit.com) - -httpspapers.ssrn.comsol3papers.cfm?abstract_id998565: | - https://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565 - -What_does_the_US_government_know_about_you?: | - What does the US government know about you? - -httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser: | - https://play.google.com/store/apps/details?id=org.torproject.torbrowser - -httpsplay.google.comstoreappsdetails?idnet.i2p.android: | - https://play.google.com/store/apps/details?id=net.i2p.android - -httpsplay.google.comstoreappsdetails?idcom.standardnotes: | - https://play.google.com/store/apps/details?id=com.standardnotes - -httpsplay.google.comstoreappsdetails?idcom.lyonbros.turtl: | - https://play.google.com/store/apps/details?id=com.lyonbros.turtl - -Privacy?_I_dont_have_anything_to_hide.: | - Privacy? I don't have anything to hide. - -How_do_you_counter_the_I_have_nothing_to_hide?_argument?_reddit.com: | - How do you counter the "I have nothing to hide?" argument? (reddit.com) - -httpspapers.ssrn.comsol3papers.cfm?abstract_id998565: | - https://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565 - -httpsplay.google.comstoreappsdetails?idorg.mozilla.firefox: | - https://play.google.com/store/apps/details?id=org.mozilla.firefox - -httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser: | - https://play.google.com/store/apps/details?id=org.torproject.torbrowser - -httpswww.clawsmail.orgdownloads.php?sectiondownloads: | - https://www.claws-mail.org/downloads.php?section=downloads - -httpsplay.google.comstoreappsdetails?idorg.thoughtcrime.securesms: | - https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms - -httpsplay.google.comstoreappsdetails?idcom.wire: | - https://play.google.com/store/apps/details?id=com.wire - -httpsitunes.apple.comappwireid930944768?mt8: | - https://itunes.apple.com/app/wire/id930944768?mt=8 - -httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner: | - https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner - -httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner: | - https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner - -httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner: | - https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner - -httpsplay.google.comstoreappsdetails?idorg.linphone: | - https://play.google.com/store/apps/details?id=org.linphone - -httpsitunes.apple.comusapplinphoneid360065638?mt8: | - https://itunes.apple.com/us/app/linphone/id360065638?mt=8 - -httpsapps.apple.comusappmumbleid443472808?ls1: | - https://apps.apple.com/us/app/mumble/id443472808?ls=1 - -httpsfdroid.orgrepositorybrowse?fdidim.vector.alpha: | - https://f-droid.org/repository/browse/?fdid=im.vector.alpha - -httpsplay.google.comstoreappsdetails?idim.vector.app: | - https://play.google.com/store/apps/details?id=im.vector.app - -httpsplay.google.comstoreappsdetails?idchat.rocket.android: | - https://play.google.com/store/apps/details?id=chat.rocket.android - -httpsplay.google.comstoreappsdetails?idio.keybase.ossifragehlen_US: | - https://play.google.com/store/apps/details?id=io.keybase.ossifrage&hl=en_US - -httpsplay.google.comstoreappsdetails?idorg.mozilla.firefoxsend: | - https://play.google.com/store/apps/details?id=org.mozilla.firefoxsend - -httpsplay.google.comstoreappsdetails?idcom.nextcloud.client: | - https://play.google.com/store/apps/details?id=com.nextcloud.client - -httpsitunes.apple.comusappnextcloudid1125420102?mt8: | - https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8 - -httpsplay.google.comstoreappsdetails?idcom.nextcloud.client: | - https://play.google.com/store/apps/details?id=com.nextcloud.client - -httpsitunes.apple.comusappnextcloudid1125420102?mt8: | - https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8 - -httpsplay.google.comstoreappsdetails?idcom.github.catfriend1.syncthingandroid: | - https://play.google.com/store/apps/details?id=com.github.catfriend1.syncthingandroid - -httpsgithub.comsyncthing?typesource: | - https://github.com/syncthing?type=source - -httpssafariextensions.apple.comdetails?idcom.bitwarden.safariLTZ2PFU5D6: | - https://safari-extensions.apple.com/details/?id=com.bitwarden.safari-LTZ2PFU5D6 - -httpsplay.google.comstoreappsdetails?idcom.x8bit.bitwarden: | - https://play.google.com/store/apps/details?id=com.x8bit.bitwarden - -httpsitunes.apple.comappbitwardenfreepasswordmanagerid1137397744?mt8: | - https://itunes.apple.com/app/bitwarden-free-password-manager/id1137397744?mt=8 - -httpsplay.google.comstoreappsdetails?idcom.kunzisoft.keepass.free: | - https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.free - -httpsplay.google.comstoreappsdetails?idcom.lesspass.android: | - https://play.google.com/store/apps/details?id=com.lesspass.android - -httpsplay.google.comstoreappsdetails?idcom.etesync.syncadapter: | - https://play.google.com/store/apps/details?id=com.etesync.syncadapter - -httpsplay.google.comstoreappsdetails?idorg.sufficientlysecure.keychain: | - https://play.google.com/store/apps/details?id=org.sufficientlysecure.keychain - -httpsgit.gnupg.orgcgibingitweb.cgi?pgnupg.git: | - https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git - -httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser: | - https://play.google.com/store/apps/details?id=org.torproject.torbrowser - -httpsplay.google.comstoreappsdetails?idnet.i2p.android: | - https://play.google.com/store/apps/details?id=net.i2p.android - -httpsplay.google.comstoreappsdetails?idcom.standardnotes: | - https://play.google.com/store/apps/details?id=com.standardnotes - -httpsplay.google.comstoreappsdetails?idcom.lyonbros.turtl: | - https://play.google.com/store/apps/details?id=com.lyonbros.turtl - -httpsplay.google.comstoreappsdetails?idcom.abunchtell.writeas: | - https://play.google.com/store/apps/details?id=com.abunchtell.writeas - -What_does_the_US_government_know_about_you?: | - What does the US government know about you? - -httpssafariextensions.apple.comdetails?idcom.bitwarden.safariLTZ2PFU5D6: | - https://safari-extensions.apple.com/details/?id=com.bitwarden.safari-LTZ2PFU5D6 - -httpsplay.google.comstoreappsdetails?idcom.x8bit.bitwarden: | - https://play.google.com/store/apps/details?id=com.x8bit.bitwarden - -httpsitunes.apple.comappbitwardenfreepasswordmanagerid1137397744?mt8: | - https://itunes.apple.com/app/bitwarden-free-password-manager/id1137397744?mt=8 - -httpsplay.google.comstoreappsdetails?idcom.kunzisoft.keepass.free: | - https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.free - -httpsplay.google.comstoreappsdetails?idcom.lesspass.android: | - https://play.google.com/store/apps/details?id=com.lesspass.android - -httpsplay.google.comstoreappsdetails?idcom.abunchtell.writeas: | - https://play.google.com/store/apps/details?id=com.abunchtell.writeas - -httpsplay.google.comstoreappsdetails?idorg.thoughtcrime.securesms: | - https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms - -httpsplay.google.comstoreappsdetails?idcom.wire: | - https://play.google.com/store/apps/details?id=com.wire - -httpsitunes.apple.comappwireid930944768?mt8: | - https://itunes.apple.com/app/wire/id930944768?mt=8 - -httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner: | - https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner - -httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner: | - https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner - -httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner: | - https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner - -httpsplay.google.comstoreappsdetails?idorg.linphone: | - https://play.google.com/store/apps/details?id=org.linphone - -httpsitunes.apple.comusapplinphoneid360065638?mt8: | - https://itunes.apple.com/us/app/linphone/id360065638?mt=8 - -httpsapps.apple.comusappmumbleid443472808?ls1: | - https://apps.apple.com/us/app/mumble/id443472808?ls=1 - -httpsfdroid.orgrepositorybrowse?fdidim.vector.alpha: | - https://f-droid.org/repository/browse/?fdid=im.vector.alpha - -httpsplay.google.comstoreappsdetails?idim.vector.app: | - https://play.google.com/store/apps/details?id=im.vector.app - -httpsplay.google.comstoreappsdetails?idchat.rocket.android: | - https://play.google.com/store/apps/details?id=chat.rocket.android - -httpsplay.google.comstoreappsdetails?idio.keybase.ossifragehlen_US: | - https://play.google.com/store/apps/details?id=io.keybase.ossifrage&hl=en_US - -Why_sponsor__site.name_?: | - Why sponsor {{ site.name }}? - -httpsplay.google.comstoreappsdetails?idcom.nextcloud.client: | - https://play.google.com/store/apps/details?id=com.nextcloud.client - -httpsitunes.apple.comusappnextcloudid1125420102?mt8: | - https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8 -