NEW [WIP] Add localization support with jekyll-simple-i18n #1509
@ -5,7 +5,7 @@
|
||||
{% else %}
|
||||
<div class="card-header text-white bg-{{include.color}}">
|
||||
{% endif %}
|
||||
<h3 class="h5">{{include.title}}</h3>
|
||||
<h3 class="h5">{{include.title | translate_text}}</h3>
|
||||
</div>
|
||||
<div class="card-body">
|
||||
{{include.body}}
|
||||
|
@ -1,45 +1,53 @@
|
||||
<h1 id="ukusa" class="anchor"><a href="#ukusa"><i class="fas fa-link anchor-icon"></i></a> Global Mass Surveillance - The Fourteen Eyes</h1>
|
||||
<h1 id="ukusa" class="anchor"><a href="#ukusa"><i class="fas fa-link anchor-icon"></i></a> {% t Global Mass Surveillance - The Fourteen Eyes %}</h1>
|
||||
|
||||
<img src="/assets/img/layout/UKUSA.png" width="260" height="115" class="img-fluid float-right ml-2" alt="{% t UKUSA Agreement %}">
|
||||
|
||||
<p>{% t The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the <a href="https://www.giswatch.org/en/communications-surveillance/unmasking-five-eyes-global-surveillance-practices">Five Eyes</a>, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to <a href="https://www.pbs.org/newshour/world/an-exclusive-club-the-five-countries-that-dont-spy-on-each-other">not spy on each other</a> as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and <a href="https://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa">share intelligence</a> to <a href="https://www.theguardian.com/politics/2013/jun/10/nsa-offers-intelligence-british-counterparts-blunkett">avoid breaking domestic laws</a> that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes); however, Five Eyes and third-party countries can and do spy on each other. %}</p>
|
||||
|
||||
<img src="/assets/img/layout/UKUSA.png" width="260" height="115" class="img-fluid float-right ml-2" alt="UKUSA Agreement">
|
||||
|
||||
<p>The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the <a href="https://www.giswatch.org/en/communications-surveillance/unmasking-five-eyes-global-surveillance-practices">Five Eyes</a>, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to <a href="https://www.pbs.org/newshour/world/an-exclusive-club-the-five-countries-that-dont-spy-on-each-other">not spy on each other</a> as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and <a href="https://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa">share intelligence</a> to <a href="https://www.theguardian.com/politics/2013/jun/10/nsa-offers-intelligence-british-counterparts-blunkett">avoid breaking domestic laws</a> that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes); however, Five Eyes and third-party countries can and do spy on each other.</p>
|
||||
|
||||
<div class="row mb-3">
|
||||
{% capture five_eyes_card %}
|
||||
<ol class="card-ol">
|
||||
<li>{% t Australia %}<div class="float-right"><span class="flag-icon flag-icon-au"></span></div></li>
|
||||
<li>{% t Canada %}<div class="float-right"><span class="flag-icon flag-icon-ca"></span></div></li>
|
||||
<li>{% t New Zealand %}<div class="float-right"><span class="flag-icon flag-icon-nz"></span></div></li>
|
||||
<li>{% t United Kingdom %}<div class="float-right"><span class="flag-icon flag-icon-gb"></span></div></li>
|
||||
<li>{% t United States of America %}<div class="float-right"><span class="flag-icon flag-icon-us"></span></div></li>
|
||||
</ol>
|
||||
{% endcapture %}
|
||||
|
||||
{% include panel.html color="danger"
|
||||
title="Five Eyes"
|
||||
body='
|
||||
<ol class="card-ol">
|
||||
<li>Australia <div class="float-right"><span class="flag-icon flag-icon-au"></span></div></li>
|
||||
<li>Canada <div class="float-right"><span class="flag-icon flag-icon-ca"></span></div></li>
|
||||
<li>New Zealand <div class="float-right"><span class="flag-icon flag-icon-nz"></span></div></li>
|
||||
<li>United Kingdom <div class="float-right"><span class="flag-icon flag-icon-gb"></span></div></li>
|
||||
<li>United States of America <div class="float-right"><span class="flag-icon flag-icon-us"></span></div></li>
|
||||
</ol>
|
||||
'
|
||||
body=five_eyes_card
|
||||
%}
|
||||
|
||||
{% capture nine_eyes_card %}
|
||||
<ol class="card-ol">
|
||||
<li>{% t Denmark %}<div class="float-right"><span class="flag-icon flag-icon-dk"></span></div></li>
|
||||
<li>{% t France %}<div class="float-right"><span class="flag-icon flag-icon-fr"></span></div></li>
|
||||
<li>{% t Netherlands %}<div class="float-right"><span class="flag-icon flag-icon-nl"></span></div></li>
|
||||
<li>{% t Norway %}<div class="float-right"><span class="flag-icon flag-icon-no"></span></div></li>
|
||||
</ol>
|
||||
{% endcapture %}
|
||||
|
||||
{% include panel.html color="warning"
|
||||
title="Nine Eyes"
|
||||
body='
|
||||
<ol class="card-ol">
|
||||
<li>Denmark <div class="float-right"><span class="flag-icon flag-icon-dk"></span></div></li>
|
||||
<li>France <div class="float-right"><span class="flag-icon flag-icon-fr"></span></div></li>
|
||||
<li>Netherlands <div class="float-right"><span class="flag-icon flag-icon-nl"></span></div></li>
|
||||
<li>Norway <div class="float-right"><span class="flag-icon flag-icon-no"></span></div></li>
|
||||
</ol>
|
||||
'
|
||||
body=nine_eyes_card
|
||||
%}
|
||||
|
||||
{% capture fourteen_eyes_card %}
|
||||
<ol class="card-ol">
|
||||
<li>{% t Belgium %}<div class="float-right"><span class="flag-icon flag-icon-be"></span></div></li>
|
||||
<li>{% t Germany %}<div class="float-right"><span class="flag-icon flag-icon-de"></span></div></li>
|
||||
<li>{% t Italy %}<div class="float-right"><span class="flag-icon flag-icon-it"></span></div></li>
|
||||
<li>{% t Spain %}<div class="float-right"><span class="flag-icon flag-icon-es"></span></div></li>
|
||||
<li>{% t Sweden %}<div class="float-right"><span class="flag-icon flag-icon-se"></span></div></li>
|
||||
</ol>
|
||||
{% endcapture %}
|
||||
|
||||
{% include panel.html color="secondary"
|
||||
title="Fourteen Eyes"
|
||||
body='
|
||||
<ol class="card-ol">
|
||||
<li>Belgium <div class="float-right"><span class="flag-icon flag-icon-be"></span></div></li>
|
||||
<li>Germany <div class="float-right"><span class="flag-icon flag-icon-de"></span></div></li>
|
||||
<li>Italy <div class="float-right"><span class="flag-icon flag-icon-it"></span></div></li>
|
||||
<li>Spain <div class="float-right"><span class="flag-icon flag-icon-es"></span></div></li>
|
||||
<li>Sweden <div class="float-right"><span class="flag-icon flag-icon-se"></span></div></li>
|
||||
</ol>
|
||||
'
|
||||
body=fourteen_eyes_card
|
||||
%}
|
||||
</div>
|
||||
|
@ -1,88 +1,93 @@
|
||||
<h1 id="kdl" class="anchor"><a href="#kdl"><i class="fas fa-link anchor-icon"></i></a> Key Disclosure Law</h1>
|
||||
<h1 id="kdl" class="anchor"><a href="#kdl"><i class="fas fa-link anchor-icon"></i></a> {% t Key Disclosure Law %}</h1>
|
||||
|
||||
<h3>Who is required to hand over the encryption keys to authorities?</h3>
|
||||
<h3>{% t Who is required to hand over the encryption keys to authorities? %}</h3>
|
||||
|
||||
<p>Mandatory <a href="https://en.wikipedia.org/wiki/Key_disclosure_law">key disclosure laws</a> require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.</p> <p><a href="https://en.wikipedia.org/wiki/Steganography">Steganography</a> involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).</p>
|
||||
<p>{% t Mandatory <a href="https://en.wikipedia.org/wiki/Key_disclosure_law">key disclosure laws</a> require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.</p> <p><a href="https://en.wikipedia.org/wiki/Steganography">Steganography</a> involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data). %}</p>
|
||||
|
||||
<div class="row mb-2">
|
||||
|
||||
{% capture apply_card %}
|
||||
<ol class="card-ol">
|
||||
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#Antigua_and_Barbuda %}">{% t Antigua and Barbuda %}</a> <div class="float-right"><span class="flag-icon flag-icon-ag"></span></div></li>
|
||||
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#Australia %}">{% t Australia %}</a> <div class="float-right"><span class="flag-icon flag-icon-au"></span></div></li>
|
||||
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#Canada %}">{% t Canada %}</a> <div class="float-right"><span class="flag-icon flag-icon-ca"></span></div></li>
|
||||
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#France %}">{% t France %}</a> <div class="float-right"><span class="flag-icon flag-icon-fr"></span></div></li>
|
||||
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#India %}">{% t India %}</a> <div class="float-right"><span class="flag-icon flag-icon-in"></span></div></li>
|
||||
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#Ireland %}">{% t Ireland %}</a> <div class="float-right"><span class="flag-icon flag-icon-ie"></span></div></li>
|
||||
<li><a href="{% t https://edri.org/norway-introduces-forced-biometric-authentication/ %}">{% t Norway %}</a> <div class="float-right"><span class="flag-icon flag-icon-no"></span></div></li>
|
||||
<li><a href="{% t https://www.bloomberg.com/news/articles/2018-03-20/telegram-loses-bid-to-stop-russia-from-getting-encryption-keys %}">{% t Russia %}</a> <div class="float-right"><span class="flag-icon flag-icon-ru"></span></div></li>
|
||||
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#South_Africa %}">{% t South Africa %}</a> <div class="float-right"><span class="flag-icon flag-icon-za"></span></div></li>
|
||||
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#United_Kingdom %}">{% t United Kingdom %}</a> <div class="float-right"><span class="flag-icon flag-icon-gb"></span></div></li>
|
||||
</ol>
|
||||
{% endcapture %}
|
||||
|
||||
{% include panel.html color="danger"
|
||||
title="Key disclosure laws apply"
|
||||
body='
|
||||
<ol class="card-ol">
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Antigua_and_Barbuda">Antigua and Barbuda</a> <div class="float-right"><span class="flag-icon flag-icon-ag"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Australia">Australia</a> <div class="float-right"><span class="flag-icon flag-icon-au"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Canada">Canada</a> <div class="float-right"><span class="flag-icon flag-icon-ca"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#France">France</a> <div class="float-right"><span class="flag-icon flag-icon-fr"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#India">India</a> <div class="float-right"><span class="flag-icon flag-icon-in"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Ireland">Ireland</a> <div class="float-right"><span class="flag-icon flag-icon-ie"></span></div></li>
|
||||
<li><a href="https://edri.org/norway-introduces-forced-biometric-authentication/">Norway</a> <div class="float-right"><span class="flag-icon flag-icon-no"></span></div></li>
|
||||
<li><a href="https://www.bloomberg.com/news/articles/2018-03-20/telegram-loses-bid-to-stop-russia-from-getting-encryption-keys">Russia</a> <div class="float-right"><span class="flag-icon flag-icon-ru"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#South_Africa">South Africa</a> <div class="float-right"><span class="flag-icon flag-icon-za"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#United_Kingdom">United Kingdom</a> <div class="float-right"><span class="flag-icon flag-icon-gb"></span></div></li>
|
||||
</ol>
|
||||
'
|
||||
body=apply_card
|
||||
%}
|
||||
|
||||
{% capture mayapply_card %}
|
||||
<ol class="card-ol">
|
||||
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#Belgium %}">{% t Belgium * %}</a> <div class="float-right"><span class="flag-icon flag-icon-be"></span></div></li>
|
||||
<li><a href="{% t https://www.riigiteataja.ee/akt/106012016019 %}">{% t Estonia %}</a> <div class="float-right"><span class="flag-icon flag-icon-ee"></span></div></li>
|
||||
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#Finland %}">{% t Finland * %}</a> <div class="float-right"><span class="flag-icon flag-icon-fi"></span></div></li>
|
||||
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#New_Zealand %}">{% t New Zealand %}</a> ({% t unclear %}) <div class="float-right"><span class="flag-icon flag-icon-nz"></span></div></li>
|
||||
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#The_Netherlands %}">{% t The Netherlands * %}</a> <div class="float-right"><span class="flag-icon flag-icon-nl"></span></div></li>
|
||||
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#United_States %}">{% t United States %}</a> ({% t see related info %}) <div class="float-right"><span class="flag-icon flag-icon-us"></span></div></li>
|
||||
</ol>
|
||||
{% endcapture %}
|
||||
|
||||
{% include panel.html color="warning"
|
||||
title="Key disclosure laws may apply"
|
||||
body='
|
||||
<ol class="card-ol">
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Belgium">Belgium *</a> <div class="float-right"><span class="flag-icon flag-icon-be"></span></div></li>
|
||||
<li><a href="https://www.riigiteataja.ee/akt/106012016019">Estonia</a> <div class="float-right"><span class="flag-icon flag-icon-ee"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Finland">Finland *</a> <div class="float-right"><span class="flag-icon flag-icon-fi"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#New_Zealand">New Zealand</a> (unclear) <div class="float-right"><span class="flag-icon flag-icon-nz"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#The_Netherlands">The Netherlands *</a> <div class="float-right"><span class="flag-icon flag-icon-nl"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#United_States">United States</a> (see related info) <div class="float-right"><span class="flag-icon flag-icon-us"></span></div></li>
|
||||
</ol>
|
||||
'
|
||||
body=mayapply_card
|
||||
%}
|
||||
|
||||
{% capture dontapply_card %}
|
||||
<ol class="card-ol">
|
||||
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#Czech_Republic %}">{% t Czech Republic %}</a> <div class="float-right"><span class="flag-icon flag-icon-cz"></span></div></li>
|
||||
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#Germany %}">{% t Germany %}</a> <div class="float-right"><span class="flag-icon flag-icon-de"></span></div></li>
|
||||
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#Iceland %}">{% t Iceland %}</a> <div class="float-right"><span class="flag-icon flag-icon-is"></span></div></li>
|
||||
<li><a href="{% t https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/italy %}">{% t Italy %}</a> <div class="float-right"><span class="flag-icon flag-icon-it"></span></div></li>
|
||||
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#Poland %}">{% t Poland %}</a> <div class="float-right"><span class="flag-icon flag-icon-pl"></span></div></li>
|
||||
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#Sweden %}">{% t Sweden %}</a> ({% t proposed %}) <div class="float-right"><span class="flag-icon flag-icon-se"></span></div></li>
|
||||
<li><a href="{% t https://www.wikipedia.org/wiki/Key_disclosure_law#Switzerland %}">{% t Switzerland %}</a> <div class="float-right"><span class="flag-icon flag-icon-ch"></span></div></li>
|
||||
</ol>
|
||||
{% endcapture %}
|
||||
|
||||
{% include panel.html color="success"
|
||||
title="Key disclosure laws don't apply"
|
||||
body='
|
||||
<ol class="card-ol">
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Czech_Republic">Czech Republic</a> <div class="float-right"><span class="flag-icon flag-icon-cz"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Germany">Germany</a> <div class="float-right"><span class="flag-icon flag-icon-de"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Iceland">Iceland</a> <div class="float-right"><span class="flag-icon flag-icon-is"></span></div></li>
|
||||
<li><a href="https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/italy">Italy</a> <div class="float-right"><span class="flag-icon flag-icon-it"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Poland">Poland</a> <div class="float-right"><span class="flag-icon flag-icon-pl"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Sweden">Sweden</a> (proposed) <div class="float-right"><span class="flag-icon flag-icon-se"></span></div></li>
|
||||
<li><a href="https://www.wikipedia.org/wiki/Key_disclosure_law#Switzerland">Switzerland</a> <div class="float-right"><span class="flag-icon flag-icon-ch"></span></div></li>
|
||||
</ol>
|
||||
'
|
||||
body=dontapply_card
|
||||
%}
|
||||
|
||||
</div>
|
||||
|
||||
<p> * (people who know how to access a system may be ordered to share their knowledge, <strong>however, this doesn't apply to the suspect itself or family members.</strong>)</p>
|
||||
<p>{% t * (people who know how to access a system may be ordered to share their knowledge, <strong>however, this doesn't apply to the suspect itself or family members.</strong>) %}</p>
|
||||
|
||||
<h3>Related Information</h3>
|
||||
<h3>{% t Related Information %}</h3>
|
||||
|
||||
<ul>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law">Wikipedia page on key disclosure law</a></li>
|
||||
<li><a href="https://law.stackexchange.com/questions/1523/can-a-us-citizen-be-required-to-provide-the-authentication-key-for-encrypted-dat">law.stackexchange.com question about key disclosure law in US</a></li>
|
||||
<li><a href="https://peertube.mastodon.host/videos/watch/e09915eb-5962-4830-a02f-8da5c2b59e71">DEFCON 20: Crypto and the Cops: the Law of Key Disclosure and Forced Decryption</a></li>
|
||||
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law %}">{% t Wikipedia page on key disclosure law %}</a></li>
|
||||
<li><a href="{% t https://law.stackexchange.com/questions/1523/can-a-us-citizen-be-required-to-provide-the-authentication-key-for-encrypted-dat %}">{% t law.stackexchange.com question about key disclosure law in US %}</a></li>
|
||||
<li><a href="{% t https://peertube.mastodon.host/videos/watch/e09915eb-5962-4830-a02f-8da5c2b59e71 %}">{% t DEFCON 20: Crypto and the Cops: the Law of Key Disclosure and Forced Decryption %}</a></li>
|
||||
</ul>
|
||||
|
||||
<h3 id="usa" class="anchor">Why is it not recommended to choose a US-based service?</h3>
|
||||
<h3 id="usa" class="anchor">{% t Why is it not recommended to choose a US-based service? %}</h3>
|
||||
|
||||
<img src="/assets/img/layout/USA.png" width="200" height="200" class="img-fluid float-right ml-3" alt="USA">
|
||||
<img src="/assets/img/layout/USA.png" width="200" height="200" class="img-fluid float-right ml-3" alt="{% t USA %}">
|
||||
|
||||
<p>Services based in the United States are not recommended because of the country's surveillance programs and use of <a href="https://www.eff.org/issues/national-security-letters/faq">National Security Letters</a> (NSLs) with accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to <a href="https://www.schneier.com/blog/archives/2013/08/more_on_the_nsa.html">secretly force</a> companies to grant complete access to customer data and transform the service into a tool of mass surveillance.</p>
|
||||
<p>{% t Services based in the United States are not recommended because of the country's surveillance programs and use of <a href="https://www.eff.org/issues/national-security-letters/faq">National Security Letters</a> (NSLs) with accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to <a href="https://www.schneier.com/blog/archives/2013/08/more_on_the_nsa.html">secretly force</a> companies to grant complete access to customer data and transform the service into a tool of mass surveillance. %}</p>
|
||||
|
||||
<p>An example of this is <a href="https://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order">Lavabit</a> – a secure email service created by Ladar Levison. The FBI <a href="https://www.vice.com/en_us/article/nzz888/lavabit-founder-ladar-levison-discusses-his-federal-battle-for-privacy">requested</a> Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access
|
||||
communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.</p>
|
||||
<p>{% t An example of this is <a href="https://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order">Lavabit</a> – a secure email service created by Ladar Levison. The FBI <a href="https://www.vice.com/en_us/article/nzz888/lavabit-founder-ladar-levison-discusses-his-federal-battle-for-privacy">requested</a> Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.%}</p>
|
||||
|
||||
<p>Ultimately, Levison turned over the SSL keys and <a href="https://www.theguardian.com/commentisfree/2014/may/20/why-did-lavabit-shut-down-snowden-email">shut down</a> the service at the same time. The US government then <a href="https://www.cnbc.com/id/100962389">threatened Levison with arrest</a>, saying that shutting down the service was a violation of the court order.</p>
|
||||
<p>{% t Ultimately, Levison turned over the SSL keys and <a href="https://www.theguardian.com/commentisfree/2014/may/20/why-did-lavabit-shut-down-snowden-email">shut down</a> the service at the same time. The US government then <a href="https://www.cnbc.com/id/100962389">threatened Levison with arrest</a>, saying that shutting down the service was a violation of the court order. %}</p>
|
||||
|
||||
<h3>Related Information</h3>
|
||||
<h3>{% t Related Information %}</h3>
|
||||
|
||||
<ul>
|
||||
<li><a href="https://www.bestvpn.com/the-ultimate-privacy-guide/#avoidus">Avoid all US and UK based services</a></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Surespot#History">Proof that warrant canaries work based on the surespot example.</a></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/UKUSA_Agreement">The United Kingdom – United States of America Agreement (UKUSA)</a></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order">Lavabit: Suspension and gag order</a></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law">Key disclosure law</a></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Portal:Mass_surveillance">Wikipedia Portal: Mass_surveillance</a></li>
|
||||
<li><a href="{% t https://www.bestvpn.com/the-ultimate-privacy-guide/#avoidus %}">{% t Avoid all US and UK based services %}</a></li>
|
||||
<li><a href="{% t https://en.wikipedia.org/wiki/Surespot#History %}">{% t Proof that warrant canaries work based on the surespot example. %}</a></li>
|
||||
<li><a href="{% t https://en.wikipedia.org/wiki/UKUSA_Agreement %}">{% t The United Kingdom – United States of America Agreement (UKUSA) %}</a></li>
|
||||
<li><a href="{% t https://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order %}">{% t Lavabit: Suspension and gag order %}</a></li>
|
||||
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law %}">{% t Key disclosure law %}</a></li>
|
||||
<li><a href="{% t https://en.wikipedia.org/wiki/Portal:Mass_surveillance %}">{% t Wikipedia Portal: Mass_surveillance %}</a></li>
|
||||
</ul>
|
||||
|
@ -1,22 +1,22 @@
|
||||
<h1 id="wc" class="anchor"><a href="#wc"><i class="fas fa-link anchor-icon"></i></a> What is a warrant canary?</h1>
|
||||
<h1 id="wc" class="anchor"><a href="#wc"><i class="fas fa-link anchor-icon"></i></a> {% t What is a warrant canary? %}</h1>
|
||||
|
||||
<img src="/assets/img/layout/warrant-canary.jpg" width="450" height="236" class="img-fluid float-right ml-3" alt="Warrant Canary Example">
|
||||
<img src="/assets/img/layout/warrant-canary.jpg" width="450" height="236" class="img-fluid float-right ml-3" alt="{% t Warrant Canary Example %}">
|
||||
|
||||
<p>A warrant canary is a posted document stating that an organization has not received any secret subpoenas during a specific period of time. If this document fails to be updated during the specified time then the user is to assume that the service has received such a subpoena and should stop using the service.</p>
|
||||
<p>{% t A warrant canary is a posted document stating that an organization has not received any secret subpoenas during a specific period of time. If this document fails to be updated during the specified time then the user is to assume that the service has received such a subpoena and should stop using the service. %}</p>
|
||||
|
||||
<h4>Warrant Canary Examples:</h4>
|
||||
<h4>{% t Warrant Canary Examples: %}</h4>
|
||||
|
||||
<ol>
|
||||
<li><a href="https://proxy.sh/canary">https://proxy.sh/canary</a></li>
|
||||
<li><a href="https://www.ivpn.net/resources/canary.txt">https://www.ivpn.net/resources/canary.txt</a></li>
|
||||
<li><a href="https://www.bolehvpn.net/canary.txt">https://www.bolehvpn.net/canary.txt</a></li>
|
||||
<li><a href="https://www.ipredator.se/static/downloads/canary.txt">https://www.ipredator.se/static/downloads/canary.txt</a></li>
|
||||
<li><a href="{% t https://proxy.sh/canary %}">{% t https://proxy.sh/canary %}</a></li>
|
||||
<li><a href="{% t https://www.ivpn.net/resources/canary.txt %}">{% t https://www.ivpn.net/resources/canary.txt %}</a></li>
|
||||
<li><a href="{% t https://www.bolehvpn.net/canary.txt %}">{% t https://www.bolehvpn.net/canary.txt %}</a></li>
|
||||
<li><a href="{% t https://www.ipredator.se/static/downloads/canary.txt %}">{% t https://www.ipredator.se/static/downloads/canary.txt %}</a></li>
|
||||
</ol>
|
||||
|
||||
<h4>Related Warrant Canary Information</h4>
|
||||
<h4>{% t Related Warrant Canary Information %}</h4>
|
||||
|
||||
<ul>
|
||||
<li><a href="https://www.eff.org/deeplinks/2014/04/warrant-canary-faq">Warrant Canary Frequently Asked Questions</a></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Warrant_canary#Companies_and_organizations_with_warrant_canaries">Companies and organizations with warrant canaries</a></li>
|
||||
<li><a href="https://www.schneier.com/blog/archives/2015/03/australia_outla.html">Warrant canary criticism by Bruce Schneier and an example of a law against warrant canaries.</a></li>
|
||||
<li><a href="{% t https://www.eff.org/deeplinks/2014/04/warrant-canary-faq %}">{% t Warrant Canary Frequently Asked Questions %}</a></li>
|
||||
<li><a href="{% t https://en.wikipedia.org/wiki/Warrant_canary#Companies_and_organizations_with_warrant_canaries %}">{% t Companies and organizations with warrant canaries %}</a></li>
|
||||
<li><a href="{% t https://www.schneier.com/blog/archives/2015/03/australia_outla.html %}">{% t Warrant canary criticism by Bruce Schneier and an example of a law against warrant canaries. %}</a></li>
|
||||
</ul>
|
||||
|
@ -12,15 +12,15 @@ translate: true
|
||||
|
||||
<div class="card card-list">
|
||||
<ul class="list-group list-group-flush">
|
||||
<li class="list-group-item"><a href="/{% if page.language %}{{ page.language }}/{% endif %}providers/cloud-storage/"><span class="fas fa-cloud fa-fw"></span> {% t Cloud Storage%}</a></li>
|
||||
<li class="list-group-item"><a href="/providers/dns/"><span class="fa fa-tasks fa-fw"></span> {% t DNS%}</a></li>
|
||||
<li class="list-group-item"><a href="/providers/email/"><span class="fas fa-mail-bulk fa-fw"></span> {% t Email%}</a></li>
|
||||
<li class="list-group-item"><a href="/providers/hosting/"><span class="fas fa-database fa-fw"></span> {% t Hosting%}</a></li>
|
||||
<li class="list-group-item"><a href="/providers/paste/"><span class="fas fa-paste fa-fw"></span> {% t Pastebins%}</a></li>
|
||||
<li class="list-group-item"><a href="/providers/search-engines/"><i class="fas fa-search fa-fw"></i> {% t Search Engines%}</a></li>
|
||||
<li class="list-group-item"><a href="/providers/social-networks/"><span class="fas fa-expand-arrows-alt fa-fw"></span> {% t Social Networks%}</a></li>
|
||||
<li class="list-group-item"><a href="/providers/social-news-aggregator/"><span class="far fa-newspaper fa-fw"></span> {% t Social News Aggregators%}</a></li>
|
||||
<li class="list-group-item"><a href="/providers/vpn/"><span class="far fa-eye-slash fa-fw"></span> {% t VPN%}</a></li>
|
||||
<li class="list-group-item"><a href="{{ "/providers/cloud-storage/" | translate_page }}"><span class="fas fa-cloud fa-fw"></span> {% t Cloud Storage%}</a></li>
|
||||
<li class="list-group-item"><a href="{{ "/providers/dns/" | translate_page }}"><span class="fa fa-tasks fa-fw"></span> {% t DNS%}</a></li>
|
||||
<li class="list-group-item"><a href="{{ "/providers/email/" | translate_page }}"><span class="fas fa-mail-bulk fa-fw"></span> {% t Email%}</a></li>
|
||||
<li class="list-group-item"><a href="{{ "/providers/hosting/" | translate_page }}"><span class="fas fa-database fa-fw"></span> {% t Hosting%}</a></li>
|
||||
<li class="list-group-item"><a href="{{ "/providers/paste/" | translate_page }}"><span class="fas fa-paste fa-fw"></span> {% t Pastebins%}</a></li>
|
||||
<li class="list-group-item"><a href="{{ "/providers/search-engines/" | translate_page }}"><i class="fas fa-search fa-fw"></i> {% t Search Engines %}</a></li>
|
||||
<li class="list-group-item"><a href="{{ "/providers/social-networks/" | translate_page }}"><span class="fas fa-expand-arrows-alt fa-fw"></span> {% t Social Networks%}</a></li>
|
||||
<li class="list-group-item"><a href="{{ "/providers/social-news-aggregator/" | translate_page }}"><span class="far fa-newspaper fa-fw"></span> {% t Social News Aggregators%}</a></li>
|
||||
<li class="list-group-item"><a href="{{ "/providers/vpn/" | translate_page }}"><span class="far fa-eye-slash fa-fw"></span> {% t VPN%}</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
|
||||
|
@ -1544,6 +1544,321 @@ How_do_you_counter_the_I_have_nothing_to_hide?_argument?_reddit.com: |
|
||||
httpspapers.ssrn.comsol3papers.cfm?abstract_id998565: |
|
||||
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565
|
||||
|
||||
Global_Mass_Surveillance__The_Fourteen_Eyes: |
|
||||
Global Mass Surveillance - The Fourteen Eyes
|
||||
|
||||
UKUSA_Agreement: |
|
||||
UKUSA Agreement
|
||||
|
||||
The_UKUSA_Agreement_is_an_agreement_between_the_United_Kingdom_United_States_Australia_Canada_and: |
|
||||
The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the <a href="https://www.giswatch.org/en/communications-surveillance/unmasking-five-eyes-global-surveillance-practices">Five Eyes</a>, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to <a href="https://www.pbs.org/newshour/world/an-exclusive-club-the-five-countries-that-dont-spy-on-each-other">not spy on each other</a> as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and <a href="https://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa">share intelligence</a> to <a href="https://www.theguardian.com/politics/2013/jun/10/nsa-offers-intelligence-british-counterparts-blunkett">avoid breaking domestic laws</a> that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes); however, Five Eyes and third-party countries can and do spy on each other.
|
||||
|
||||
Australia: |
|
||||
Australia
|
||||
|
||||
Canada: |
|
||||
Canada
|
||||
|
||||
New_Zealand: |
|
||||
New Zealand
|
||||
|
||||
United_Kingdom: |
|
||||
United Kingdom
|
||||
|
||||
United_States_of_America: |
|
||||
United States of America
|
||||
|
||||
Five_Eyes: |
|
||||
Five Eyes
|
||||
|
||||
Denmark: |
|
||||
Denmark
|
||||
|
||||
France: |
|
||||
France
|
||||
|
||||
Netherlands: |
|
||||
Netherlands
|
||||
|
||||
Norway: |
|
||||
Norway
|
||||
|
||||
Nine_Eyes: |
|
||||
Nine Eyes
|
||||
|
||||
Belgium: |
|
||||
Belgium
|
||||
|
||||
Germany: |
|
||||
Germany
|
||||
|
||||
Italy: |
|
||||
Italy
|
||||
|
||||
Spain: |
|
||||
Spain
|
||||
|
||||
Sweden: |
|
||||
Sweden
|
||||
|
||||
Fourteen_Eyes: |
|
||||
Fourteen Eyes
|
||||
|
||||
Key_Disclosure_Law: |
|
||||
Key Disclosure Law
|
||||
|
||||
Who_is_required_to_hand_over_the_encryption_keys_to_authorities?: |
|
||||
Who is required to hand over the encryption keys to authorities?
|
||||
|
||||
Mandatory_a_hrefhttpsen.wikipedia.orgwikiKey_disclosure_lawkey_disclosure_lawsa_require_: |
|
||||
Mandatory <a href="https://en.wikipedia.org/wiki/Key_disclosure_law">key disclosure laws</a> require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.</p> <p><a href="https://en.wikipedia.org/wiki/Steganography">Steganography</a> involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).
|
||||
|
||||
httpsen.wikipedia.orgwikiKey_disclosure_lawAntigua_and_Barbuda: |
|
||||
https://en.wikipedia.org/wiki/Key_disclosure_law#Antigua_and_Barbuda
|
||||
|
||||
Antigua_and_Barbuda: |
|
||||
Antigua and Barbuda
|
||||
|
||||
httpsen.wikipedia.orgwikiKey_disclosure_lawAustralia: |
|
||||
https://en.wikipedia.org/wiki/Key_disclosure_law#Australia
|
||||
|
||||
httpsen.wikipedia.orgwikiKey_disclosure_lawCanada: |
|
||||
https://en.wikipedia.org/wiki/Key_disclosure_law#Canada
|
||||
|
||||
httpsen.wikipedia.orgwikiKey_disclosure_lawFrance: |
|
||||
https://en.wikipedia.org/wiki/Key_disclosure_law#France
|
||||
|
||||
httpsen.wikipedia.orgwikiKey_disclosure_lawIndia: |
|
||||
https://en.wikipedia.org/wiki/Key_disclosure_law#India
|
||||
|
||||
India: |
|
||||
India
|
||||
|
||||
httpsen.wikipedia.orgwikiKey_disclosure_lawIreland: |
|
||||
https://en.wikipedia.org/wiki/Key_disclosure_law#Ireland
|
||||
|
||||
Ireland: |
|
||||
Ireland
|
||||
|
||||
httpsedri.orgnorwayintroducesforcedbiometricauthentication: |
|
||||
https://edri.org/norway-introduces-forced-biometric-authentication/
|
||||
|
||||
httpswww.bloomberg.comnewsarticles20180320telegramlosesbidtostoprussiafromgettingenc: |
|
||||
https://www.bloomberg.com/news/articles/2018-03-20/telegram-loses-bid-to-stop-russia-from-getting-encryption-keys
|
||||
|
||||
Russia: |
|
||||
Russia
|
||||
|
||||
httpsen.wikipedia.orgwikiKey_disclosure_lawSouth_Africa: |
|
||||
https://en.wikipedia.org/wiki/Key_disclosure_law#South_Africa
|
||||
|
||||
South_Africa: |
|
||||
South Africa
|
||||
|
||||
httpsen.wikipedia.orgwikiKey_disclosure_lawUnited_Kingdom: |
|
||||
https://en.wikipedia.org/wiki/Key_disclosure_law#United_Kingdom
|
||||
|
||||
Key_disclosure_laws_apply: |
|
||||
Key disclosure laws apply
|
||||
|
||||
httpsen.wikipedia.orgwikiKey_disclosure_lawBelgium: |
|
||||
https://en.wikipedia.org/wiki/Key_disclosure_law#Belgium
|
||||
|
||||
Belgium_: |
|
||||
Belgium *
|
||||
|
||||
httpswww.riigiteataja.eeakt106012016019: |
|
||||
https://www.riigiteataja.ee/akt/106012016019
|
||||
|
||||
Estonia: |
|
||||
Estonia
|
||||
|
||||
httpsen.wikipedia.orgwikiKey_disclosure_lawFinland: |
|
||||
https://en.wikipedia.org/wiki/Key_disclosure_law#Finland
|
||||
|
||||
Finland_: |
|
||||
Finland *
|
||||
|
||||
httpsen.wikipedia.orgwikiKey_disclosure_lawNew_Zealand: |
|
||||
https://en.wikipedia.org/wiki/Key_disclosure_law#New_Zealand
|
||||
|
||||
unclear: |
|
||||
unclear
|
||||
|
||||
httpsen.wikipedia.orgwikiKey_disclosure_lawThe_Netherlands: |
|
||||
https://en.wikipedia.org/wiki/Key_disclosure_law#The_Netherlands
|
||||
|
||||
The_Netherlands_: |
|
||||
The Netherlands *
|
||||
|
||||
httpsen.wikipedia.orgwikiKey_disclosure_lawUnited_States: |
|
||||
https://en.wikipedia.org/wiki/Key_disclosure_law#United_States
|
||||
|
||||
United_States: |
|
||||
United States
|
||||
|
||||
see_related_info: |
|
||||
see related info
|
||||
|
||||
Key_disclosure_laws_may_apply: |
|
||||
Key disclosure laws may apply
|
||||
|
||||
httpsen.wikipedia.orgwikiKey_disclosure_lawCzech_Republic: |
|
||||
https://en.wikipedia.org/wiki/Key_disclosure_law#Czech_Republic
|
||||
|
||||
Czech_Republic: |
|
||||
Czech Republic
|
||||
|
||||
httpsen.wikipedia.orgwikiKey_disclosure_lawGermany: |
|
||||
https://en.wikipedia.org/wiki/Key_disclosure_law#Germany
|
||||
|
||||
httpsen.wikipedia.orgwikiKey_disclosure_lawIceland: |
|
||||
https://en.wikipedia.org/wiki/Key_disclosure_law#Iceland
|
||||
|
||||
Iceland: |
|
||||
Iceland
|
||||
|
||||
httpsiclg.compracticeareascybersecuritylawsandregulationsitaly: |
|
||||
https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/italy
|
||||
|
||||
httpsen.wikipedia.orgwikiKey_disclosure_lawPoland: |
|
||||
https://en.wikipedia.org/wiki/Key_disclosure_law#Poland
|
||||
|
||||
Poland: |
|
||||
Poland
|
||||
|
||||
httpsen.wikipedia.orgwikiKey_disclosure_lawSweden: |
|
||||
https://en.wikipedia.org/wiki/Key_disclosure_law#Sweden
|
||||
|
||||
proposed: |
|
||||
proposed
|
||||
|
||||
httpswww.wikipedia.orgwikiKey_disclosure_lawSwitzerland: |
|
||||
https://www.wikipedia.org/wiki/Key_disclosure_law#Switzerland
|
||||
|
||||
Switzerland: |
|
||||
Switzerland
|
||||
|
||||
Key_disclosure_laws_dont_apply: |
|
||||
Key disclosure laws don't apply
|
||||
|
||||
_people_who_know_how_to_access_a_system_may_be_ordered_to_share_their_knowledge_stronghowever_t: |
|
||||
* (people who know how to access a system may be ordered to share their knowledge, <strong>however, this doesn't apply to the suspect itself or family members.</strong>)
|
||||
|
||||
Related_Information: |
|
||||
Related Information
|
||||
|
||||
httpsen.wikipedia.orgwikiKey_disclosure_law: |
|
||||
https://en.wikipedia.org/wiki/Key_disclosure_law
|
||||
|
||||
Wikipedia_page_on_key_disclosure_law: |
|
||||
Wikipedia page on key disclosure law
|
||||
|
||||
httpslaw.stackexchange.comquestions1523canauscitizenberequiredtoprovidetheauthenticati: |
|
||||
https://law.stackexchange.com/questions/1523/can-a-us-citizen-be-required-to-provide-the-authentication-key-for-encrypted-dat
|
||||
|
||||
law.stackexchange.com_question_about_key_disclosure_law_in_US: |
|
||||
law.stackexchange.com question about key disclosure law in US
|
||||
|
||||
httpspeertube.mastodon.hostvideoswatche09915eb59624830a02f8da5c2b59e71: |
|
||||
https://peertube.mastodon.host/videos/watch/e09915eb-5962-4830-a02f-8da5c2b59e71
|
||||
|
||||
DEFCON_20_Crypto_and_the_Cops_the_Law_of_Key_Disclosure_and_Forced_Decryption: |
|
||||
DEFCON 20: Crypto and the Cops: the Law of Key Disclosure and Forced Decryption
|
||||
|
||||
Why_is_it_not_recommended_to_choose_a_USbased_service?: |
|
||||
Why is it not recommended to choose a US-based service?
|
||||
|
||||
USA: |
|
||||
USA
|
||||
|
||||
Services_based_in_the_United_States_are_not_recommended_because_of_the_countrys_surveillance_program: |
|
||||
Services based in the United States are not recommended because of the country's surveillance programs and use of <a href="https://www.eff.org/issues/national-security-letters/faq">National Security Letters</a> (NSLs) with accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to <a href="https://www.schneier.com/blog/archives/2013/08/more_on_the_nsa.html">secretly force</a> companies to grant complete access to customer data and transform the service into a tool of mass surveillance.
|
||||
|
||||
An_example_of_this_is_a_hrefhttpsen.wikipedia.orgwikiLavabitSuspension_and_gag_orderLavabi: |
|
||||
An example of this is <a href="https://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order">Lavabit</a> – a secure email service created by Ladar Levison. The FBI <a href="https://www.vice.com/en_us/article/nzz888/lavabit-founder-ladar-levison-discusses-his-federal-battle-for-privacy">requested</a> Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.
|
||||
|
||||
Ultimately_Levison_turned_over_the_SSL_keys_and_a_hrefhttpswww.theguardian.comcommentisfree2: |
|
||||
Ultimately, Levison turned over the SSL keys and <a href="https://www.theguardian.com/commentisfree/2014/may/20/why-did-lavabit-shut-down-snowden-email">shut down</a> the service at the same time. The US government then <a href="https://www.cnbc.com/id/100962389">threatened Levison with arrest</a>, saying that shutting down the service was a violation of the court order.
|
||||
|
||||
httpswww.bestvpn.comtheultimateprivacyguideavoidus: |
|
||||
https://www.bestvpn.com/the-ultimate-privacy-guide/#avoidus
|
||||
|
||||
Avoid_all_US_and_UK_based_services: |
|
||||
Avoid all US and UK based services
|
||||
|
||||
httpsen.wikipedia.orgwikiSurespotHistory: |
|
||||
https://en.wikipedia.org/wiki/Surespot#History
|
||||
|
||||
Proof_that_warrant_canaries_work_based_on_the_surespot_example.: |
|
||||
Proof that warrant canaries work based on the surespot example.
|
||||
|
||||
httpsen.wikipedia.orgwikiUKUSA_Agreement: |
|
||||
https://en.wikipedia.org/wiki/UKUSA_Agreement
|
||||
|
||||
The_United_Kingdom__United_States_of_America_Agreement_UKUSA: |
|
||||
The United Kingdom – United States of America Agreement (UKUSA)
|
||||
|
||||
httpsen.wikipedia.orgwikiLavabitSuspension_and_gag_order: |
|
||||
https://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order
|
||||
|
||||
Lavabit_Suspension_and_gag_order: |
|
||||
Lavabit: Suspension and gag order
|
||||
|
||||
Key_disclosure_law: |
|
||||
Key disclosure law
|
||||
|
||||
httpsen.wikipedia.orgwikiPortalMass_surveillance: |
|
||||
https://en.wikipedia.org/wiki/Portal:Mass_surveillance
|
||||
|
||||
Wikipedia_Portal_Mass_surveillance: |
|
||||
Wikipedia Portal: Mass_surveillance
|
||||
|
||||
What_is_a_warrant_canary?: |
|
||||
What is a warrant canary?
|
||||
|
||||
Warrant_Canary_Example: |
|
||||
Warrant Canary Example
|
||||
|
||||
A_warrant_canary_is_a_posted_document_stating_that_an_organization_has_not_received_any_secret_subpoe: |
|
||||
A warrant canary is a posted document stating that an organization has not received any secret subpoenas during a specific period of time. If this document fails to be updated during the specified time then the user is to assume that the service has received such a subpoena and should stop using the service.
|
||||
|
||||
Warrant_Canary_Examples: |
|
||||
Warrant Canary Examples:
|
||||
|
||||
httpsproxy.shcanary: |
|
||||
https://proxy.sh/canary
|
||||
|
||||
httpswww.ivpn.netresourcescanary.txt: |
|
||||
https://www.ivpn.net/resources/canary.txt
|
||||
|
||||
httpswww.bolehvpn.netcanary.txt: |
|
||||
https://www.bolehvpn.net/canary.txt
|
||||
|
||||
httpswww.ipredator.sestaticdownloadscanary.txt: |
|
||||
https://www.ipredator.se/static/downloads/canary.txt
|
||||
|
||||
Related_Warrant_Canary_Information: |
|
||||
Related Warrant Canary Information
|
||||
|
||||
httpswww.eff.orgdeeplinks201404warrantcanaryfaq: |
|
||||
https://www.eff.org/deeplinks/2014/04/warrant-canary-faq
|
||||
|
||||
Warrant_Canary_Frequently_Asked_Questions: |
|
||||
Warrant Canary Frequently Asked Questions
|
||||
|
||||
httpsen.wikipedia.orgwikiWarrant_canaryCompanies_and_organizations_with_warrant_canaries: |
|
||||
https://en.wikipedia.org/wiki/Warrant_canary#Companies_and_organizations_with_warrant_canaries
|
||||
|
||||
Companies_and_organizations_with_warrant_canaries: |
|
||||
Companies and organizations with warrant canaries
|
||||
|
||||
httpswww.schneier.comblogarchives201503australia_outla.html: |
|
||||
https://www.schneier.com/blog/archives/2015/03/australia_outla.html
|
||||
|
||||
Warrant_canary_criticism_by_Bruce_Schneier_and_an_example_of_a_law_against_warrant_canaries.: |
|
||||
Warrant canary criticism by Bruce Schneier and an example of a law against warrant canaries.
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idorg.mozilla.firefox: |
|
||||
https://play.google.com/store/apps/details?id=org.mozilla.firefox
|
||||
|
||||
@ -2381,6 +2696,15 @@ httpsplay.google.comstoreappsdetails?idcom.abunchtell.writeas: |
|
||||
Click_on_whatever_service_you_need_to_view_our_recommendations.: |
|
||||
Click on whatever service you need to view our recommendations.
|
||||
|
||||
Who_is_required_to_hand_over_the_encryption_keys_to_authorities?: |
|
||||
Who is required to hand over the encryption keys to authorities?
|
||||
|
||||
Why_is_it_not_recommended_to_choose_a_USbased_service?: |
|
||||
Why is it not recommended to choose a US-based service?
|
||||
|
||||
What_is_a_warrant_canary?: |
|
||||
What is a warrant canary?
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idorg.thoughtcrime.securesms: |
|
||||
https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms
|
||||
|
||||
@ -2522,249 +2846,3 @@ httpsplay.google.comstoreappsdetails?idcom.nextcloud.client: |
|
||||
httpsitunes.apple.comusappnextcloudid1125420102?mt8: |
|
||||
https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idorg.mozilla.firefox: |
|
||||
https://play.google.com/store/apps/details?id=org.mozilla.firefox
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser: |
|
||||
https://play.google.com/store/apps/details?id=org.torproject.torbrowser
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idcom.etesync.syncadapter: |
|
||||
https://play.google.com/store/apps/details?id=com.etesync.syncadapter
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idcom.nextcloud.client: |
|
||||
https://play.google.com/store/apps/details?id=com.nextcloud.client
|
||||
|
||||
httpsitunes.apple.comusappnextcloudid1125420102?mt8: |
|
||||
https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8
|
||||
|
||||
httpswww.clawsmail.orgdownloads.php?sectiondownloads: |
|
||||
https://www.claws-mail.org/downloads.php?section=downloads
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idorg.sufficientlysecure.keychain: |
|
||||
https://play.google.com/store/apps/details?id=org.sufficientlysecure.keychain
|
||||
|
||||
httpsgit.gnupg.orgcgibingitweb.cgi?pgnupg.git: |
|
||||
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idorg.mozilla.firefoxsend: |
|
||||
https://play.google.com/store/apps/details?id=org.mozilla.firefoxsend
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idcom.github.catfriend1.syncthingandroid: |
|
||||
https://play.google.com/store/apps/details?id=com.github.catfriend1.syncthingandroid
|
||||
|
||||
httpsgithub.comsyncthing?typesource: |
|
||||
https://github.com/syncthing?type=source
|
||||
|
||||
Prefer_the_classic_site?_View_a_singlepage_layout.: |
|
||||
Prefer the classic site? View a single-page layout.
|
||||
|
||||
Privacy?_I_dont_have_anything_to_hide.: |
|
||||
Privacy? I don't have anything to hide.
|
||||
|
||||
How_do_you_counter_the_I_have_nothing_to_hide?_argument?_reddit.com: |
|
||||
How do you counter the "I have nothing to hide?" argument? (reddit.com)
|
||||
|
||||
httpspapers.ssrn.comsol3papers.cfm?abstract_id998565: |
|
||||
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565
|
||||
|
||||
What_does_the_US_government_know_about_you?: |
|
||||
What does the US government know about you?
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser: |
|
||||
https://play.google.com/store/apps/details?id=org.torproject.torbrowser
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idnet.i2p.android: |
|
||||
https://play.google.com/store/apps/details?id=net.i2p.android
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idcom.standardnotes: |
|
||||
https://play.google.com/store/apps/details?id=com.standardnotes
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idcom.lyonbros.turtl: |
|
||||
https://play.google.com/store/apps/details?id=com.lyonbros.turtl
|
||||
|
||||
Privacy?_I_dont_have_anything_to_hide.: |
|
||||
Privacy? I don't have anything to hide.
|
||||
|
||||
How_do_you_counter_the_I_have_nothing_to_hide?_argument?_reddit.com: |
|
||||
How do you counter the "I have nothing to hide?" argument? (reddit.com)
|
||||
|
||||
httpspapers.ssrn.comsol3papers.cfm?abstract_id998565: |
|
||||
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idorg.mozilla.firefox: |
|
||||
https://play.google.com/store/apps/details?id=org.mozilla.firefox
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser: |
|
||||
https://play.google.com/store/apps/details?id=org.torproject.torbrowser
|
||||
|
||||
httpswww.clawsmail.orgdownloads.php?sectiondownloads: |
|
||||
https://www.claws-mail.org/downloads.php?section=downloads
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idorg.thoughtcrime.securesms: |
|
||||
https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idcom.wire: |
|
||||
https://play.google.com/store/apps/details?id=com.wire
|
||||
|
||||
httpsitunes.apple.comappwireid930944768?mt8: |
|
||||
https://itunes.apple.com/app/wire/id930944768?mt=8
|
||||
|
||||
httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner: |
|
||||
https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
|
||||
|
||||
httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner: |
|
||||
https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
|
||||
|
||||
httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner: |
|
||||
https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idorg.linphone: |
|
||||
https://play.google.com/store/apps/details?id=org.linphone
|
||||
|
||||
httpsitunes.apple.comusapplinphoneid360065638?mt8: |
|
||||
https://itunes.apple.com/us/app/linphone/id360065638?mt=8
|
||||
|
||||
httpsapps.apple.comusappmumbleid443472808?ls1: |
|
||||
https://apps.apple.com/us/app/mumble/id443472808?ls=1
|
||||
|
||||
httpsfdroid.orgrepositorybrowse?fdidim.vector.alpha: |
|
||||
https://f-droid.org/repository/browse/?fdid=im.vector.alpha
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idim.vector.app: |
|
||||
https://play.google.com/store/apps/details?id=im.vector.app
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idchat.rocket.android: |
|
||||
https://play.google.com/store/apps/details?id=chat.rocket.android
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idio.keybase.ossifragehlen_US: |
|
||||
https://play.google.com/store/apps/details?id=io.keybase.ossifrage&hl=en_US
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idorg.mozilla.firefoxsend: |
|
||||
https://play.google.com/store/apps/details?id=org.mozilla.firefoxsend
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idcom.nextcloud.client: |
|
||||
https://play.google.com/store/apps/details?id=com.nextcloud.client
|
||||
|
||||
httpsitunes.apple.comusappnextcloudid1125420102?mt8: |
|
||||
https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idcom.nextcloud.client: |
|
||||
https://play.google.com/store/apps/details?id=com.nextcloud.client
|
||||
|
||||
httpsitunes.apple.comusappnextcloudid1125420102?mt8: |
|
||||
https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idcom.github.catfriend1.syncthingandroid: |
|
||||
https://play.google.com/store/apps/details?id=com.github.catfriend1.syncthingandroid
|
||||
|
||||
httpsgithub.comsyncthing?typesource: |
|
||||
https://github.com/syncthing?type=source
|
||||
|
||||
httpssafariextensions.apple.comdetails?idcom.bitwarden.safariLTZ2PFU5D6: |
|
||||
https://safari-extensions.apple.com/details/?id=com.bitwarden.safari-LTZ2PFU5D6
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idcom.x8bit.bitwarden: |
|
||||
https://play.google.com/store/apps/details?id=com.x8bit.bitwarden
|
||||
|
||||
httpsitunes.apple.comappbitwardenfreepasswordmanagerid1137397744?mt8: |
|
||||
https://itunes.apple.com/app/bitwarden-free-password-manager/id1137397744?mt=8
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idcom.kunzisoft.keepass.free: |
|
||||
https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.free
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idcom.lesspass.android: |
|
||||
https://play.google.com/store/apps/details?id=com.lesspass.android
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idcom.etesync.syncadapter: |
|
||||
https://play.google.com/store/apps/details?id=com.etesync.syncadapter
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idorg.sufficientlysecure.keychain: |
|
||||
https://play.google.com/store/apps/details?id=org.sufficientlysecure.keychain
|
||||
|
||||
httpsgit.gnupg.orgcgibingitweb.cgi?pgnupg.git: |
|
||||
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser: |
|
||||
https://play.google.com/store/apps/details?id=org.torproject.torbrowser
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idnet.i2p.android: |
|
||||
https://play.google.com/store/apps/details?id=net.i2p.android
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idcom.standardnotes: |
|
||||
https://play.google.com/store/apps/details?id=com.standardnotes
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idcom.lyonbros.turtl: |
|
||||
https://play.google.com/store/apps/details?id=com.lyonbros.turtl
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idcom.abunchtell.writeas: |
|
||||
https://play.google.com/store/apps/details?id=com.abunchtell.writeas
|
||||
|
||||
What_does_the_US_government_know_about_you?: |
|
||||
What does the US government know about you?
|
||||
|
||||
httpssafariextensions.apple.comdetails?idcom.bitwarden.safariLTZ2PFU5D6: |
|
||||
https://safari-extensions.apple.com/details/?id=com.bitwarden.safari-LTZ2PFU5D6
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idcom.x8bit.bitwarden: |
|
||||
https://play.google.com/store/apps/details?id=com.x8bit.bitwarden
|
||||
|
||||
httpsitunes.apple.comappbitwardenfreepasswordmanagerid1137397744?mt8: |
|
||||
https://itunes.apple.com/app/bitwarden-free-password-manager/id1137397744?mt=8
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idcom.kunzisoft.keepass.free: |
|
||||
https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.free
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idcom.lesspass.android: |
|
||||
https://play.google.com/store/apps/details?id=com.lesspass.android
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idcom.abunchtell.writeas: |
|
||||
https://play.google.com/store/apps/details?id=com.abunchtell.writeas
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idorg.thoughtcrime.securesms: |
|
||||
https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idcom.wire: |
|
||||
https://play.google.com/store/apps/details?id=com.wire
|
||||
|
||||
httpsitunes.apple.comappwireid930944768?mt8: |
|
||||
https://itunes.apple.com/app/wire/id930944768?mt=8
|
||||
|
||||
httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner: |
|
||||
https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
|
||||
|
||||
httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner: |
|
||||
https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
|
||||
|
||||
httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner: |
|
||||
https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idorg.linphone: |
|
||||
https://play.google.com/store/apps/details?id=org.linphone
|
||||
|
||||
httpsitunes.apple.comusapplinphoneid360065638?mt8: |
|
||||
https://itunes.apple.com/us/app/linphone/id360065638?mt=8
|
||||
|
||||
httpsapps.apple.comusappmumbleid443472808?ls1: |
|
||||
https://apps.apple.com/us/app/mumble/id443472808?ls=1
|
||||
|
||||
httpsfdroid.orgrepositorybrowse?fdidim.vector.alpha: |
|
||||
https://f-droid.org/repository/browse/?fdid=im.vector.alpha
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idim.vector.app: |
|
||||
https://play.google.com/store/apps/details?id=im.vector.app
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idchat.rocket.android: |
|
||||
https://play.google.com/store/apps/details?id=chat.rocket.android
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idio.keybase.ossifragehlen_US: |
|
||||
https://play.google.com/store/apps/details?id=io.keybase.ossifrage&hl=en_US
|
||||
|
||||
Why_sponsor__site.name_?: |
|
||||
Why sponsor {{ site.name }}?
|
||||
|
||||
httpsplay.google.comstoreappsdetails?idcom.nextcloud.client: |
|
||||
https://play.google.com/store/apps/details?id=com.nextcloud.client
|
||||
|
||||
httpsitunes.apple.comusappnextcloudid1125420102?mt8: |
|
||||
https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8
|
||||
|
||||
|
Reference in New Issue
Block a user