NEW [WIP] Add localization support with jekyll-simple-i18n #1509

Open
jonah wants to merge 76 commits from i18n-simple into master
6 changed files with 444 additions and 353 deletions
Showing only changes of commit 085bb990d1 - Show all commits

View File

@ -5,7 +5,7 @@
{% else %}
<div class="card-header text-white bg-{{include.color}}">
{% endif %}
<h3 class="h5">{{include.title}}</h3>
<h3 class="h5">{{include.title | translate_text}}</h3>
</div>
<div class="card-body">
{{include.body}}

View File

@ -1,45 +1,53 @@
<h1 id="ukusa" class="anchor"><a href="#ukusa"><i class="fas fa-link anchor-icon"></i></a> Global Mass Surveillance - The Fourteen Eyes</h1>
<h1 id="ukusa" class="anchor"><a href="#ukusa"><i class="fas fa-link anchor-icon"></i></a> {% t Global Mass Surveillance - The Fourteen Eyes %}</h1>
<img src="/assets/img/layout/UKUSA.png" width="260" height="115" class="img-fluid float-right ml-2" alt="{% t UKUSA Agreement %}">
<p>{% t The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the <a href="https://www.giswatch.org/en/communications-surveillance/unmasking-five-eyes-global-surveillance-practices">Five Eyes</a>, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to <a href="https://www.pbs.org/newshour/world/an-exclusive-club-the-five-countries-that-dont-spy-on-each-other">not spy on each other</a> as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and <a href="https://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa">share intelligence</a> to <a href="https://www.theguardian.com/politics/2013/jun/10/nsa-offers-intelligence-british-counterparts-blunkett">avoid breaking domestic laws</a> that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes); however, Five Eyes and third-party countries can and do spy on each other. %}</p>
<img src="/assets/img/layout/UKUSA.png" width="260" height="115" class="img-fluid float-right ml-2" alt="UKUSA Agreement">
<p>The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the <a href="https://www.giswatch.org/en/communications-surveillance/unmasking-five-eyes-global-surveillance-practices">Five Eyes</a>, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to <a href="https://www.pbs.org/newshour/world/an-exclusive-club-the-five-countries-that-dont-spy-on-each-other">not spy on each other</a> as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and <a href="https://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa">share intelligence</a> to <a href="https://www.theguardian.com/politics/2013/jun/10/nsa-offers-intelligence-british-counterparts-blunkett">avoid breaking domestic laws</a> that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes); however, Five Eyes and third-party countries can and do spy on each other.</p>
<div class="row mb-3">
{% capture five_eyes_card %}
<ol class="card-ol">
<li>{% t Australia %}<div class="float-right"><span class="flag-icon flag-icon-au"></span></div></li>
<li>{% t Canada %}<div class="float-right"><span class="flag-icon flag-icon-ca"></span></div></li>
<li>{% t New Zealand %}<div class="float-right"><span class="flag-icon flag-icon-nz"></span></div></li>
<li>{% t United Kingdom %}<div class="float-right"><span class="flag-icon flag-icon-gb"></span></div></li>
<li>{% t United States of America %}<div class="float-right"><span class="flag-icon flag-icon-us"></span></div></li>
</ol>
{% endcapture %}
{% include panel.html color="danger"
title="Five Eyes"
body='
<ol class="card-ol">
<li>Australia <div class="float-right"><span class="flag-icon flag-icon-au"></span></div></li>
<li>Canada <div class="float-right"><span class="flag-icon flag-icon-ca"></span></div></li>
<li>New Zealand <div class="float-right"><span class="flag-icon flag-icon-nz"></span></div></li>
<li>United Kingdom <div class="float-right"><span class="flag-icon flag-icon-gb"></span></div></li>
<li>United States of America <div class="float-right"><span class="flag-icon flag-icon-us"></span></div></li>
</ol>
'
body=five_eyes_card
%}
{% capture nine_eyes_card %}
<ol class="card-ol">
<li>{% t Denmark %}<div class="float-right"><span class="flag-icon flag-icon-dk"></span></div></li>
<li>{% t France %}<div class="float-right"><span class="flag-icon flag-icon-fr"></span></div></li>
<li>{% t Netherlands %}<div class="float-right"><span class="flag-icon flag-icon-nl"></span></div></li>
<li>{% t Norway %}<div class="float-right"><span class="flag-icon flag-icon-no"></span></div></li>
</ol>
{% endcapture %}
{% include panel.html color="warning"
title="Nine Eyes"
body='
<ol class="card-ol">
<li>Denmark <div class="float-right"><span class="flag-icon flag-icon-dk"></span></div></li>
<li>France <div class="float-right"><span class="flag-icon flag-icon-fr"></span></div></li>
<li>Netherlands <div class="float-right"><span class="flag-icon flag-icon-nl"></span></div></li>
<li>Norway <div class="float-right"><span class="flag-icon flag-icon-no"></span></div></li>
</ol>
'
body=nine_eyes_card
%}
{% capture fourteen_eyes_card %}
<ol class="card-ol">
<li>{% t Belgium %}<div class="float-right"><span class="flag-icon flag-icon-be"></span></div></li>
<li>{% t Germany %}<div class="float-right"><span class="flag-icon flag-icon-de"></span></div></li>
<li>{% t Italy %}<div class="float-right"><span class="flag-icon flag-icon-it"></span></div></li>
<li>{% t Spain %}<div class="float-right"><span class="flag-icon flag-icon-es"></span></div></li>
<li>{% t Sweden %}<div class="float-right"><span class="flag-icon flag-icon-se"></span></div></li>
</ol>
{% endcapture %}
{% include panel.html color="secondary"
title="Fourteen Eyes"
body='
<ol class="card-ol">
<li>Belgium <div class="float-right"><span class="flag-icon flag-icon-be"></span></div></li>
<li>Germany <div class="float-right"><span class="flag-icon flag-icon-de"></span></div></li>
<li>Italy <div class="float-right"><span class="flag-icon flag-icon-it"></span></div></li>
<li>Spain <div class="float-right"><span class="flag-icon flag-icon-es"></span></div></li>
<li>Sweden <div class="float-right"><span class="flag-icon flag-icon-se"></span></div></li>
</ol>
'
body=fourteen_eyes_card
%}
</div>

View File

@ -1,88 +1,93 @@
<h1 id="kdl" class="anchor"><a href="#kdl"><i class="fas fa-link anchor-icon"></i></a> Key Disclosure Law</h1>
<h1 id="kdl" class="anchor"><a href="#kdl"><i class="fas fa-link anchor-icon"></i></a> {% t Key Disclosure Law %}</h1>
<h3>Who is required to hand over the encryption keys to authorities?</h3>
<h3>{% t Who is required to hand over the encryption keys to authorities? %}</h3>
<p>Mandatory <a href="https://en.wikipedia.org/wiki/Key_disclosure_law">key disclosure laws</a> require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.</p> <p><a href="https://en.wikipedia.org/wiki/Steganography">Steganography</a> involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).</p>
<p>{% t Mandatory <a href="https://en.wikipedia.org/wiki/Key_disclosure_law">key disclosure laws</a> require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.</p> <p><a href="https://en.wikipedia.org/wiki/Steganography">Steganography</a> involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data). %}</p>
<div class="row mb-2">
{% capture apply_card %}
<ol class="card-ol">
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#Antigua_and_Barbuda %}">{% t Antigua and Barbuda %}</a> <div class="float-right"><span class="flag-icon flag-icon-ag"></span></div></li>
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#Australia %}">{% t Australia %}</a> <div class="float-right"><span class="flag-icon flag-icon-au"></span></div></li>
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#Canada %}">{% t Canada %}</a> <div class="float-right"><span class="flag-icon flag-icon-ca"></span></div></li>
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#France %}">{% t France %}</a> <div class="float-right"><span class="flag-icon flag-icon-fr"></span></div></li>
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#India %}">{% t India %}</a> <div class="float-right"><span class="flag-icon flag-icon-in"></span></div></li>
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#Ireland %}">{% t Ireland %}</a> <div class="float-right"><span class="flag-icon flag-icon-ie"></span></div></li>
<li><a href="{% t https://edri.org/norway-introduces-forced-biometric-authentication/ %}">{% t Norway %}</a> <div class="float-right"><span class="flag-icon flag-icon-no"></span></div></li>
<li><a href="{% t https://www.bloomberg.com/news/articles/2018-03-20/telegram-loses-bid-to-stop-russia-from-getting-encryption-keys %}">{% t Russia %}</a> <div class="float-right"><span class="flag-icon flag-icon-ru"></span></div></li>
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#South_Africa %}">{% t South Africa %}</a> <div class="float-right"><span class="flag-icon flag-icon-za"></span></div></li>
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#United_Kingdom %}">{% t United Kingdom %}</a> <div class="float-right"><span class="flag-icon flag-icon-gb"></span></div></li>
</ol>
{% endcapture %}
{% include panel.html color="danger"
title="Key disclosure laws apply"
body='
<ol class="card-ol">
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Antigua_and_Barbuda">Antigua and Barbuda</a> <div class="float-right"><span class="flag-icon flag-icon-ag"></span></div></li>
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Australia">Australia</a> <div class="float-right"><span class="flag-icon flag-icon-au"></span></div></li>
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Canada">Canada</a> <div class="float-right"><span class="flag-icon flag-icon-ca"></span></div></li>
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#France">France</a> <div class="float-right"><span class="flag-icon flag-icon-fr"></span></div></li>
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#India">India</a> <div class="float-right"><span class="flag-icon flag-icon-in"></span></div></li>
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Ireland">Ireland</a> <div class="float-right"><span class="flag-icon flag-icon-ie"></span></div></li>
<li><a href="https://edri.org/norway-introduces-forced-biometric-authentication/">Norway</a> <div class="float-right"><span class="flag-icon flag-icon-no"></span></div></li>
<li><a href="https://www.bloomberg.com/news/articles/2018-03-20/telegram-loses-bid-to-stop-russia-from-getting-encryption-keys">Russia</a> <div class="float-right"><span class="flag-icon flag-icon-ru"></span></div></li>
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#South_Africa">South Africa</a> <div class="float-right"><span class="flag-icon flag-icon-za"></span></div></li>
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#United_Kingdom">United Kingdom</a> <div class="float-right"><span class="flag-icon flag-icon-gb"></span></div></li>
</ol>
'
body=apply_card
%}
{% capture mayapply_card %}
<ol class="card-ol">
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#Belgium %}">{% t Belgium * %}</a> <div class="float-right"><span class="flag-icon flag-icon-be"></span></div></li>
<li><a href="{% t https://www.riigiteataja.ee/akt/106012016019 %}">{% t Estonia %}</a> <div class="float-right"><span class="flag-icon flag-icon-ee"></span></div></li>
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#Finland %}">{% t Finland * %}</a> <div class="float-right"><span class="flag-icon flag-icon-fi"></span></div></li>
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#New_Zealand %}">{% t New Zealand %}</a> ({% t unclear %}) <div class="float-right"><span class="flag-icon flag-icon-nz"></span></div></li>
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#The_Netherlands %}">{% t The Netherlands * %}</a> <div class="float-right"><span class="flag-icon flag-icon-nl"></span></div></li>
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#United_States %}">{% t United States %}</a> ({% t see related info %}) <div class="float-right"><span class="flag-icon flag-icon-us"></span></div></li>
</ol>
{% endcapture %}
{% include panel.html color="warning"
title="Key disclosure laws may apply"
body='
<ol class="card-ol">
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Belgium">Belgium *</a> <div class="float-right"><span class="flag-icon flag-icon-be"></span></div></li>
<li><a href="https://www.riigiteataja.ee/akt/106012016019">Estonia</a> <div class="float-right"><span class="flag-icon flag-icon-ee"></span></div></li>
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Finland">Finland *</a> <div class="float-right"><span class="flag-icon flag-icon-fi"></span></div></li>
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#New_Zealand">New Zealand</a> (unclear) <div class="float-right"><span class="flag-icon flag-icon-nz"></span></div></li>
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#The_Netherlands">The Netherlands *</a> <div class="float-right"><span class="flag-icon flag-icon-nl"></span></div></li>
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#United_States">United States</a> (see related info) <div class="float-right"><span class="flag-icon flag-icon-us"></span></div></li>
</ol>
'
body=mayapply_card
%}
{% capture dontapply_card %}
<ol class="card-ol">
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#Czech_Republic %}">{% t Czech Republic %}</a> <div class="float-right"><span class="flag-icon flag-icon-cz"></span></div></li>
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#Germany %}">{% t Germany %}</a> <div class="float-right"><span class="flag-icon flag-icon-de"></span></div></li>
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#Iceland %}">{% t Iceland %}</a> <div class="float-right"><span class="flag-icon flag-icon-is"></span></div></li>
<li><a href="{% t https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/italy %}">{% t Italy %}</a> <div class="float-right"><span class="flag-icon flag-icon-it"></span></div></li>
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#Poland %}">{% t Poland %}</a> <div class="float-right"><span class="flag-icon flag-icon-pl"></span></div></li>
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law#Sweden %}">{% t Sweden %}</a> ({% t proposed %}) <div class="float-right"><span class="flag-icon flag-icon-se"></span></div></li>
<li><a href="{% t https://www.wikipedia.org/wiki/Key_disclosure_law#Switzerland %}">{% t Switzerland %}</a> <div class="float-right"><span class="flag-icon flag-icon-ch"></span></div></li>
</ol>
{% endcapture %}
{% include panel.html color="success"
title="Key disclosure laws don't apply"
body='
<ol class="card-ol">
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Czech_Republic">Czech Republic</a> <div class="float-right"><span class="flag-icon flag-icon-cz"></span></div></li>
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Germany">Germany</a> <div class="float-right"><span class="flag-icon flag-icon-de"></span></div></li>
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Iceland">Iceland</a> <div class="float-right"><span class="flag-icon flag-icon-is"></span></div></li>
<li><a href="https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/italy">Italy</a> <div class="float-right"><span class="flag-icon flag-icon-it"></span></div></li>
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Poland">Poland</a> <div class="float-right"><span class="flag-icon flag-icon-pl"></span></div></li>
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Sweden">Sweden</a> (proposed) <div class="float-right"><span class="flag-icon flag-icon-se"></span></div></li>
<li><a href="https://www.wikipedia.org/wiki/Key_disclosure_law#Switzerland">Switzerland</a> <div class="float-right"><span class="flag-icon flag-icon-ch"></span></div></li>
</ol>
'
body=dontapply_card
%}
</div>
<p> * (people who know how to access a system may be ordered to share their knowledge, <strong>however, this doesn't apply to the suspect itself or family members.</strong>)</p>
<p>{% t * (people who know how to access a system may be ordered to share their knowledge, <strong>however, this doesn't apply to the suspect itself or family members.</strong>) %}</p>
<h3>Related Information</h3>
<h3>{% t Related Information %}</h3>
<ul>
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law">Wikipedia page on key disclosure law</a></li>
<li><a href="https://law.stackexchange.com/questions/1523/can-a-us-citizen-be-required-to-provide-the-authentication-key-for-encrypted-dat">law.stackexchange.com question about key disclosure law in US</a></li>
<li><a href="https://peertube.mastodon.host/videos/watch/e09915eb-5962-4830-a02f-8da5c2b59e71">DEFCON 20: Crypto and the Cops: the Law of Key Disclosure and Forced Decryption</a></li>
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law %}">{% t Wikipedia page on key disclosure law %}</a></li>
<li><a href="{% t https://law.stackexchange.com/questions/1523/can-a-us-citizen-be-required-to-provide-the-authentication-key-for-encrypted-dat %}">{% t law.stackexchange.com question about key disclosure law in US %}</a></li>
<li><a href="{% t https://peertube.mastodon.host/videos/watch/e09915eb-5962-4830-a02f-8da5c2b59e71 %}">{% t DEFCON 20: Crypto and the Cops: the Law of Key Disclosure and Forced Decryption %}</a></li>
</ul>
<h3 id="usa" class="anchor">Why is it not recommended to choose a US-based service?</h3>
<h3 id="usa" class="anchor">{% t Why is it not recommended to choose a US-based service? %}</h3>
<img src="/assets/img/layout/USA.png" width="200" height="200" class="img-fluid float-right ml-3" alt="USA">
<img src="/assets/img/layout/USA.png" width="200" height="200" class="img-fluid float-right ml-3" alt="{% t USA %}">
<p>Services based in the United States are not recommended because of the country's surveillance programs and use of <a href="https://www.eff.org/issues/national-security-letters/faq">National Security Letters</a> (NSLs) with accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to <a href="https://www.schneier.com/blog/archives/2013/08/more_on_the_nsa.html">secretly force</a> companies to grant complete access to customer data and transform the service into a tool of mass surveillance.</p>
<p>{% t Services based in the United States are not recommended because of the country's surveillance programs and use of <a href="https://www.eff.org/issues/national-security-letters/faq">National Security Letters</a> (NSLs) with accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to <a href="https://www.schneier.com/blog/archives/2013/08/more_on_the_nsa.html">secretly force</a> companies to grant complete access to customer data and transform the service into a tool of mass surveillance. %}</p>
<p>An example of this is <a href="https://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order">Lavabit</a> a secure email service created by Ladar Levison. The FBI <a href="https://www.vice.com/en_us/article/nzz888/lavabit-founder-ladar-levison-discusses-his-federal-battle-for-privacy">requested</a> Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access
communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.</p>
<p>{% t An example of this is <a href="https://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order">Lavabit</a> a secure email service created by Ladar Levison. The FBI <a href="https://www.vice.com/en_us/article/nzz888/lavabit-founder-ladar-levison-discusses-his-federal-battle-for-privacy">requested</a> Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.%}</p>
<p>Ultimately, Levison turned over the SSL keys and <a href="https://www.theguardian.com/commentisfree/2014/may/20/why-did-lavabit-shut-down-snowden-email">shut down</a> the service at the same time. The US government then <a href="https://www.cnbc.com/id/100962389">threatened Levison with arrest</a>, saying that shutting down the service was a violation of the court order.</p>
<p>{% t Ultimately, Levison turned over the SSL keys and <a href="https://www.theguardian.com/commentisfree/2014/may/20/why-did-lavabit-shut-down-snowden-email">shut down</a> the service at the same time. The US government then <a href="https://www.cnbc.com/id/100962389">threatened Levison with arrest</a>, saying that shutting down the service was a violation of the court order. %}</p>
<h3>Related Information</h3>
<h3>{% t Related Information %}</h3>
<ul>
<li><a href="https://www.bestvpn.com/the-ultimate-privacy-guide/#avoidus">Avoid all US and UK based services</a></li>
<li><a href="https://en.wikipedia.org/wiki/Surespot#History">Proof that warrant canaries work based on the surespot example.</a></li>
<li><a href="https://en.wikipedia.org/wiki/UKUSA_Agreement">The United Kingdom United States of America Agreement (UKUSA)</a></li>
<li><a href="https://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order">Lavabit: Suspension and gag order</a></li>
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law">Key disclosure law</a></li>
<li><a href="https://en.wikipedia.org/wiki/Portal:Mass_surveillance">Wikipedia Portal: Mass_surveillance</a></li>
<li><a href="{% t https://www.bestvpn.com/the-ultimate-privacy-guide/#avoidus %}">{% t Avoid all US and UK based services %}</a></li>
<li><a href="{% t https://en.wikipedia.org/wiki/Surespot#History %}">{% t Proof that warrant canaries work based on the surespot example. %}</a></li>
<li><a href="{% t https://en.wikipedia.org/wiki/UKUSA_Agreement %}">{% t The United Kingdom United States of America Agreement (UKUSA) %}</a></li>
<li><a href="{% t https://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order %}">{% t Lavabit: Suspension and gag order %}</a></li>
<li><a href="{% t https://en.wikipedia.org/wiki/Key_disclosure_law %}">{% t Key disclosure law %}</a></li>
<li><a href="{% t https://en.wikipedia.org/wiki/Portal:Mass_surveillance %}">{% t Wikipedia Portal: Mass_surveillance %}</a></li>
</ul>

View File

@ -1,22 +1,22 @@
<h1 id="wc" class="anchor"><a href="#wc"><i class="fas fa-link anchor-icon"></i></a> What is a warrant canary?</h1>
<h1 id="wc" class="anchor"><a href="#wc"><i class="fas fa-link anchor-icon"></i></a> {% t What is a warrant canary? %}</h1>
<img src="/assets/img/layout/warrant-canary.jpg" width="450" height="236" class="img-fluid float-right ml-3" alt="Warrant Canary Example">
<img src="/assets/img/layout/warrant-canary.jpg" width="450" height="236" class="img-fluid float-right ml-3" alt="{% t Warrant Canary Example %}">
<p>A warrant canary is a posted document stating that an organization has not received any secret subpoenas during a specific period of time. If this document fails to be updated during the specified time then the user is to assume that the service has received such a subpoena and should stop using the service.</p>
<p>{% t A warrant canary is a posted document stating that an organization has not received any secret subpoenas during a specific period of time. If this document fails to be updated during the specified time then the user is to assume that the service has received such a subpoena and should stop using the service. %}</p>
<h4>Warrant Canary Examples:</h4>
<h4>{% t Warrant Canary Examples: %}</h4>
<ol>
<li><a href="https://proxy.sh/canary">https://proxy.sh/canary</a></li>
<li><a href="https://www.ivpn.net/resources/canary.txt">https://www.ivpn.net/resources/canary.txt</a></li>
<li><a href="https://www.bolehvpn.net/canary.txt">https://www.bolehvpn.net/canary.txt</a></li>
<li><a href="https://www.ipredator.se/static/downloads/canary.txt">https://www.ipredator.se/static/downloads/canary.txt</a></li>
<li><a href="{% t https://proxy.sh/canary %}">{% t https://proxy.sh/canary %}</a></li>
<li><a href="{% t https://www.ivpn.net/resources/canary.txt %}">{% t https://www.ivpn.net/resources/canary.txt %}</a></li>
<li><a href="{% t https://www.bolehvpn.net/canary.txt %}">{% t https://www.bolehvpn.net/canary.txt %}</a></li>
<li><a href="{% t https://www.ipredator.se/static/downloads/canary.txt %}">{% t https://www.ipredator.se/static/downloads/canary.txt %}</a></li>
</ol>
<h4>Related Warrant Canary Information</h4>
<h4>{% t Related Warrant Canary Information %}</h4>
<ul>
<li><a href="https://www.eff.org/deeplinks/2014/04/warrant-canary-faq">Warrant Canary Frequently Asked Questions</a></li>
<li><a href="https://en.wikipedia.org/wiki/Warrant_canary#Companies_and_organizations_with_warrant_canaries">Companies and organizations with warrant canaries</a></li>
<li><a href="https://www.schneier.com/blog/archives/2015/03/australia_outla.html">Warrant canary criticism by Bruce Schneier and an example of a law against warrant canaries.</a></li>
<li><a href="{% t https://www.eff.org/deeplinks/2014/04/warrant-canary-faq %}">{% t Warrant Canary Frequently Asked Questions %}</a></li>
<li><a href="{% t https://en.wikipedia.org/wiki/Warrant_canary#Companies_and_organizations_with_warrant_canaries %}">{% t Companies and organizations with warrant canaries %}</a></li>
<li><a href="{% t https://www.schneier.com/blog/archives/2015/03/australia_outla.html %}">{% t Warrant canary criticism by Bruce Schneier and an example of a law against warrant canaries. %}</a></li>
</ul>

View File

@ -12,15 +12,15 @@ translate: true
<div class="card card-list">
<ul class="list-group list-group-flush">
<li class="list-group-item"><a href="/{% if page.language %}{{ page.language }}/{% endif %}providers/cloud-storage/"><span class="fas fa-cloud fa-fw"></span> {% t Cloud Storage%}</a></li>
<li class="list-group-item"><a href="/providers/dns/"><span class="fa fa-tasks fa-fw"></span> {% t DNS%}</a></li>
<li class="list-group-item"><a href="/providers/email/"><span class="fas fa-mail-bulk fa-fw"></span> {% t Email%}</a></li>
<li class="list-group-item"><a href="/providers/hosting/"><span class="fas fa-database fa-fw"></span> {% t Hosting%}</a></li>
<li class="list-group-item"><a href="/providers/paste/"><span class="fas fa-paste fa-fw"></span> {% t Pastebins%}</a></li>
<li class="list-group-item"><a href="/providers/search-engines/"><i class="fas fa-search fa-fw"></i> {% t Search Engines%}</a></li>
<li class="list-group-item"><a href="/providers/social-networks/"><span class="fas fa-expand-arrows-alt fa-fw"></span> {% t Social Networks%}</a></li>
<li class="list-group-item"><a href="/providers/social-news-aggregator/"><span class="far fa-newspaper fa-fw"></span> {% t Social News Aggregators%}</a></li>
<li class="list-group-item"><a href="/providers/vpn/"><span class="far fa-eye-slash fa-fw"></span> {% t VPN%}</a></li>
<li class="list-group-item"><a href="{{ "/providers/cloud-storage/" | translate_page }}"><span class="fas fa-cloud fa-fw"></span> {% t Cloud Storage%}</a></li>
<li class="list-group-item"><a href="{{ "/providers/dns/" | translate_page }}"><span class="fa fa-tasks fa-fw"></span> {% t DNS%}</a></li>
<li class="list-group-item"><a href="{{ "/providers/email/" | translate_page }}"><span class="fas fa-mail-bulk fa-fw"></span> {% t Email%}</a></li>
<li class="list-group-item"><a href="{{ "/providers/hosting/" | translate_page }}"><span class="fas fa-database fa-fw"></span> {% t Hosting%}</a></li>
<li class="list-group-item"><a href="{{ "/providers/paste/" | translate_page }}"><span class="fas fa-paste fa-fw"></span> {% t Pastebins%}</a></li>
<li class="list-group-item"><a href="{{ "/providers/search-engines/" | translate_page }}"><i class="fas fa-search fa-fw"></i> {% t Search Engines %}</a></li>
<li class="list-group-item"><a href="{{ "/providers/social-networks/" | translate_page }}"><span class="fas fa-expand-arrows-alt fa-fw"></span> {% t Social Networks%}</a></li>
<li class="list-group-item"><a href="{{ "/providers/social-news-aggregator/" | translate_page }}"><span class="far fa-newspaper fa-fw"></span> {% t Social News Aggregators%}</a></li>
<li class="list-group-item"><a href="{{ "/providers/vpn/" | translate_page }}"><span class="far fa-eye-slash fa-fw"></span> {% t VPN%}</a></li>
</ul>
</div>

View File

@ -1544,6 +1544,321 @@ How_do_you_counter_the_I_have_nothing_to_hide?_argument?_reddit.com: |
httpspapers.ssrn.comsol3papers.cfm?abstract_id998565: |
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565
Global_Mass_Surveillance__The_Fourteen_Eyes: |
Global Mass Surveillance - The Fourteen Eyes
UKUSA_Agreement: |
UKUSA Agreement
The_UKUSA_Agreement_is_an_agreement_between_the_United_Kingdom_United_States_Australia_Canada_and: |
The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the <a href="https://www.giswatch.org/en/communications-surveillance/unmasking-five-eyes-global-surveillance-practices">Five Eyes</a>, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to <a href="https://www.pbs.org/newshour/world/an-exclusive-club-the-five-countries-that-dont-spy-on-each-other">not spy on each other</a> as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and <a href="https://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa">share intelligence</a> to <a href="https://www.theguardian.com/politics/2013/jun/10/nsa-offers-intelligence-british-counterparts-blunkett">avoid breaking domestic laws</a> that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes); however, Five Eyes and third-party countries can and do spy on each other.
Australia: |
Australia
Canada: |
Canada
New_Zealand: |
New Zealand
United_Kingdom: |
United Kingdom
United_States_of_America: |
United States of America
Five_Eyes: |
Five Eyes
Denmark: |
Denmark
France: |
France
Netherlands: |
Netherlands
Norway: |
Norway
Nine_Eyes: |
Nine Eyes
Belgium: |
Belgium
Germany: |
Germany
Italy: |
Italy
Spain: |
Spain
Sweden: |
Sweden
Fourteen_Eyes: |
Fourteen Eyes
Key_Disclosure_Law: |
Key Disclosure Law
Who_is_required_to_hand_over_the_encryption_keys_to_authorities?: |
Who is required to hand over the encryption keys to authorities?
Mandatory_a_hrefhttpsen.wikipedia.orgwikiKey_disclosure_lawkey_disclosure_lawsa_require_: |
Mandatory <a href="https://en.wikipedia.org/wiki/Key_disclosure_law">key disclosure laws</a> require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.</p> <p><a href="https://en.wikipedia.org/wiki/Steganography">Steganography</a> involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).
httpsen.wikipedia.orgwikiKey_disclosure_lawAntigua_and_Barbuda: |
https://en.wikipedia.org/wiki/Key_disclosure_law#Antigua_and_Barbuda
Antigua_and_Barbuda: |
Antigua and Barbuda
httpsen.wikipedia.orgwikiKey_disclosure_lawAustralia: |
https://en.wikipedia.org/wiki/Key_disclosure_law#Australia
httpsen.wikipedia.orgwikiKey_disclosure_lawCanada: |
https://en.wikipedia.org/wiki/Key_disclosure_law#Canada
httpsen.wikipedia.orgwikiKey_disclosure_lawFrance: |
https://en.wikipedia.org/wiki/Key_disclosure_law#France
httpsen.wikipedia.orgwikiKey_disclosure_lawIndia: |
https://en.wikipedia.org/wiki/Key_disclosure_law#India
India: |
India
httpsen.wikipedia.orgwikiKey_disclosure_lawIreland: |
https://en.wikipedia.org/wiki/Key_disclosure_law#Ireland
Ireland: |
Ireland
httpsedri.orgnorwayintroducesforcedbiometricauthentication: |
https://edri.org/norway-introduces-forced-biometric-authentication/
httpswww.bloomberg.comnewsarticles20180320telegramlosesbidtostoprussiafromgettingenc: |
https://www.bloomberg.com/news/articles/2018-03-20/telegram-loses-bid-to-stop-russia-from-getting-encryption-keys
Russia: |
Russia
httpsen.wikipedia.orgwikiKey_disclosure_lawSouth_Africa: |
https://en.wikipedia.org/wiki/Key_disclosure_law#South_Africa
South_Africa: |
South Africa
httpsen.wikipedia.orgwikiKey_disclosure_lawUnited_Kingdom: |
https://en.wikipedia.org/wiki/Key_disclosure_law#United_Kingdom
Key_disclosure_laws_apply: |
Key disclosure laws apply
httpsen.wikipedia.orgwikiKey_disclosure_lawBelgium: |
https://en.wikipedia.org/wiki/Key_disclosure_law#Belgium
Belgium_: |
Belgium *
httpswww.riigiteataja.eeakt106012016019: |
https://www.riigiteataja.ee/akt/106012016019
Estonia: |
Estonia
httpsen.wikipedia.orgwikiKey_disclosure_lawFinland: |
https://en.wikipedia.org/wiki/Key_disclosure_law#Finland
Finland_: |
Finland *
httpsen.wikipedia.orgwikiKey_disclosure_lawNew_Zealand: |
https://en.wikipedia.org/wiki/Key_disclosure_law#New_Zealand
unclear: |
unclear
httpsen.wikipedia.orgwikiKey_disclosure_lawThe_Netherlands: |
https://en.wikipedia.org/wiki/Key_disclosure_law#The_Netherlands
The_Netherlands_: |
The Netherlands *
httpsen.wikipedia.orgwikiKey_disclosure_lawUnited_States: |
https://en.wikipedia.org/wiki/Key_disclosure_law#United_States
United_States: |
United States
see_related_info: |
see related info
Key_disclosure_laws_may_apply: |
Key disclosure laws may apply
httpsen.wikipedia.orgwikiKey_disclosure_lawCzech_Republic: |
https://en.wikipedia.org/wiki/Key_disclosure_law#Czech_Republic
Czech_Republic: |
Czech Republic
httpsen.wikipedia.orgwikiKey_disclosure_lawGermany: |
https://en.wikipedia.org/wiki/Key_disclosure_law#Germany
httpsen.wikipedia.orgwikiKey_disclosure_lawIceland: |
https://en.wikipedia.org/wiki/Key_disclosure_law#Iceland
Iceland: |
Iceland
httpsiclg.compracticeareascybersecuritylawsandregulationsitaly: |
https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/italy
httpsen.wikipedia.orgwikiKey_disclosure_lawPoland: |
https://en.wikipedia.org/wiki/Key_disclosure_law#Poland
Poland: |
Poland
httpsen.wikipedia.orgwikiKey_disclosure_lawSweden: |
https://en.wikipedia.org/wiki/Key_disclosure_law#Sweden
proposed: |
proposed
httpswww.wikipedia.orgwikiKey_disclosure_lawSwitzerland: |
https://www.wikipedia.org/wiki/Key_disclosure_law#Switzerland
Switzerland: |
Switzerland
Key_disclosure_laws_dont_apply: |
Key disclosure laws don't apply
_people_who_know_how_to_access_a_system_may_be_ordered_to_share_their_knowledge_stronghowever_t: |
* (people who know how to access a system may be ordered to share their knowledge, <strong>however, this doesn't apply to the suspect itself or family members.</strong>)
Related_Information: |
Related Information
httpsen.wikipedia.orgwikiKey_disclosure_law: |
https://en.wikipedia.org/wiki/Key_disclosure_law
Wikipedia_page_on_key_disclosure_law: |
Wikipedia page on key disclosure law
httpslaw.stackexchange.comquestions1523canauscitizenberequiredtoprovidetheauthenticati: |
https://law.stackexchange.com/questions/1523/can-a-us-citizen-be-required-to-provide-the-authentication-key-for-encrypted-dat
law.stackexchange.com_question_about_key_disclosure_law_in_US: |
law.stackexchange.com question about key disclosure law in US
httpspeertube.mastodon.hostvideoswatche09915eb59624830a02f8da5c2b59e71: |
https://peertube.mastodon.host/videos/watch/e09915eb-5962-4830-a02f-8da5c2b59e71
DEFCON_20_Crypto_and_the_Cops_the_Law_of_Key_Disclosure_and_Forced_Decryption: |
DEFCON 20: Crypto and the Cops: the Law of Key Disclosure and Forced Decryption
Why_is_it_not_recommended_to_choose_a_USbased_service?: |
Why is it not recommended to choose a US-based service?
USA: |
USA
Services_based_in_the_United_States_are_not_recommended_because_of_the_countrys_surveillance_program: |
Services based in the United States are not recommended because of the country's surveillance programs and use of <a href="https://www.eff.org/issues/national-security-letters/faq">National Security Letters</a> (NSLs) with accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to <a href="https://www.schneier.com/blog/archives/2013/08/more_on_the_nsa.html">secretly force</a> companies to grant complete access to customer data and transform the service into a tool of mass surveillance.
An_example_of_this_is_a_hrefhttpsen.wikipedia.orgwikiLavabitSuspension_and_gag_orderLavabi: |
An example of this is <a href="https://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order">Lavabit</a> a secure email service created by Ladar Levison. The FBI <a href="https://www.vice.com/en_us/article/nzz888/lavabit-founder-ladar-levison-discusses-his-federal-battle-for-privacy">requested</a> Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.
Ultimately_Levison_turned_over_the_SSL_keys_and_a_hrefhttpswww.theguardian.comcommentisfree2: |
Ultimately, Levison turned over the SSL keys and <a href="https://www.theguardian.com/commentisfree/2014/may/20/why-did-lavabit-shut-down-snowden-email">shut down</a> the service at the same time. The US government then <a href="https://www.cnbc.com/id/100962389">threatened Levison with arrest</a>, saying that shutting down the service was a violation of the court order.
httpswww.bestvpn.comtheultimateprivacyguideavoidus: |
https://www.bestvpn.com/the-ultimate-privacy-guide/#avoidus
Avoid_all_US_and_UK_based_services: |
Avoid all US and UK based services
httpsen.wikipedia.orgwikiSurespotHistory: |
https://en.wikipedia.org/wiki/Surespot#History
Proof_that_warrant_canaries_work_based_on_the_surespot_example.: |
Proof that warrant canaries work based on the surespot example.
httpsen.wikipedia.orgwikiUKUSA_Agreement: |
https://en.wikipedia.org/wiki/UKUSA_Agreement
The_United_Kingdom__United_States_of_America_Agreement_UKUSA: |
The United Kingdom United States of America Agreement (UKUSA)
httpsen.wikipedia.orgwikiLavabitSuspension_and_gag_order: |
https://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order
Lavabit_Suspension_and_gag_order: |
Lavabit: Suspension and gag order
Key_disclosure_law: |
Key disclosure law
httpsen.wikipedia.orgwikiPortalMass_surveillance: |
https://en.wikipedia.org/wiki/Portal:Mass_surveillance
Wikipedia_Portal_Mass_surveillance: |
Wikipedia Portal: Mass_surveillance
What_is_a_warrant_canary?: |
What is a warrant canary?
Warrant_Canary_Example: |
Warrant Canary Example
A_warrant_canary_is_a_posted_document_stating_that_an_organization_has_not_received_any_secret_subpoe: |
A warrant canary is a posted document stating that an organization has not received any secret subpoenas during a specific period of time. If this document fails to be updated during the specified time then the user is to assume that the service has received such a subpoena and should stop using the service.
Warrant_Canary_Examples: |
Warrant Canary Examples:
httpsproxy.shcanary: |
https://proxy.sh/canary
httpswww.ivpn.netresourcescanary.txt: |
https://www.ivpn.net/resources/canary.txt
httpswww.bolehvpn.netcanary.txt: |
https://www.bolehvpn.net/canary.txt
httpswww.ipredator.sestaticdownloadscanary.txt: |
https://www.ipredator.se/static/downloads/canary.txt
Related_Warrant_Canary_Information: |
Related Warrant Canary Information
httpswww.eff.orgdeeplinks201404warrantcanaryfaq: |
https://www.eff.org/deeplinks/2014/04/warrant-canary-faq
Warrant_Canary_Frequently_Asked_Questions: |
Warrant Canary Frequently Asked Questions
httpsen.wikipedia.orgwikiWarrant_canaryCompanies_and_organizations_with_warrant_canaries: |
https://en.wikipedia.org/wiki/Warrant_canary#Companies_and_organizations_with_warrant_canaries
Companies_and_organizations_with_warrant_canaries: |
Companies and organizations with warrant canaries
httpswww.schneier.comblogarchives201503australia_outla.html: |
https://www.schneier.com/blog/archives/2015/03/australia_outla.html
Warrant_canary_criticism_by_Bruce_Schneier_and_an_example_of_a_law_against_warrant_canaries.: |
Warrant canary criticism by Bruce Schneier and an example of a law against warrant canaries.
httpsplay.google.comstoreappsdetails?idorg.mozilla.firefox: |
https://play.google.com/store/apps/details?id=org.mozilla.firefox
@ -2381,6 +2696,15 @@ httpsplay.google.comstoreappsdetails?idcom.abunchtell.writeas: |
Click_on_whatever_service_you_need_to_view_our_recommendations.: |
Click on whatever service you need to view our recommendations.
Who_is_required_to_hand_over_the_encryption_keys_to_authorities?: |
Who is required to hand over the encryption keys to authorities?
Why_is_it_not_recommended_to_choose_a_USbased_service?: |
Why is it not recommended to choose a US-based service?
What_is_a_warrant_canary?: |
What is a warrant canary?
httpsplay.google.comstoreappsdetails?idorg.thoughtcrime.securesms: |
https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms
@ -2522,249 +2846,3 @@ httpsplay.google.comstoreappsdetails?idcom.nextcloud.client: |
httpsitunes.apple.comusappnextcloudid1125420102?mt8: |
https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8
httpsplay.google.comstoreappsdetails?idorg.mozilla.firefox: |
https://play.google.com/store/apps/details?id=org.mozilla.firefox
httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser: |
https://play.google.com/store/apps/details?id=org.torproject.torbrowser
httpsplay.google.comstoreappsdetails?idcom.etesync.syncadapter: |
https://play.google.com/store/apps/details?id=com.etesync.syncadapter
httpsplay.google.comstoreappsdetails?idcom.nextcloud.client: |
https://play.google.com/store/apps/details?id=com.nextcloud.client
httpsitunes.apple.comusappnextcloudid1125420102?mt8: |
https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8
httpswww.clawsmail.orgdownloads.php?sectiondownloads: |
https://www.claws-mail.org/downloads.php?section=downloads
httpsplay.google.comstoreappsdetails?idorg.sufficientlysecure.keychain: |
https://play.google.com/store/apps/details?id=org.sufficientlysecure.keychain
httpsgit.gnupg.orgcgibingitweb.cgi?pgnupg.git: |
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git
httpsplay.google.comstoreappsdetails?idorg.mozilla.firefoxsend: |
https://play.google.com/store/apps/details?id=org.mozilla.firefoxsend
httpsplay.google.comstoreappsdetails?idcom.github.catfriend1.syncthingandroid: |
https://play.google.com/store/apps/details?id=com.github.catfriend1.syncthingandroid
httpsgithub.comsyncthing?typesource: |
https://github.com/syncthing?type=source
Prefer_the_classic_site?_View_a_singlepage_layout.: |
Prefer the classic site? View a single-page layout.
Privacy?_I_dont_have_anything_to_hide.: |
Privacy? I don't have anything to hide.
How_do_you_counter_the_I_have_nothing_to_hide?_argument?_reddit.com: |
How do you counter the "I have nothing to hide?" argument? (reddit.com)
httpspapers.ssrn.comsol3papers.cfm?abstract_id998565: |
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565
What_does_the_US_government_know_about_you?: |
What does the US government know about you?
httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser: |
https://play.google.com/store/apps/details?id=org.torproject.torbrowser
httpsplay.google.comstoreappsdetails?idnet.i2p.android: |
https://play.google.com/store/apps/details?id=net.i2p.android
httpsplay.google.comstoreappsdetails?idcom.standardnotes: |
https://play.google.com/store/apps/details?id=com.standardnotes
httpsplay.google.comstoreappsdetails?idcom.lyonbros.turtl: |
https://play.google.com/store/apps/details?id=com.lyonbros.turtl
Privacy?_I_dont_have_anything_to_hide.: |
Privacy? I don't have anything to hide.
How_do_you_counter_the_I_have_nothing_to_hide?_argument?_reddit.com: |
How do you counter the "I have nothing to hide?" argument? (reddit.com)
httpspapers.ssrn.comsol3papers.cfm?abstract_id998565: |
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565
httpsplay.google.comstoreappsdetails?idorg.mozilla.firefox: |
https://play.google.com/store/apps/details?id=org.mozilla.firefox
httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser: |
https://play.google.com/store/apps/details?id=org.torproject.torbrowser
httpswww.clawsmail.orgdownloads.php?sectiondownloads: |
https://www.claws-mail.org/downloads.php?section=downloads
httpsplay.google.comstoreappsdetails?idorg.thoughtcrime.securesms: |
https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms
httpsplay.google.comstoreappsdetails?idcom.wire: |
https://play.google.com/store/apps/details?id=com.wire
httpsitunes.apple.comappwireid930944768?mt8: |
https://itunes.apple.com/app/wire/id930944768?mt=8
httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner: |
https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner: |
https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner: |
https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
httpsplay.google.comstoreappsdetails?idorg.linphone: |
https://play.google.com/store/apps/details?id=org.linphone
httpsitunes.apple.comusapplinphoneid360065638?mt8: |
https://itunes.apple.com/us/app/linphone/id360065638?mt=8
httpsapps.apple.comusappmumbleid443472808?ls1: |
https://apps.apple.com/us/app/mumble/id443472808?ls=1
httpsfdroid.orgrepositorybrowse?fdidim.vector.alpha: |
https://f-droid.org/repository/browse/?fdid=im.vector.alpha
httpsplay.google.comstoreappsdetails?idim.vector.app: |
https://play.google.com/store/apps/details?id=im.vector.app
httpsplay.google.comstoreappsdetails?idchat.rocket.android: |
https://play.google.com/store/apps/details?id=chat.rocket.android
httpsplay.google.comstoreappsdetails?idio.keybase.ossifragehlen_US: |
https://play.google.com/store/apps/details?id=io.keybase.ossifrage&hl=en_US
httpsplay.google.comstoreappsdetails?idorg.mozilla.firefoxsend: |
https://play.google.com/store/apps/details?id=org.mozilla.firefoxsend
httpsplay.google.comstoreappsdetails?idcom.nextcloud.client: |
https://play.google.com/store/apps/details?id=com.nextcloud.client
httpsitunes.apple.comusappnextcloudid1125420102?mt8: |
https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8
httpsplay.google.comstoreappsdetails?idcom.nextcloud.client: |
https://play.google.com/store/apps/details?id=com.nextcloud.client
httpsitunes.apple.comusappnextcloudid1125420102?mt8: |
https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8
httpsplay.google.comstoreappsdetails?idcom.github.catfriend1.syncthingandroid: |
https://play.google.com/store/apps/details?id=com.github.catfriend1.syncthingandroid
httpsgithub.comsyncthing?typesource: |
https://github.com/syncthing?type=source
httpssafariextensions.apple.comdetails?idcom.bitwarden.safariLTZ2PFU5D6: |
https://safari-extensions.apple.com/details/?id=com.bitwarden.safari-LTZ2PFU5D6
httpsplay.google.comstoreappsdetails?idcom.x8bit.bitwarden: |
https://play.google.com/store/apps/details?id=com.x8bit.bitwarden
httpsitunes.apple.comappbitwardenfreepasswordmanagerid1137397744?mt8: |
https://itunes.apple.com/app/bitwarden-free-password-manager/id1137397744?mt=8
httpsplay.google.comstoreappsdetails?idcom.kunzisoft.keepass.free: |
https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.free
httpsplay.google.comstoreappsdetails?idcom.lesspass.android: |
https://play.google.com/store/apps/details?id=com.lesspass.android
httpsplay.google.comstoreappsdetails?idcom.etesync.syncadapter: |
https://play.google.com/store/apps/details?id=com.etesync.syncadapter
httpsplay.google.comstoreappsdetails?idorg.sufficientlysecure.keychain: |
https://play.google.com/store/apps/details?id=org.sufficientlysecure.keychain
httpsgit.gnupg.orgcgibingitweb.cgi?pgnupg.git: |
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git
httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser: |
https://play.google.com/store/apps/details?id=org.torproject.torbrowser
httpsplay.google.comstoreappsdetails?idnet.i2p.android: |
https://play.google.com/store/apps/details?id=net.i2p.android
httpsplay.google.comstoreappsdetails?idcom.standardnotes: |
https://play.google.com/store/apps/details?id=com.standardnotes
httpsplay.google.comstoreappsdetails?idcom.lyonbros.turtl: |
https://play.google.com/store/apps/details?id=com.lyonbros.turtl
httpsplay.google.comstoreappsdetails?idcom.abunchtell.writeas: |
https://play.google.com/store/apps/details?id=com.abunchtell.writeas
What_does_the_US_government_know_about_you?: |
What does the US government know about you?
httpssafariextensions.apple.comdetails?idcom.bitwarden.safariLTZ2PFU5D6: |
https://safari-extensions.apple.com/details/?id=com.bitwarden.safari-LTZ2PFU5D6
httpsplay.google.comstoreappsdetails?idcom.x8bit.bitwarden: |
https://play.google.com/store/apps/details?id=com.x8bit.bitwarden
httpsitunes.apple.comappbitwardenfreepasswordmanagerid1137397744?mt8: |
https://itunes.apple.com/app/bitwarden-free-password-manager/id1137397744?mt=8
httpsplay.google.comstoreappsdetails?idcom.kunzisoft.keepass.free: |
https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.free
httpsplay.google.comstoreappsdetails?idcom.lesspass.android: |
https://play.google.com/store/apps/details?id=com.lesspass.android
httpsplay.google.comstoreappsdetails?idcom.abunchtell.writeas: |
https://play.google.com/store/apps/details?id=com.abunchtell.writeas
httpsplay.google.comstoreappsdetails?idorg.thoughtcrime.securesms: |
https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms
httpsplay.google.comstoreappsdetails?idcom.wire: |
https://play.google.com/store/apps/details?id=com.wire
httpsitunes.apple.comappwireid930944768?mt8: |
https://itunes.apple.com/app/wire/id930944768?mt=8
httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner: |
https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner: |
https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
httpswww.linphone.orgtechnicalcornerlinphone?qttechnical_corner2qttechnical_corner: |
https://www.linphone.org/technical-corner/linphone?qt-technical_corner=2#qt-technical_corner
httpsplay.google.comstoreappsdetails?idorg.linphone: |
https://play.google.com/store/apps/details?id=org.linphone
httpsitunes.apple.comusapplinphoneid360065638?mt8: |
https://itunes.apple.com/us/app/linphone/id360065638?mt=8
httpsapps.apple.comusappmumbleid443472808?ls1: |
https://apps.apple.com/us/app/mumble/id443472808?ls=1
httpsfdroid.orgrepositorybrowse?fdidim.vector.alpha: |
https://f-droid.org/repository/browse/?fdid=im.vector.alpha
httpsplay.google.comstoreappsdetails?idim.vector.app: |
https://play.google.com/store/apps/details?id=im.vector.app
httpsplay.google.comstoreappsdetails?idchat.rocket.android: |
https://play.google.com/store/apps/details?id=chat.rocket.android
httpsplay.google.comstoreappsdetails?idio.keybase.ossifragehlen_US: |
https://play.google.com/store/apps/details?id=io.keybase.ossifrage&hl=en_US
Why_sponsor__site.name_?: |
Why sponsor {{ site.name }}?
httpsplay.google.comstoreappsdetails?idcom.nextcloud.client: |
https://play.google.com/store/apps/details?id=com.nextcloud.client
httpsitunes.apple.comusappnextcloudid1125420102?mt8: |
https://itunes.apple.com/us/app/nextcloud/id1125420102?mt=8