Add translations to the main site (+markdown transition) [DON'T MERGE] #621
|
@ -1,8 +0,0 @@
|
|||
---
|
||||
title: Global Mass Surveillance - The Fourteen Eyes
|
||||
description: >
|
||||
The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the [Five Eyes](https://www.giswatch.org/en/communications-surveillance/unmasking-five-eyes-global-surveillance-practices), focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to [not spy on each other](https://www.pbs.org/newshour/world/an-exclusive-club-the-five-countries-that-dont-spy-on-each-other) as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other’s citizens and [share intelligence](https://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa) to [avoid breaking domestic laws](https://www.theguardian.com/politics/2013/jun/10/nsa-offers-intelligence-british-counterparts-blunkett) that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes), however Five Eyes and third-party countries can and do spy on each other.
|
||||
five_eyes: Five Eyes
|
||||
nine_eyes: Nine Eyes
|
||||
fourteen_eyes: Fourteen Eyes
|
||||
---
|
|
@ -1,9 +0,0 @@
|
|||
---
|
||||
site_subheading: >
|
||||
You are being watched. Private and state-sponsored organizations are monitoring and recording
|
||||
your online activities. privacytools.io provides knowledge and tools to protect your privacy
|
||||
against global mass surveillance.
|
||||
translations_disclaimer: Translations of privacytools.io were done by volunteers. They might be not up to date.
|
||||
Read also: Read also
|
||||
Related Information: Related Information
|
||||
---
|
|
@ -1,11 +0,0 @@
|
|||
---
|
||||
title: Key Disclosure Law
|
||||
subheading: Who is required to hand over the encryption keys to authorities?
|
||||
description: >
|
||||
Mandatory [key disclosure laws](https://en.wikipedia.org/wiki/Key_disclosure_law) require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.
|
||||
|
||||
[Steganography](https://en.wikipedia.org/wiki/Steganography) involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).
|
||||
apply: Key disclosure laws apply
|
||||
may_apply: Key disclosure laws may apply
|
||||
dont_apply: Key disclosure laws don't apply
|
||||
footnote: people who know how to access a system may be ordered to share their knowledge, <strong>however, this doesn't apply to the suspect itself or family members.</strong>
|
|
@ -1,10 +0,0 @@
|
|||
---
|
||||
title: Why is it not recommended to choose a US-based service?
|
||||
description: >
|
||||
Services based in the United States are not recommended because of the country’s surveillance programs, use of [National Security Letters](https://www.eff.org/issues/national-security-letters/faq) (NSLs) and accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to [secretly force](https://www.schneier.com/blog/archives/2013/08/more_on_the_nsa.html) companies to grant complete access to customer data and transform the service into a tool of mass surveillance.
|
||||
|
||||
An example of this is [Lavabit](https://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order) – a discontinued secure email service created by Ladar Levison. The FBI [requested](https://motherboard.vice.com/en_us/article/nzz888/lavabit-founder-ladar-levison-discusses-his-federal-battle-for-privacy) Snowden’s records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service’s SSL keys. Having the SSL keys would allow them to access communications (both metadata and unencrypted content) in real time for all of Lavabit’s customers, not just Snowden's.
|
||||
|
||||
Ultimately, Levison turned over the SSL keys and [shut down](https://www.theguardian.com/commentisfree/2014/may/20/why-did-lavabit-shut-down-snowden-email) the service at the same time. The US government then [threatened Levison with arrest](http://www.cnbc.com/id/100962389),
|
||||
saying that shutting down the service was a violation of the court order.
|
||||
---
|
|
@ -0,0 +1,12 @@
|
|||
---
|
||||
en: &base
|
||||
title: Global Mass Surveillance - The Fourteen Eyes
|
||||
description: >
|
||||
The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the [Five Eyes](https://www.giswatch.org/en/communications-surveillance/unmasking-five-eyes-global-surveillance-practices), focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to [not spy on each other](https://www.pbs.org/newshour/world/an-exclusive-club-the-five-countries-that-dont-spy-on-each-other) as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other’s citizens and [share intelligence](https://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa) to [avoid breaking domestic laws](https://www.theguardian.com/politics/2013/jun/10/nsa-offers-intelligence-british-counterparts-blunkett) that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes), however Five Eyes and third-party countries can and do spy on each other.
|
||||
five_eyes: Five Eyes
|
||||
nine_eyes: Nine Eyes
|
||||
fourteen_eyes: Fourteen Eyes
|
||||
|
||||
it:
|
||||
<<: *base
|
||||
---
|
|
@ -0,0 +1,18 @@
|
|||
---
|
||||
en: &base
|
||||
site_subheading: >
|
||||
You are being watched. Private and state-sponsored organizations are monitoring and recording
|
||||
your online activities. privacytools.io provides knowledge and tools to protect your privacy
|
||||
against global mass surveillance.
|
||||
translations_disclaimer: Translations of privacytools.io were done by volunteers. They might be not up to date.
|
||||
read_also: Read also
|
||||
related_information: Related Information
|
||||
|
||||
it:
|
||||
<<: *base
|
||||
site_subheading: >
|
||||
You are being watched. Private and state-sponsored organizations are monitoring and recording
|
||||
your online activities. privacytools.io provides knowledge and tools to protect your privacy
|
||||
against global mass surveillance. (IT)
|
||||
read_also: Read also (IT)
|
||||
---
|
|
@ -1,7 +0,0 @@
|
|||
---
|
||||
subheading: >
|
||||
You are being watched. Private and state-sponsored organizations are monitoring and recording
|
||||
your online activities. privacytools.io provides knowledge and tools to protect your privacy
|
||||
against global mass surveillance. (IT)
|
||||
Read also: Read also (IT)
|
||||
---
|
|
@ -1,5 +0,0 @@
|
|||
---
|
||||
title: Italian title for nothing to hide
|
||||
quote: >
|
||||
Italian quote
|
||||
---
|
|
@ -0,0 +1,18 @@
|
|||
---
|
||||
en: &base
|
||||
title: Key Disclosure Law
|
||||
subheading: Who is required to hand over the encryption keys to authorities?
|
||||
description: >
|
||||
Mandatory [key disclosure laws](https://en.wikipedia.org/wiki/Key_disclosure_law) require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.
|
||||
|
||||
[Steganography](https://en.wikipedia.org/wiki/Steganography) involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).
|
||||
apply: Key disclosure laws apply
|
||||
may_apply: Key disclosure laws may apply
|
||||
dont_apply: Key disclosure laws don't apply
|
||||
footnote: people who know how to access a system may be ordered to share their knowledge, <strong>however, this doesn't apply to the suspect itself or family members.</strong>
|
||||
|
||||
it:
|
||||
<<: *base
|
||||
footnote: something italian
|
||||
|
||||
---
|
|
@ -1,6 +1,7 @@
|
|||
---
|
||||
title: Privacy? I don't have anything to hide.
|
||||
quote: >
|
||||
en: &base
|
||||
title: Privacy? I don't have anything to hide.
|
||||
quote: >
|
||||
Over the last 16 months, as I've debated this issue around the world,
|
||||
every single time somebody has said to me, "I don't really worry about
|
||||
invasions of privacy because I don't have anything to hide." I always
|
||||
|
@ -13,5 +14,11 @@ quote: >
|
|||
if you're not a bad person, if you're doing nothing wrong, you should
|
||||
have nothing to hide." <strong>Not a single person hsa taken me up on
|
||||
that offer</strong>
|
||||
talk_name: Why privacy matters
|
||||
talk_name: Why privacy matters
|
||||
|
||||
it:
|
||||
<<: *base
|
||||
title: Italian title for nothing to hide
|
||||
quote: >
|
||||
Italian quote
|
||||
---
|
|
@ -0,0 +1,14 @@
|
|||
---
|
||||
en: &base
|
||||
title: Why is it not recommended to choose a US-based service?
|
||||
description: >
|
||||
Services based in the United States are not recommended because of the country’s surveillance programs, use of [National Security Letters](https://www.eff.org/issues/national-security-letters/faq) (NSLs) and accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to [secretly force](https://www.schneier.com/blog/archives/2013/08/more_on_the_nsa.html) companies to grant complete access to customer data and transform the service into a tool of mass surveillance.
|
||||
|
||||
An example of this is [Lavabit](https://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order) – a discontinued secure email service created by Ladar Levison. The FBI [requested](https://motherboard.vice.com/en_us/article/nzz888/lavabit-founder-ladar-levison-discusses-his-federal-battle-for-privacy) Snowden’s records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service’s SSL keys. Having the SSL keys would allow them to access communications (both metadata and unencrypted content) in real time for all of Lavabit’s customers, not just Snowden's.
|
||||
|
||||
Ultimately, Levison turned over the SSL keys and [shut down](https://www.theguardian.com/commentisfree/2014/may/20/why-did-lavabit-shut-down-snowden-email) the service at the same time. The US government then [threatened Levison with arrest](http://www.cnbc.com/id/100962389),
|
||||
saying that shutting down the service was a violation of the court order.
|
||||
|
||||
it:
|
||||
<<: *base
|
||||
---
|
|
@ -1,13 +1,13 @@
|
|||
{% include section_config section=include.section lang=include.lang %}
|
||||
|
||||
<h1 id="ukusa" class="anchor"><a href="#ukusa"><i class="fas fa-link anchor-icon"></i></a> {{ title }} </h1>
|
||||
<h1 id="ukusa" class="anchor"><a href="#ukusa"><i class="fas fa-link anchor-icon"></i></a> {{ lang.title }} </h1>
|
||||
<img src="/assets/img/layout/UKUSA.png" class="img-fluid float-right" alt="UKUSA Agreement" style="margin-left:10px;">
|
||||
{{ description }}
|
||||
{{ lang.description }}
|
||||
|
||||
<!-- chart -->
|
||||
<div class="row mb-3">
|
||||
{% include components/panel.html color="danger"
|
||||
title=five_eyes
|
||||
title=lang.five_eyes
|
||||
list='
|
||||
- Australia <div class="float-right"><span class="flag-icon flag-icon-au"></span></div>
|
||||
- Canada <div class="float-right"><span class="flag-icon flag-icon-ca"></span></div>
|
||||
|
@ -18,7 +18,7 @@
|
|||
%}
|
||||
|
||||
{% include components/panel.html color="warning"
|
||||
title=nine_eyes
|
||||
title=lang.nine_eyes
|
||||
list='
|
||||
- Denmark <div class="float-right"><span class="flag-icon flag-icon-dk"></span></div>
|
||||
- France <div class="float-right"><span class="flag-icon flag-icon-fr"></span></div>
|
||||
|
@ -28,7 +28,7 @@
|
|||
%}
|
||||
|
||||
{% include components/panel.html color="secondary"
|
||||
title=fourteen_eyes
|
||||
title=lang.fourteen_eyes
|
||||
list='
|
||||
- Belgium <div class="float-right"><span class="flag-icon flag-icon-be"></span></div>
|
||||
- Germany <div class="float-right"><span class="flag-icon flag-icon-de"></span></div>
|
||||
|
|
|
@ -1,15 +1,15 @@
|
|||
{% include section_config section=include.section lang=include.lang %}
|
||||
|
||||
<h1 id="kdl" class="anchor"><a href="#kdl"><i class="fas fa-link anchor-icon"></i></a> {{ title }}</h1>
|
||||
### {{ subheading }}
|
||||
<h1 id="kdl" class="anchor"><a href="#kdl"><i class="fas fa-link anchor-icon"></i></a> {{ lang.title }}</h1>
|
||||
### {{ lang.subheading }}
|
||||
|
||||
{{ description }}
|
||||
{{ lang.description }}
|
||||
|
||||
<!-- Chart of key disclosure law in some countries -->
|
||||
<div class="row mb-2">
|
||||
|
||||
{% include components/panel.html color="danger"
|
||||
title=apply
|
||||
title=lang.apply
|
||||
list='
|
||||
- [Antigua and Barbuda](https://en.wikipedia.org/wiki/Key_disclosure_law#Antigua_and_Barbuda) <div class="float-right"><span class="flag-icon flag-icon-ag"></span></div>
|
||||
- [Australia](https://en.wikipedia.org/wiki/Key_disclosure_law#Australia) <div class="float-right"><span class="flag-icon flag-icon-au"></span></div>
|
||||
|
@ -25,7 +25,7 @@
|
|||
%}
|
||||
|
||||
{% include components/panel.html color="warning"
|
||||
title=may_apply
|
||||
title=lang.may_apply
|
||||
list='
|
||||
- [Belgium *](https://en.wikipedia.org/wiki/Key_disclosure_law#Belgium) <div class="float-right"><span class="flag-icon flag-icon-be"></span></div>
|
||||
- [Finland *](https://en.wikipedia.org/wiki/Key_disclosure_law#Finland) <div class="float-right"><span class="flag-icon flag-icon-fi"></span></div>
|
||||
|
@ -36,7 +36,7 @@
|
|||
%}
|
||||
|
||||
{% include components/panel.html color="success"
|
||||
title=dont_apply
|
||||
title=lang.dont_apply
|
||||
list='
|
||||
- [Czech Republic](https://en.wikipedia.org/wiki/Key_disclosure_law#Czech_Republic) <div class="float-right"><span class="flag-icon flag-icon-cz"></span></div>
|
||||
- [Germany](https://en.wikipedia.org/wiki/Key_disclosure_law#Germany) <div class="float-right"><span class="flag-icon flag-icon-de"></span></div>
|
||||
|
@ -47,9 +47,9 @@
|
|||
|
||||
</div>
|
||||
|
||||
\* ({{ footnote }})
|
||||
\* ({{ lang.footnote }})
|
||||
|
||||
### {{ related_information }}
|
||||
### {{ general.related_information }}
|
||||
- <a href="https://en.wikipedia.org/wiki/Key_disclosure_law">Wikipedia page on key disclosure law</a>
|
||||
- <a href="https://law.stackexchange.com/questions/1523/can-a-us-citizen-be-required-to-provide-the-authentication-key-for-encrypted-dat">law.stackexchange.com question about key disclosure law in US</a>
|
||||
- <a href="https://www.youtube.com/watch?v=Jt7D4AIfqlQ">DEFCON 20: Crypto and the Cops: the Law of Key Disclosure and Forced Decryption</a>
|
|
@ -1,17 +1,17 @@
|
|||
{% include section_config section=include.section lang=include.lang %}
|
||||
|
||||
<div class="page-header">
|
||||
<h1>{{ title }}</h1>
|
||||
<h1>{{ lang.title }}</h1>
|
||||
</div>
|
||||
<blockquote class="blockquote">
|
||||
<p>
|
||||
<a href="https://www.ted.com/talks/glenn_greenwald_why_privacy_matters" title="Glenn Greenwald - {{ talk_name }} - TED Talk"><img src="/assets/img/layout/Glenn-Greenwald-Why-privacy-matters.jpg" class="img-fluid float-right ml-2" alt="Glenn Greenwald: {{ talk_name }}"></a>
|
||||
{{ quote }}
|
||||
<a href="https://www.ted.com/talks/glenn_greenwald_why_privacy_matters" title="Glenn Greenwald - {{ lang.talk_name }} - TED Talk"><img src="/assets/img/layout/Glenn-Greenwald-Why-privacy-matters.jpg" class="img-fluid float-right ml-2" alt="Glenn Greenwald: {{ lang.talk_name }}"></a>
|
||||
{{ lang.quote }}
|
||||
</p>
|
||||
<footer class="blockquote-footer">Glenn Greenwald in <cite title="{{ talk_name }} - TED Talk"><a href="https://www.ted.com/talks/glenn_greenwald_why_privacy_matters">{{ talk_name }} - TED Talk</a></cite></footer>
|
||||
<footer class="blockquote-footer">Glenn Greenwald in <cite title="{{ lang.talk_name }} - TED Talk"><a href="https://www.ted.com/talks/glenn_greenwald_why_privacy_matters">{{ lang.talk_name }} - TED Talk</a></cite></footer>
|
||||
</blockquote>
|
||||
|
||||
#### {{ read_also }}:
|
||||
#### {{ general.read_also }}:
|
||||
|
||||
- [Nothing to hide argument (Wikipedia)](https://en.wikipedia.org/wiki/Nothing_to_hide_argument)
|
||||
- [How do you counter the "I have nothing to hide?" argument? (reddit.com)](https://www.reddit.com/r/privacy/comments/3hynvp/how_do_you_counter_the_i_have_nothing_to_hide/)
|
||||
|
|
|
@ -1,12 +1,12 @@
|
|||
{% include section_config section=include.section lang=include.lang %}
|
||||
|
||||
<h3 id="usa" class="anchor">{{ title }}</h3>
|
||||
<h3 id="usa" class="anchor">{{ lang.title }}</h3>
|
||||
|
||||
<img src="/assets/img/layout/USA.png" class="img-fluid float-right" alt="USA" style="margin-left:10px;">
|
||||
|
||||
{{ description }}
|
||||
{{ lang.description }}
|
||||
|
||||
### {{ related_information }}
|
||||
### {{ general.related_information }}
|
||||
|
||||
- [Avoid all US and UK based services](https://www.bestvpn.com/the-ultimate-privacy-guide/#avoidus)
|
||||
- [Proof that warrant canaries work based on the surespot example.](https://en.wikipedia.org/wiki/Surespot#History)
|
||||
|
|
|
@ -1,11 +1,11 @@
|
|||
{% include langs/_general lang=include.lang %}
|
||||
{% assign lang = site.data.lang.general.[include.lang] %}
|
||||
|
||||
<div class="container" role="main">
|
||||
|
||||
<div class="jumbotron p-5">
|
||||
<!-- header just below the navigation bar -->
|
||||
<h1 class="display-4"><a href="https://www.privacytools.io/" title="privacytools.io"><img src="/assets/img/layout/logo.png" class="img-fluid" alt="privacytools.io"></a></h1>
|
||||
<p class="lead">{{ site_subheading }}</p>
|
||||
<p class="lead">{{ lang.site_subheading }}</p>
|
||||
<!-- end header just below the navigation bar -->
|
||||
</div>
|
||||
|
||||
|
|
|
@ -1,4 +0,0 @@
|
|||
{% assign lang = site.data.lang.[include.lang].[include.for] %}
|
||||
{% assign en = site.data.lang.en.[include.for] %}
|
||||
|
||||
{% include langs/{{include.for}} lang=lang en=en %}
|
|
@ -1,6 +0,0 @@
|
|||
{% assign language = site.data.lang.[include.lang].general %}
|
||||
{% assign english = site.data.lang.en.general %}
|
||||
|
||||
{% assign subheading = language.subheading | default: english.subheading %}
|
||||
{% assign read_also = language['Read also'] | default: english['Read also'] %}
|
||||
{% assign related_information = language['Related Information'] | default: english['Related Information'] %}
|
|
@ -1,5 +0,0 @@
|
|||
{% assign title = include.lang.title | default: include.en.title %}
|
||||
{% assign description = include.lang.description | default: include.en.description %}
|
||||
{% assign five_eyes = include.lang.five_eyes | default: include.en.five_eyes %}
|
||||
{% assign nine_eyes = include.lang.nine_eyes | default: include.en.nine_eyes %}
|
||||
{% assign fourteen_eyes = include.lang.fourteen_eyes | default: include.en.fourteen_eyes %}
|
|
@ -1,7 +0,0 @@
|
|||
{% assign title = include.lang.title | default: include.en.title %}
|
||||
{% assign subheading = include.lang.subheading | default: include.en.subheading %}
|
||||
{% assign description = include.lang.description | default: include.en.description %}
|
||||
{% assign apply = include.lang.apply | default: include.en.apply %}
|
||||
{% assign may_apply = include.lang.may_apply | default: include.en.may_apply %}
|
||||
{% assign dont_apply = include.lang.dont_apply | default: include.en.dont_apply %}
|
||||
{% assign footnote = include.lang.footnote | default: include.en.footnote %}
|
|
@ -1,3 +0,0 @@
|
|||
{% assign title = include.lang.title | default: include.en.title %}
|
||||
{% assign quote = include.lang.quote | default: include.en.quote %}
|
||||
{% assign talk_name = include.lang.talk_name | default: include.en.talk_name %}
|
|
@ -1 +0,0 @@
|
|||
{% assign title = include.lang.title | default: include.en.title %}
|
|
@ -1,4 +1,2 @@
|
|||
{% assign lang = site.data.lang.[include.lang].[include.section] %}
|
||||
{% assign en = site.data.lang.en.[include.section] %}
|
||||
{% include langs/_general lang=include.lang %}
|
||||
{% include langs/{{include.section}} lang=lang en=en %}
|
||||
{% assign lang = site.data.lang.[include.section].[include.lang] %}
|
||||
{% assign general = site.data.lang.general.[include.lang] %}
|
Reference in New Issue