diff --git a/img/flags/4x3/ag.svg b/img/flags/4x3/ag.svg new file mode 100755 index 00000000..05bf052f --- /dev/null +++ b/img/flags/4x3/ag.svg @@ -0,0 +1,15 @@ + + + + + + + + + + + + + + + diff --git a/img/flags/4x3/fi.svg b/img/flags/4x3/fi.svg new file mode 100755 index 00000000..4100a4d0 --- /dev/null +++ b/img/flags/4x3/fi.svg @@ -0,0 +1,5 @@ + + + + + diff --git a/img/flags/4x3/in.svg b/img/flags/4x3/in.svg new file mode 100755 index 00000000..97ca2b93 --- /dev/null +++ b/img/flags/4x3/in.svg @@ -0,0 +1,25 @@ + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/img/flags/4x3/pl.svg b/img/flags/4x3/pl.svg new file mode 100755 index 00000000..2350e5c6 --- /dev/null +++ b/img/flags/4x3/pl.svg @@ -0,0 +1,6 @@ + + + + + + diff --git a/img/flags/4x3/za.svg b/img/flags/4x3/za.svg new file mode 100755 index 00000000..29cd9935 --- /dev/null +++ b/img/flags/4x3/za.svg @@ -0,0 +1,17 @@ + + + + + + + + + + + + + + + + + diff --git a/index.html b/index.html index 3af682f8..a6d586a8 100644 --- a/index.html +++ b/index.html @@ -1892,13 +1892,77 @@
  • Edward Snowden on Passwords - YouTube
  • - + + + + + +

    Key disclosure law - Who is required to hand over the encryption keys to authorities?

    -

    Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant +

    Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.

    -

    Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an - adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).

    +

    Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an + adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).

    +
    + + +
    +
    +
    +
    +

    Key disclosure laws don't apply

    +
    +
    + 1. Czech Republic
    +
    2. Poland
    + +
    +
    +
    +
    +
    +
    +

    Key disclosure laws may apply

    +
    +
    + 1. New Zealand (unclear)
    +
    2. Sweden (proposed)
    +
    3. The Netherlands (people who know how to access a system may be ordered to share their knowledge, however, this doesn't apply to the suspect itself)
    +
    4. United States (see related information)
    +
    +
    +
    +
    +
    +
    +

    Key disclosure laws apply

    +
    +
    + 1. Antigua and Barbuda
    +
    2. Australia
    +
    3. Belgium
    +
    4. Canada
    +
    5. Finland
    +
    6. France
    +
    7. India
    +
    8. South Africa
    +
    9. United Kingdom
    +
    +
    +
    +
    + + + +

    Related Information

    +
    -

    ProtectedTextProtectedText is an open source web application. It encrypts and decrypts text in the browser, and password (or it's hash) is never sent to the server +

    ProtectedTextProtectedText is an open source web application. It encrypts and decrypts text in the browser, and password (or its hash) is never sent to the server - so that text can't be decrypted even if requested by authorities. No cookies, no sessions, no registration, no users tracking.