diff --git a/.gitignore b/.gitignore index 49b02122..af408d27 100644 --- a/.gitignore +++ b/.gitignore @@ -2,3 +2,4 @@ _site/ Gemfile Gemfile.lock .sass-cache/ +.DS_Store diff --git a/README.md b/README.md index 4e6d6d1f..2602deef 100644 --- a/README.md +++ b/README.md @@ -10,6 +10,10 @@ It's important for a website like privacytools.io to be up-to-date. Keep an eye You can submit your suggestions here on GitHub [(Issues)](https://github.com/privacytoolsIO/privacytools.io/issues) and also in our [subreddit](https://www.reddit.com/r/privacytoolsIO/). Thank you. +## Building +1. Install Ruby +2. `bundle install` +3. `bundle exec jekyll serve` # Live refresh. # Contributing Guidelines Please read this before contributing. diff --git a/_layouts/default.html b/_layouts/default.html index cb0912e2..df1b2c97 100644 --- a/_layouts/default.html +++ b/_layouts/default.html @@ -117,13 +117,16 @@ Search Engines Instant Messenger Video & Voice Messenger + File Sharing + Encrypted Cloud Storage + Self-Hosted Cloud Server + Secure File Sync Password Manager Calendar and Contacts Sync File Encryption - File Sharing - Secure File Sync Self-contained Networks - Self-Hosted Cloud Server + Social Networks + DNS Digital Notebook Paste Services Productivity Tools diff --git a/assets/img/tools/GNU-social.png b/assets/img/tools/GNU-social.png deleted file mode 100644 index 80532fba..00000000 Binary files a/assets/img/tools/GNU-social.png and /dev/null differ diff --git a/assets/img/tools/Mastodon.png b/assets/img/tools/Mastodon.png new file mode 100644 index 00000000..ac4694ec Binary files /dev/null and b/assets/img/tools/Mastodon.png differ diff --git a/index.html b/index.html index 2ea702db..bae005c9 100644 --- a/index.html +++ b/index.html @@ -97,6 +97,69 @@ layout: default + +

Key Disclosure Law

+ + +

Who is required to hand over the encryption keys to authorities?

+

Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant + is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.

+ + +

Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an + adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).

+ + +
+ + {% include panel.html color="danger" + title="Key disclosure laws apply" + body=' +
    +
  1. Antigua and Barbuda
  2. +
  3. Australia
  4. +
  5. Canada
  6. +
  7. France
  8. +
  9. India
  10. +
  11. Ireland
  12. +
  13. Norway
  14. +
  15. Russia
  16. +
  17. South Africa
  18. +
  19. United Kingdom
  20. +
+ ' + %} + + {% include panel.html color="warning" + title="Key disclosure laws may apply" + body=' +
    +
  1. Belgium *
  2. +
  3. Finland *
  4. +
  5. New Zealand (unclear)
  6. +
  7. Sweden (proposed)
  8. +
  9. The Netherlands *
  10. +
  11. United States (see related information)
  12. +
+ ' + %} + + {% include panel.html color="success" + title="Key disclosure laws don't apply" + body=' +
    +
  1. Czech Republic
  2. +
  3. Germany
  4. +
  5. Poland
  6. +
+ ' + %} + +
+ +

* (people who know how to access a system may be ordered to share their knowledge, however, this doesn't apply to the suspect itself or family members.)

+ +

Why is it not recommended to choose a US-based service?

USA @@ -1550,70 +1613,6 @@ layout: default - - -

Key disclosure law

- - -

Who is required to hand over the encryption keys to authorities?

-

Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant - is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.

- - -

Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an - adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).

- - -
- - {% include panel.html color="danger" - title="Key disclosure laws apply" - body=' -
    -
  1. Antigua and Barbuda
  2. -
  3. Australia
  4. -
  5. Canada
  6. -
  7. France
  8. -
  9. India
  10. -
  11. Ireland
  12. -
  13. Norway
  14. -
  15. Russia
  16. -
  17. South Africa
  18. -
  19. United Kingdom
  20. -
- ' - %} - - {% include panel.html color="warning" - title="Key disclosure laws may apply" - body=' -
    -
  1. Belgium *
  2. -
  3. Finland *
  4. -
  5. New Zealand (unclear)
  6. -
  7. Sweden (proposed)
  8. -
  9. The Netherlands *
  10. -
  11. United States (see related information)
  12. -
- ' - %} - - {% include panel.html color="success" - title="Key disclosure laws don't apply" - body=' -
    -
  1. Czech Republic
  2. -
  3. Germany
  4. -
  5. Poland
  6. -
- ' - %} - -
- - -

* (people who know how to access a system may be ordered to share their knowledge, however, this doesn't apply to the suspect itself or family members.)

-

Related Information