mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2024-12-30 09:56:26 -05:00
Merge branch 'key-disclosure-law' of https://github.com/Shifterovich/privacytools.io into key-disclosure-law
Conflicts: index.html
This commit is contained in:
commit
a8756d4ebb
15
img/flags/4x3/ag.svg
Executable file
15
img/flags/4x3/ag.svg
Executable file
@ -0,0 +1,15 @@
|
||||
<svg xmlns="http://www.w3.org/2000/svg" height="480" width="640">
|
||||
<defs>
|
||||
<clipPath id="a">
|
||||
<path fill-opacity=".67" d="M-79.698 0h682.67v512h-682.67z"/>
|
||||
</clipPath>
|
||||
</defs>
|
||||
<g clip-path="url(#a)" fill-rule="evenodd" transform="translate(74.717) scale(.9375)">
|
||||
<path fill="#fff" d="M-120 0h763.27v511.49H-120z"/>
|
||||
<path d="M-118.31.617h760.88v216.09h-760.88z"/>
|
||||
<path fill="#0061ff" d="M21.3 203.23h505.01v113.82H21.3z"/>
|
||||
<path d="M642.75 1.753v510.25H262.03L642.75 1.753z" fill="#e20000"/>
|
||||
<path d="M-118.69 1.753v510.25h380.72L-118.69 1.753z" fill="#e20000"/>
|
||||
<path d="M440.37 203.34l-76.31-19.363L428.98 135l-79.726 11.39 41.003-69.475-70.616 41.003 12.53-80.867-47.837 63.783L264.97 26.8l-21.64 76.31-47.837-64.92 13.667 83.145-70.615-43.282 41.003 69.476-77.45-12.53 63.783 47.838-79.727 20.5h354.22z" fill="#ffd600"/>
|
||||
</g>
|
||||
</svg>
|
After (image error) Size: 880 B |
5
img/flags/4x3/fi.svg
Executable file
5
img/flags/4x3/fi.svg
Executable file
@ -0,0 +1,5 @@
|
||||
<svg xmlns="http://www.w3.org/2000/svg" height="480" width="640" version="1">
|
||||
<path fill="#fff" d="M0 0h640v480H0z"/>
|
||||
<path fill="#003580" d="M0 174.545h640v130.909H0z"/>
|
||||
<path fill="#003580" d="M175.455 0h130.909v480H175.455z"/>
|
||||
</svg>
|
After (image error) Size: 243 B |
25
img/flags/4x3/in.svg
Executable file
25
img/flags/4x3/in.svg
Executable file
@ -0,0 +1,25 @@
|
||||
<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" height="480" width="640" version="1">
|
||||
<path fill="#f93" d="M0 0h640v160H0z"/>
|
||||
<path fill="#fff" d="M0 160h640v160H0z"/>
|
||||
<path fill="#128807" d="M0 320h640v160H0z"/>
|
||||
<g transform="matrix(3.2 0 0 3.2 320 240)">
|
||||
<circle r="20" fill="#008"/>
|
||||
<circle r="17.5" fill="#fff"/>
|
||||
<circle r="3.5" fill="#008"/>
|
||||
<g id="d">
|
||||
<g id="c">
|
||||
<g id="b">
|
||||
<g id="a" fill="#008">
|
||||
<circle r=".875" transform="rotate(7.5 -8.75 133.5)"/>
|
||||
<path d="M0 17.5L.6 7 0 2l-.6 5L0 17.5z"/>
|
||||
</g>
|
||||
<use height="100%" width="100%" xlink:href="#a" transform="rotate(15)"/>
|
||||
</g>
|
||||
<use height="100%" width="100%" xlink:href="#b" transform="rotate(30)"/>
|
||||
</g>
|
||||
<use height="100%" width="100%" xlink:href="#c" transform="rotate(60)"/>
|
||||
</g>
|
||||
<use height="100%" width="100%" xlink:href="#d" transform="rotate(120)"/>
|
||||
<use height="100%" width="100%" xlink:href="#d" transform="rotate(-120)"/>
|
||||
</g>
|
||||
</svg>
|
After (image error) Size: 1.0 KiB |
6
img/flags/4x3/pl.svg
Executable file
6
img/flags/4x3/pl.svg
Executable file
@ -0,0 +1,6 @@
|
||||
<svg xmlns="http://www.w3.org/2000/svg" height="480" width="640" version="1">
|
||||
<g fill-rule="evenodd">
|
||||
<path fill="#fff" d="M640 480H0V0h640z"/>
|
||||
<path fill="#dc143c" d="M640 480H0V240h640z"/>
|
||||
</g>
|
||||
</svg>
|
After (image error) Size: 215 B |
17
img/flags/4x3/za.svg
Executable file
17
img/flags/4x3/za.svg
Executable file
@ -0,0 +1,17 @@
|
||||
<svg xmlns="http://www.w3.org/2000/svg" height="480" width="640" version="1">
|
||||
<defs>
|
||||
<clipPath id="a">
|
||||
<path fill-opacity=".67" d="M-71.873-.012h682.68v512.01h-682.68z"/>
|
||||
</clipPath>
|
||||
</defs>
|
||||
<g clip-path="url(#a)" transform="translate(67.379 .011) scale(.93748)">
|
||||
<g fill-rule="evenodd" stroke-width="1pt">
|
||||
<path d="M-71.878 407.837V104.428l225.832 151.627-225.832 151.793z"/>
|
||||
<path d="M82.217 512.121l253.538-170.644h360.372v170.644H82.217z" fill="#00c"/>
|
||||
<path d="M65.917.062l630.19.013v170.672H335.735S69.295-1.626 65.917.062z" fill="red"/>
|
||||
<path d="M-71.878 64.075v40.329L153.954 256.03-71.878 407.823v40.327l284.44-192.12-284.44-191.955z" fill="#fc0"/>
|
||||
<path d="M-71.878 64.075V.062h94.891l301.313 203.88h371.778v104.261H324.326L23.013 512.053h-94.89V448.15l284.439-192.12-284.44-191.955z" fill="#093"/>
|
||||
<path d="M23.013.062h59.194l253.538 170.673h360.372v33.207H324.339L23.025.062zM23.013 512.121h59.194l253.538-170.644h360.372v-33.206H324.339L23.025 512.12z" fill="#fff"/>
|
||||
</g>
|
||||
</g>
|
||||
</svg>
|
After (image error) Size: 1.0 KiB |
68
index.html
68
index.html
@ -1924,14 +1924,80 @@
|
||||
<li><a href="https://www.youtube.com/watch?v=yzGzB-yYKcc">Edward Snowden on Passwords - YouTube</a></li>
|
||||
</ul>
|
||||
|
||||
<!-- Key disclosure law -->
|
||||
|
||||
<a class="anchor" name="kdl"></a>
|
||||
<div class="page-header">
|
||||
<h1><a href="#kdl" class="titleanchor"><span class="glyphicon glyphicon-link"></span></a> Key disclosure law</h1>
|
||||
</div>
|
||||
|
||||
<h3>Key disclosure law - Who is required to hand over the encryption keys to authorities?</h3>
|
||||
<p>Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant
|
||||
<p>Mandatory <a href="https://en.wikipedia.org/wiki/Key_disclosure_law">key disclosure laws</a> require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant
|
||||
is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.</p>
|
||||
|
||||
<p>Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an
|
||||
adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).</p>
|
||||
|
||||
<p><a href="https://en.wikipedia.org/wiki/Steganography">Steganography</a> involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an
|
||||
adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).</p>
|
||||
<br>
|
||||
|
||||
<!-- Chart of key disclosure law in some countries -->
|
||||
<div class="row">
|
||||
<div class="col-sm-4">
|
||||
<div class="panel panel-success">
|
||||
<div class="panel-heading">
|
||||
<h3 class="panel-title">Key disclosure laws don't apply</h3>
|
||||
</div>
|
||||
<div class="panel-body">
|
||||
1. <a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Czech_Republic">Czech Republic</a> <div class="pull-right"><span class="flag-icon flag-icon-cz"></span></div>
|
||||
<br /> 2. <a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Poland">Poland</a> <div class="pull-right"><span class="flag-icon flag-icon-pl"></span></div>
|
||||
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
<div class="col-sm-4">
|
||||
<div class="panel panel-warning">
|
||||
<div class="panel-heading">
|
||||
<h3 class="panel-title">Key disclosure laws may apply</h3>
|
||||
</div>
|
||||
<div class="panel-body">
|
||||
1. <a href="https://en.wikipedia.org/wiki/Key_disclosure_law#New_Zealand">New Zealand</a> (unclear) <div class="pull-right"><span class="flag-icon flag-icon-nz"></span></div>
|
||||
<br /> 2. <a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Sweden">Sweden</a> (proposed) <div class="pull-right"><span class="flag-icon flag-icon-se"></span></div>
|
||||
<br /> 3. <a href="https://en.wikipedia.org/wiki/Key_disclosure_law#The_Netherlands">The Netherlands</a> (people who know how to access a system may be ordered to share their knowledge, <strong>however, this doesn't apply to the suspect itself</strong>) <div class="pull-right"><span class="flag-icon flag-icon-nl"></span></div>
|
||||
<br /> 4. <a href="https://en.wikipedia.org/wiki/Key_disclosure_law#United_States">United States</a> (see related information) <div class="pull-right"><span class="flag-icon flag-icon-us"></span></div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
<div class="col-sm-4">
|
||||
<div class="panel panel-danger">
|
||||
<div class="panel-heading">
|
||||
<h3 class="panel-title">Key disclosure laws apply</h3>
|
||||
</div>
|
||||
<div class="panel-body">
|
||||
1. <a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Antigua_and_Barbuda">Antigua and Barbuda</a> <div class="pull-right"><span class="flag-icon flag-icon-ag"></span></div>
|
||||
<br /> 2. <a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Australia">Australia</a> <div class="pull-right"><span class="flag-icon flag-icon-au"></span></div>
|
||||
<br /> 3. <a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Belgium">Belgium</a> <div class="pull-right"><span class="flag-icon flag-icon-be"></span></div>
|
||||
<br /> 4. <a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Canada">Canada</a> <div class="pull-right"><span class="flag-icon flag-icon-ca"></span></div>
|
||||
<br /> 5. <a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Finland">Finland</a> <div class="pull-right"><span class="flag-icon flag-icon-fi"></span></div>
|
||||
<br /> 6. <a href="https://en.wikipedia.org/wiki/Key_disclosure_law#France">France</a> <div class="pull-right"><span class="flag-icon flag-icon-fr"></span></div>
|
||||
<br /> 7. <a href="https://en.wikipedia.org/wiki/Key_disclosure_law#India">India</a> <div class="pull-right"><span class="flag-icon flag-icon-in"></span></div>
|
||||
<br /> 8. <a href="https://en.wikipedia.org/wiki/Key_disclosure_law#South_Africa">South Africa</a> <div class="pull-right"><span class="flag-icon flag-icon-za"></span></div>
|
||||
<br /> 9. <a href="https://en.wikipedia.org/wiki/Key_disclosure_law#United_Kingdom">United Kingdom</a> <div class="pull-right"><span class="flag-icon flag-icon-gb"></span></div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
<!-- end Chart of key disclosure law in some countries -->
|
||||
|
||||
|
||||
<h3>Related Information</h3>
|
||||
<ul>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law">Wikipedia page on key disclosure law</a></li>
|
||||
<li><a href="https://law.stackexchange.com/questions/1523/can-a-us-citizen-be-required-to-provide-the-authentication-key-for-encrypted-dat">law.stackexchange.com question about key disclosure law in US</a></li>
|
||||
<li><a href="https://www.youtube.com/watch?v=Jt7D4AIfqlQ">DEFCON 20: Crypto and the Cops: the Law of Key Disclosure and Forced Decryption</a></li>
|
||||
</ul>
|
||||
|
||||
<a class="anchor" name="encrypt"></a>
|
||||
<div class="page-header">
|
||||
<h1><a href="#encrypt" class="titleanchor"><span class="glyphicon glyphicon-link"></span></a> File Encryption Software</h1>
|
||||
|
Loading…
Reference in New Issue
Block a user