mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2024-12-20 05:14:35 -05:00
Moved "Key disclosure law" to "Passwords"
This commit is contained in:
parent
f1fa8ab30f
commit
cc6580c3b3
17
index.html
17
index.html
@ -292,14 +292,6 @@
|
|||||||
<p>Ultimately, Levison turned over the SSL keys and <a href="http://www.theguardian.com/commentisfree/2014/may/20/why-did-lavabit-shut-down-snowden-email">shut down</a> the service at the same time. The US government then <a href="http://www.cnbc.com/id/100962389">threatened Levison with arrest</a>,
|
<p>Ultimately, Levison turned over the SSL keys and <a href="http://www.theguardian.com/commentisfree/2014/may/20/why-did-lavabit-shut-down-snowden-email">shut down</a> the service at the same time. The US government then <a href="http://www.cnbc.com/id/100962389">threatened Levison with arrest</a>,
|
||||||
saying that shutting down the service was a violation of the court order.</p>
|
saying that shutting down the service was a violation of the court order.</p>
|
||||||
|
|
||||||
<a class="anchor" name="kdl"></a>
|
|
||||||
<h3>Key disclosure law - Who is required to hand over the encryption keys to authorities?</h3>
|
|
||||||
<p>Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant
|
|
||||||
is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.</p>
|
|
||||||
|
|
||||||
<p>Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an
|
|
||||||
adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).</p>
|
|
||||||
|
|
||||||
|
|
||||||
<h3>Related Information</h3>
|
<h3>Related Information</h3>
|
||||||
<ul>
|
<ul>
|
||||||
@ -1895,6 +1887,15 @@
|
|||||||
<ul>
|
<ul>
|
||||||
<li><a href="https://www.youtube.com/watch?v=yzGzB-yYKcc">Edward Snowden on Passwords - YouTube</a></li>
|
<li><a href="https://www.youtube.com/watch?v=yzGzB-yYKcc">Edward Snowden on Passwords - YouTube</a></li>
|
||||||
</ul>
|
</ul>
|
||||||
|
|
||||||
|
<a class="anchor" name="kdl"></a>
|
||||||
|
<h3>Key disclosure law - Who is required to hand over the encryption keys to authorities?</h3>
|
||||||
|
<p>Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant
|
||||||
|
is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.</p>
|
||||||
|
|
||||||
|
<p>Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an
|
||||||
|
adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).</p>
|
||||||
|
|
||||||
<a class="anchor" name="encrypt"></a>
|
<a class="anchor" name="encrypt"></a>
|
||||||
<div class="page-header">
|
<div class="page-header">
|
||||||
<h1><a href="#encrypt" class="titleanchor"><span class="glyphicon glyphicon-link"></span></a> File Encryption Software</h1>
|
<h1><a href="#encrypt" class="titleanchor"><span class="glyphicon glyphicon-link"></span></a> File Encryption Software</h1>
|
||||||
|
Loading…
Reference in New Issue
Block a user