mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2024-12-20 13:24:35 -05:00
Move fourteen eyes and KDL to separate file
This commit is contained in:
parent
14f57d9f4d
commit
dfc3803250
45
_includes/sections/fourteen-eyes.html
Normal file
45
_includes/sections/fourteen-eyes.html
Normal file
@ -0,0 +1,45 @@
|
||||
<h1 id="ukusa" class="anchor"><a href="#ukusa"><i class="fas fa-link anchor-icon"></i></a> Global Mass Surveillance - The Fourteen Eyes</h1>
|
||||
|
||||
<img src="assets/img/layout/UKUSA.png" class="img-fluid float-right" alt="UKUSA Agreement" style="margin-left:10px;">
|
||||
|
||||
<p>The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the <a href="https://www.giswatch.org/en/communications-surveillance/unmasking-five-eyes-global-surveillance-practices">Five Eyes</a>, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to <a href="https://www.pbs.org/newshour/world/an-exclusive-club-the-five-countries-that-dont-spy-on-each-other">not spy on each other</a> as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and <a href="https://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa">share intelligence</a> to <a href="https://www.theguardian.com/politics/2013/jun/10/nsa-offers-intelligence-british-counterparts-blunkett">avoid breaking domestic laws</a> that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes), however Five Eyes and third-party countries can and do spy on each other.</p>
|
||||
|
||||
<div class="row mb-3">
|
||||
{% include panel.html color="danger"
|
||||
title="Five Eyes"
|
||||
body='
|
||||
<ol class="card-ol">
|
||||
<li>Australia <div class="float-right"><span class="flag-icon flag-icon-au"></span></div></li>
|
||||
<li>Canada <div class="float-right"><span class="flag-icon flag-icon-ca"></span></div></li>
|
||||
<li>New Zealand <div class="float-right"><span class="flag-icon flag-icon-nz"></span></div></li>
|
||||
<li>United Kingdom <div class="float-right"><span class="flag-icon flag-icon-gb"></span></div></li>
|
||||
<li>United States of America <div class="float-right"><span class="flag-icon flag-icon-us"></span></div></li>
|
||||
</ol>
|
||||
'
|
||||
%}
|
||||
|
||||
{% include panel.html color="warning"
|
||||
title="Nine Eyes"
|
||||
body='
|
||||
<ol class="card-ol">
|
||||
<li>Denmark <div class="float-right"><span class="flag-icon flag-icon-dk"></span></div></li>
|
||||
<li>France <div class="float-right"><span class="flag-icon flag-icon-fr"></span></div></li>
|
||||
<li>Netherlands <div class="float-right"><span class="flag-icon flag-icon-nl"></span></div></li>
|
||||
<li>Norway <div class="float-right"><span class="flag-icon flag-icon-no"></span></div></li>
|
||||
</ol>
|
||||
'
|
||||
%}
|
||||
|
||||
{% include panel.html color="secondary"
|
||||
title="Fourteen Eyes"
|
||||
body='
|
||||
<ol class="card-ol">
|
||||
<li>Belgium <div class="float-right"><span class="flag-icon flag-icon-be"></span></div></li>
|
||||
<li>Germany <div class="float-right"><span class="flag-icon flag-icon-de"></span></div></li>
|
||||
<li>Italy <div class="float-right"><span class="flag-icon flag-icon-it"></span></div></li>
|
||||
<li>Spain <div class="float-right"><span class="flag-icon flag-icon-es"></span></div></li>
|
||||
<li>Sweden <div class="float-right"><span class="flag-icon flag-icon-se"></span></div></li>
|
||||
</ol>
|
||||
'
|
||||
%}
|
||||
</div>
|
84
_includes/sections/key-disclosure-law.html
Normal file
84
_includes/sections/key-disclosure-law.html
Normal file
@ -0,0 +1,84 @@
|
||||
<h1 id="kdl" class="anchor"><a href="#kdl"><i class="fas fa-link anchor-icon"></i></a> Key Disclosure Law</h1>
|
||||
|
||||
<h3>Who is required to hand over the encryption keys to authorities?</h3>
|
||||
|
||||
<p>Mandatory <a href="https://en.wikipedia.org/wiki/Key_disclosure_law">key disclosure laws</a> require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.</p> <p><a href="https://en.wikipedia.org/wiki/Steganography">Steganography</a> involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).</p>
|
||||
|
||||
<div class="row mb-2">
|
||||
|
||||
{% include panel.html color="danger"
|
||||
title="Key disclosure laws apply"
|
||||
body='
|
||||
<ol class="card-ol">
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Antigua_and_Barbuda">Antigua and Barbuda</a> <div class="float-right"><span class="flag-icon flag-icon-ag"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Australia">Australia</a> <div class="float-right"><span class="flag-icon flag-icon-au"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Canada">Canada</a> <div class="float-right"><span class="flag-icon flag-icon-ca"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#France">France</a> <div class="float-right"><span class="flag-icon flag-icon-fr"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#India">India</a> <div class="float-right"><span class="flag-icon flag-icon-in"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Ireland">Ireland</a> <div class="float-right"><span class="flag-icon flag-icon-ie"></span></div></li>
|
||||
<li><a href="https://edri.org/norway-introduces-forced-biometric-authentication/">Norway</a> <div class="float-right"><span class="flag-icon flag-icon-no"></span></div></li>
|
||||
<li><a href="https://www.bloomberg.com/news/articles/2018-03-20/telegram-loses-bid-to-stop-russia-from-getting-encryption-keys">Russia</a> <div class="float-right"><span class="flag-icon flag-icon-ru"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#South_Africa">South Africa</a> <div class="float-right"><span class="flag-icon flag-icon-za"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#United_Kingdom">United Kingdom</a> <div class="float-right"><span class="flag-icon flag-icon-gb"></span></div></li>
|
||||
</ol>
|
||||
'
|
||||
%}
|
||||
|
||||
{% include panel.html color="warning"
|
||||
title="Key disclosure laws may apply"
|
||||
body='
|
||||
<ol class="card-ol">
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Belgium">Belgium *</a> <div class="float-right"><span class="flag-icon flag-icon-be"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Finland">Finland *</a> <div class="float-right"><span class="flag-icon flag-icon-fi"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#New_Zealand">New Zealand</a> (unclear) <div class="float-right"><span class="flag-icon flag-icon-nz"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#The_Netherlands">The Netherlands *</a> <div class="float-right"><span class="flag-icon flag-icon-nl"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#United_States">United States</a> (see related information) <div class="float-right"><span class="flag-icon flag-icon-us"></span></div></li>
|
||||
</ol>
|
||||
'
|
||||
%}
|
||||
|
||||
{% include panel.html color="success"
|
||||
title="Key disclosure laws don't apply"
|
||||
body='
|
||||
<ol class="card-ol">
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Czech_Republic">Czech Republic</a> <div class="float-right"><span class="flag-icon flag-icon-cz"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Germany">Germany</a> <div class="float-right"><span class="flag-icon flag-icon-de"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Poland">Poland</a> <div class="float-right"><span class="flag-icon flag-icon-pl"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Sweden">Sweden</a> (proposed) <div class="float-right"><span class="flag-icon flag-icon-se"></span></div></li>
|
||||
</ol>
|
||||
'
|
||||
%}
|
||||
|
||||
</div>
|
||||
|
||||
<p> * (people who know how to access a system may be ordered to share their knowledge, <strong>however, this doesn't apply to the suspect itself or family members.</strong>)</p>
|
||||
|
||||
<h3>Related Information</h3>
|
||||
|
||||
<ul>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law">Wikipedia page on key disclosure law</a></li>
|
||||
<li><a href="https://law.stackexchange.com/questions/1523/can-a-us-citizen-be-required-to-provide-the-authentication-key-for-encrypted-dat">law.stackexchange.com question about key disclosure law in US</a></li>
|
||||
<li><a href="https://www.youtube.com/watch?v=Jt7D4AIfqlQ">DEFCON 20: Crypto and the Cops: the Law of Key Disclosure and Forced Decryption</a></li>
|
||||
</ul>
|
||||
|
||||
<h3 id="usa" class="anchor">Why is it not recommended to choose a US-based service?</h3>
|
||||
|
||||
<img src="assets/img/layout/USA.png" class="img-fluid float-right" alt="USA" style="margin-left:10px;">
|
||||
|
||||
<p>Services based in the United States are not recommended because of the country's surveillance programs, use of <a href="https://www.eff.org/issues/national-security-letters/faq">National Security Letters</a> (NSLs) and accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to <a href="https://www.schneier.com/blog/archives/2013/08/more_on_the_nsa.html">secretly force</a> companies to grant complete access to customer data and transform the service into a tool of mass surveillance.</p>
|
||||
|
||||
<p>An example of this is <a href="https://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order">Lavabit</a> – a discontinued secure email service created by Ladar Levison. The FBI <a href="https://motherboard.vice.com/en_us/article/nzz888/lavabit-founder-ladar-levison-discusses-his-federal-battle-for-privacy">requested</a> Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access
|
||||
communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.</p>
|
||||
|
||||
<p>Ultimately, Levison turned over the SSL keys and <a href="https://www.theguardian.com/commentisfree/2014/may/20/why-did-lavabit-shut-down-snowden-email">shut down</a> the service at the same time. The US government then <a href="https://www.cnbc.com/id/100962389">threatened Levison with arrest</a>, saying that shutting down the service was a violation of the court order.</p>
|
||||
|
||||
<h3>Related Information</h3>
|
||||
|
||||
<ul>
|
||||
<li><a href="https://www.bestvpn.com/the-ultimate-privacy-guide/#avoidus">Avoid all US and UK based services</a></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Surespot#History">Proof that warrant canaries work based on the surespot example.</a></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/UKUSA_Agreement">The United Kingdom – United States of America Agreement (UKUSA)</a></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order">Lavabit: Suspension and gag order</a></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law">Key disclosure law</a></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Portal:Mass_surveillance">Wikipedia Portal: Mass_surveillance</a></li>
|
||||
</ul>
|
139
index.html
139
index.html
@ -5,144 +5,11 @@ layout: default
|
||||
|
||||
{% include sections/header.html %}
|
||||
|
||||
<!-- Global Mass Surveillance - The Fourteen Eyes -->
|
||||
{% include sections/fourteen-eyes.html %}
|
||||
|
||||
<h1 id="ukusa" class="anchor"><a href="#ukusa"><i class="fas fa-link anchor-icon"></i></a> Global Mass Surveillance - The Fourteen Eyes</h1>
|
||||
{% include sections/key-disclosure-law.html %}
|
||||
|
||||
<img src="assets/img/layout/UKUSA.png" class="img-fluid float-right" alt="UKUSA Agreement" style="margin-left:10px;">
|
||||
|
||||
<p>The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the <a href="https://www.giswatch.org/en/communications-surveillance/unmasking-five-eyes-global-surveillance-practices">Five Eyes</a>,
|
||||
focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to <a href="https://www.pbs.org/newshour/world/an-exclusive-club-the-five-countries-that-dont-spy-on-each-other">not spy on each other</a> as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and <a href="https://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa">share intelligence</a> to <a href="https://www.theguardian.com/politics/2013/jun/10/nsa-offers-intelligence-british-counterparts-blunkett">avoid breaking domestic laws</a> that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes), however Five Eyes and third-party countries can and do
|
||||
spy on each other.</p>
|
||||
|
||||
<!-- Chart of Five Eyes, Nine Eyes, and Fourteen Eyes -->
|
||||
<div class="row mb-3">
|
||||
{% include panel.html color="danger"
|
||||
title="Five Eyes"
|
||||
body='
|
||||
<ol class="card-ol">
|
||||
<li>Australia <div class="float-right"><span class="flag-icon flag-icon-au"></span></div></li>
|
||||
<li>Canada <div class="float-right"><span class="flag-icon flag-icon-ca"></span></div></li>
|
||||
<li>New Zealand <div class="float-right"><span class="flag-icon flag-icon-nz"></span></div></li>
|
||||
<li>United Kingdom <div class="float-right"><span class="flag-icon flag-icon-gb"></span></div></li>
|
||||
<li>United States of America <div class="float-right"><span class="flag-icon flag-icon-us"></span></div></li>
|
||||
</ol>
|
||||
'
|
||||
%}
|
||||
|
||||
{% include panel.html color="warning"
|
||||
title="Nine Eyes"
|
||||
body='
|
||||
<ol class="card-ol">
|
||||
<li>Denmark <div class="float-right"><span class="flag-icon flag-icon-dk"></span></div></li>
|
||||
<li>France <div class="float-right"><span class="flag-icon flag-icon-fr"></span></div></li>
|
||||
<li>Netherlands <div class="float-right"><span class="flag-icon flag-icon-nl"></span></div></li>
|
||||
<li>Norway <div class="float-right"><span class="flag-icon flag-icon-no"></span></div></li>
|
||||
</ol>
|
||||
'
|
||||
%}
|
||||
|
||||
{% include panel.html color="secondary"
|
||||
title="Fourteen Eyes"
|
||||
body='
|
||||
<ol class="card-ol">
|
||||
<li>Belgium <div class="float-right"><span class="flag-icon flag-icon-be"></span></div></li>
|
||||
<li>Germany <div class="float-right"><span class="flag-icon flag-icon-de"></span></div></li>
|
||||
<li>Italy <div class="float-right"><span class="flag-icon flag-icon-it"></span></div></li>
|
||||
<li>Spain <div class="float-right"><span class="flag-icon flag-icon-es"></span></div></li>
|
||||
<li>Sweden <div class="float-right"><span class="flag-icon flag-icon-se"></span></div></li>
|
||||
</ol>
|
||||
'
|
||||
%}
|
||||
</div>
|
||||
<!-- end Chart of Five Eyes, Nine Eyes, and Fourteen Eyes -->
|
||||
|
||||
<!-- Key disclosure law -->
|
||||
<h1 id="kdl" class="anchor"><a href="#kdl"><i class="fas fa-link anchor-icon"></i></a> Key Disclosure Law</h1> <h3>Who is required to hand over the encryption keys to authorities?</h3>
|
||||
<p>Mandatory <a href="https://en.wikipedia.org/wiki/Key_disclosure_law">key disclosure laws</a> require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant
|
||||
is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.</p> <p><a href="https://en.wikipedia.org/wiki/Steganography">Steganography</a> involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an
|
||||
adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).</p>
|
||||
|
||||
<!-- Chart of key disclosure law in some countries -->
|
||||
<div class="row mb-2">
|
||||
|
||||
{% include panel.html color="danger"
|
||||
title="Key disclosure laws apply"
|
||||
body='
|
||||
<ol class="card-ol">
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Antigua_and_Barbuda">Antigua and Barbuda</a> <div class="float-right"><span class="flag-icon flag-icon-ag"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Australia">Australia</a> <div class="float-right"><span class="flag-icon flag-icon-au"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Canada">Canada</a> <div class="float-right"><span class="flag-icon flag-icon-ca"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#France">France</a> <div class="float-right"><span class="flag-icon flag-icon-fr"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#India">India</a> <div class="float-right"><span class="flag-icon flag-icon-in"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Ireland">Ireland</a> <div class="float-right"><span class="flag-icon flag-icon-ie"></span></div></li>
|
||||
<li><a href="https://edri.org/norway-introduces-forced-biometric-authentication/">Norway</a> <div class="float-right"><span class="flag-icon flag-icon-no"></span></div></li>
|
||||
<li><a href="https://www.bloomberg.com/news/articles/2018-03-20/telegram-loses-bid-to-stop-russia-from-getting-encryption-keys">Russia</a> <div class="float-right"><span class="flag-icon flag-icon-ru"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#South_Africa">South Africa</a> <div class="float-right"><span class="flag-icon flag-icon-za"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#United_Kingdom">United Kingdom</a> <div class="float-right"><span class="flag-icon flag-icon-gb"></span></div></li>
|
||||
</ol>
|
||||
'
|
||||
%}
|
||||
|
||||
{% include panel.html color="warning"
|
||||
title="Key disclosure laws may apply"
|
||||
body='
|
||||
<ol class="card-ol">
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Belgium">Belgium *</a> <div class="float-right"><span class="flag-icon flag-icon-be"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Finland">Finland *</a> <div class="float-right"><span class="flag-icon flag-icon-fi"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#New_Zealand">New Zealand</a> (unclear) <div class="float-right"><span class="flag-icon flag-icon-nz"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#The_Netherlands">The Netherlands *</a> <div class="float-right"><span class="flag-icon flag-icon-nl"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#United_States">United States</a> (see related information) <div class="float-right"><span class="flag-icon flag-icon-us"></span></div></li>
|
||||
</ol>
|
||||
'
|
||||
%}
|
||||
|
||||
{% include panel.html color="success"
|
||||
title="Key disclosure laws don't apply"
|
||||
body='
|
||||
<ol class="card-ol">
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Czech_Republic">Czech Republic</a> <div class="float-right"><span class="flag-icon flag-icon-cz"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Germany">Germany</a> <div class="float-right"><span class="flag-icon flag-icon-de"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Poland">Poland</a> <div class="float-right"><span class="flag-icon flag-icon-pl"></span></div></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law#Sweden">Sweden</a> (proposed) <div class="float-right"><span class="flag-icon flag-icon-se"></span></div></li>
|
||||
</ol>
|
||||
'
|
||||
%}
|
||||
|
||||
</div>
|
||||
|
||||
<p> * (people who know how to access a system may be ordered to share their knowledge, <strong>however, this doesn't apply to the suspect itself or family members.</strong>)</p>
|
||||
|
||||
<h3>Related Information</h3>
|
||||
<ul>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law">Wikipedia page on key disclosure law</a></li>
|
||||
<li><a href="https://law.stackexchange.com/questions/1523/can-a-us-citizen-be-required-to-provide-the-authentication-key-for-encrypted-dat">law.stackexchange.com question about key disclosure law in US</a></li>
|
||||
<li><a href="https://www.youtube.com/watch?v=Jt7D4AIfqlQ">DEFCON 20: Crypto and the Cops: the Law of Key Disclosure and Forced Decryption</a></li>
|
||||
</ul>
|
||||
|
||||
<!-- end Chart of key disclosure law in some countries -->
|
||||
|
||||
<h3 id="usa" class="anchor">Why is it not recommended to choose a US-based service?</h3>
|
||||
|
||||
<img src="assets/img/layout/USA.png" class="img-fluid float-right" alt="USA" style="margin-left:10px;">
|
||||
|
||||
<p>Services based in the United States are not recommended because of the country's surveillance programs, use of <a href="https://www.eff.org/issues/national-security-letters/faq">National Security Letters</a> (NSLs) and accompanying gag orders, which
|
||||
forbid the recipient from talking about the request. This combination allows the government to <a href="https://www.schneier.com/blog/archives/2013/08/more_on_the_nsa.html">secretly force</a> companies to grant complete access to customer data and
|
||||
transform the service into a tool of mass surveillance.</p>
|
||||
|
||||
<p>An example of this is <a href="https://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order">Lavabit</a> – a discontinued secure email service created by Ladar Levison. The FBI <a href="https://motherboard.vice.com/en_us/article/nzz888/lavabit-founder-ladar-levison-discusses-his-federal-battle-for-privacy">requested</a> Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access
|
||||
communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.</p>
|
||||
|
||||
<p>Ultimately, Levison turned over the SSL keys and <a href="https://www.theguardian.com/commentisfree/2014/may/20/why-did-lavabit-shut-down-snowden-email">shut down</a> the service at the same time. The US government then <a href="https://www.cnbc.com/id/100962389">threatened Levison with arrest</a>,
|
||||
saying that shutting down the service was a violation of the court order.</p> <h3>Related Information</h3>
|
||||
<ul>
|
||||
<li><a href="https://www.bestvpn.com/the-ultimate-privacy-guide/#avoidus">Avoid all US and UK based services</a></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Surespot#History">Proof that warrant canaries work based on the surespot example.</a></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/UKUSA_Agreement">The United Kingdom – United States of America Agreement (UKUSA)</a></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Lavabit#Suspension_and_gag_order">Lavabit: Suspension and gag order</a></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Key_disclosure_law">Key disclosure law</a></li>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Portal:Mass_surveillance">Wikipedia Portal: Mass_surveillance</a></li>
|
||||
</ul> <h1 id="vpn" class="anchor"><a href="#vpn"><i class="fas fa-link anchor-icon"></i></a> VPN providers with extra layers of privacy</h1>
|
||||
<h1 id="vpn" class="anchor"><a href="#vpn"><i class="fas fa-link anchor-icon"></i></a> VPN providers with extra layers of privacy</h1>
|
||||
<div class="alert alert-success" role="alert">
|
||||
<strong>All providers listed here are outside the US, use encryption, accept Bitcoin, support OpenVPN and have a no logging policy.</strong>
|
||||
</div>
|
||||
|
Loading…
Reference in New Issue
Block a user