DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Lavabit
Lavabit
Digital Security for Activists
Legal Responses and Countermeasures to National Security Letters
FBI–Apple Encryption Dispute - Wikipedia, the Free Encyclopedia 6/2/16, 6:59 AM
US Technology Companies and State Surveillance in the Post-Snowden Context: Between Cooperation and Resistance Félix Tréguer
Post-Snowden Cryptography
The Cipher Mail Transport Protocol (CMTP)
New Threat Models for Cryptography 3 August 2016 Bart Preneel
Summer 2016 E-Newsletter
Edward Snowden, Criminal Or Patriot: Media Coverage of National Security Agency Document Leaks Joyce M
230-472 NSA WP.Indd
Rubinstein and Van Hoboken
Download PDF Case Study
Collect It All: National Security, Big Data and Governance
EXHIBIT 1 UNITED STATES DISTRICT COURT for Tile EASTERN DISTRICT of VIRGINIA
BULLETPROOF SSL and TLS Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications
Warrant Canaries As Tools for Transparency in the Wake of the Snowden Disclosures
In the United States Court of Appeals for the Fourth Circuit
Challenges with End-To-End Email Encryption
Top View
European Responses to the Snowden Revelations: a Discussion Paper
Surveillance Costs: the NSA’S Impact on the Economy, Internet Freedom & Cybersecurity
Breaking Iphones Under Calea and the All Writs Act: Why the Government Was (Mostly) Right
If You Want Secure E-Mail, Don't Write It Or Send It | MIT Technology Review
The New Writs of Assistance
NSA Row Sparks Rush for Encrypted Email 18 May 2014, by Rob Lever
Warrant Canaries and Disclosure by Design: the Real Threat to National Security Letter Gag Orders Rebecca Wexler Introduction
Notes Secrecy, Standing, and Executive Order 12,333
Pseudo an Anonymous Email Relay Server
Measuring the Security Harm of TLS Crypto Shortcuts
Akun Publik Dalam Realitas Virtual Studi Film Citizenfour Karya Laura Poitras
Amicus Brief