-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathsitemap.xml
More file actions
1 lines (1 loc) · 25.4 KB
/
sitemap.xml
File metadata and controls
1 lines (1 loc) · 25.4 KB
1
<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>/search/</loc><priority>0</priority></url><url><loc>/entries/five-eyes-security-alliance-calls-for-access-to-en-c3db0c94/</loc></url><url><loc>/tags/1940s-1980s/</loc></url><url><loc>/tags/1970s/</loc></url><url><loc>/tags/1980s/</loc></url><url><loc>/tags/1990s/</loc></url><url><loc>/tags/2000s/</loc></url><url><loc>/tags/2010/</loc></url><url><loc>/tags/2010s/</loc></url><url><loc>/tags/2019/</loc></url><url><loc>/tags/2020s/</loc></url><url><loc>/tags/9/11/</loc></url><url><loc>/tags/%5C%5C#aabill/</loc></url><url><loc>/tags/%5C%5C#defendencryption/</loc></url><url><loc>/tags/%5C%5C#secureaustralia/</loc></url><url><loc>/entries/a-cryptography-policy-framework-for-electronic-com-7c268883/</loc></url><url><loc>/entries/a-flawed-encryption-policy-218380c7/</loc></url><url><loc>/entries/a-judicial-framework-for-evaluating-network-invest-f6ee8147/</loc></url><url><loc>/entries/a-method-for-obtaining-digital-signatures-and-publ-eb215250/</loc></url><url><loc>/entries/a-roadmap-for-exceptional-access-research-9b867071/</loc></url><url><loc>/entries/a-stumbling-us-encryption-policy-872ec273/</loc></url><url><loc>/tags/academic/</loc></url><url><loc>/tags/access-now/</loc></url><url><loc>/tags/aclu/</loc></url><url><loc>/tags/aes/</loc></url><url><loc>/tags/amendment-i/</loc></url><url><loc>/tags/amendment-iv/</loc></url><url><loc>/tags/amendment-v/</loc></url><url><loc>/tags/amendment-v-/-self-incrimination/</loc></url><url><loc>/entries/american-cryptology-during-the-cold-war-1945-1989-4c53fc9a/</loc></url><url><loc>/entries/anonymity-and-encryption-comments-submitted-to-the-679d1ec2/</loc></url><url><loc>/entries/another-faulty-encryption-policy-092ca4e3/</loc></url><url><loc>/tags/apple/</loc></url><url><loc>/entries/apple-will-no-longer-unlock-most-iphones-ipads-for-41182863/</loc></url><url><loc>/tags/article-19/</loc></url><url><loc>/entries/as-encryption-spreads-u-s-grapples-with-clash-betw-c9f820a1/</loc></url><url><loc>/tags/assistance-and-access-bill/</loc></url><url><loc>/tags/attorney-general-william-p.-barr/</loc></url><url><loc>/entries/attorney-general-william-p-barr-delivers-keynote-a-55f805a8/</loc></url><url><loc>/tags/australia/</loc></url><url><loc>/entries/australian-government-passes-contentious-encryptio-6d9e9517/</loc></url><url><loc>/tags/backdoors/</loc></url><url><loc>/tags/backdoors-feasibility/</loc></url><url><loc>/entries/bernstein-v-us-dept-of-state-922-f-supp-1426-n-d-c-bfdb8533/</loc></url><url><loc>/entries/bernstein-v-us-dept-of-state-945-f-supp-1279-n-d-c-1b4aef36/</loc></url><url><loc>/entries/bernstein-v-us-dept-of-state-974-f-supp-1288-n-d-c-60eae534/</loc></url><url><loc>/entries/best-practices-for-encryption-in-p25-public-safety-c4ce136f/</loc></url><url><loc>/entries/beyond-secrets-the-consumer-stake-in-the-encryptio-5a9a086a/</loc></url><url><loc>/entries/big-reputation-what-the-australian-parliament-can-642ff3e3/</loc></url><url><loc>/tags/bill/</loc></url><url><loc>/tags/biometric-encryption/</loc></url><url><loc>/entries/breaking-fbi-admits-its-claims-of-going-dark-were-b620adf1/</loc></url><url><loc>/entries/brief-of-amici-curiae-access-now-and-wickr-foundat-c51e7fcb/</loc></url><url><loc>/tags/britain/</loc></url><url><loc>/entries/bureau-of-export-administration-annual-report-1998-b53ffd24/</loc></url><url><loc>/tags/ca/</loc></url><url><loc>/tags/calea/</loc></url><url><loc>/tags/calea-ii/</loc></url><url><loc>/entries/calea-ii-risks-of-wiretap-modifications-to-endpoin-33317ce9/</loc></url><url><loc>/tags/canada/</loc></url><url><loc>/entries/canada-s-quiet-weakening-of-communications-encrypt-c6650006/</loc></url><url><loc>/entries/canadas-new-and-irresponsible-encryption-policy-ho-c1d6da72/</loc></url><url><loc>/tags/case-law/</loc></url><url><loc>/tags/censorship/</loc></url><url><loc>/tags/center-for-democracy-and-technology/</loc></url><url><loc>/entries/ceos-and-encryption-the-questions-you-need-to-ask-f054d98f/</loc></url><url><loc>/tags/child-exploitation/</loc></url><url><loc>/tags/chn/</loc></url><url><loc>/tags/cia/</loc></url><url><loc>/tags/citizen-lab/</loc></url><url><loc>/tags/client-side-scanning/</loc></url><url><loc>/tags/clinton/</loc></url><url><loc>/entries/clinton-administration-announces-new-cybersecurity-6826eb57/</loc></url><url><loc>/entries/clinton-administration-encryption-policy-statement-cdde72d2/</loc></url><url><loc>/entries/clinton-removes-export-limits-on-encryption-techno-9f78e038/</loc></url><url><loc>/tags/clipper-chip/</loc></url><url><loc>/tags/cloud-act/</loc></url><url><loc>/tags/cnet/</loc></url><url><loc>/entries/coalition-letter-of-law-professors-to-hon-thomas-j-f69d54a6/</loc></url><url><loc>/entries/coalition-letter-to-members-of-australia-s-parliam-65b62b0b/</loc></url><url><loc>/entries/coalition-letter-to-ministers-responsible-for-the-c239cb16/</loc></url><url><loc>/entries/coalition-letter-to-nist-7f0953e7/</loc></url><url><loc>/entries/coalition-letter-to-president-obama-04-11-2016-4b5abd91/</loc></url><url><loc>/entries/coalition-letter-to-president-obama-10-27-2016-20313e86/</loc></url><url><loc>/entries/coalition-letter-to-president-obama-5-19-2015-ad5d54f2/</loc></url><url><loc>/tags/cold-war/</loc></url><url><loc>/entries/complete-acm-columns-collection-9f722ce3/</loc></url><url><loc>/tags/compliance-with-court-orders-act/</loc></url><url><loc>/entries/compliance-with-court-orders-act-of-2016-draft-517e2d28/</loc></url><url><loc>/entries/congress-mulls-stiff-crypto-laws-50dadb61/</loc></url><url><loc>/entries/congress-not-the-attorney-general-should-decide-th-61477972/</loc></url><url><loc>/entries/considerations-for-encryption-in-public-safety-rad-7298abf0/</loc></url><url><loc>/tags/content-detection/</loc></url><url><loc>/entries/content-oblivious-trust-and-safety-techniques-resu-bd3a0a7e/</loc></url><url><loc>/tags/corporate/</loc></url><url><loc>/entries/cracking-des-secrets-of-encryption-research-wireta-a4fb65fa/</loc></url><url><loc>/tags/criminal-law/</loc></url><url><loc>/tags/crypto-summit/</loc></url><url><loc>/entries/crypto-summit-1-0-efc034c8/</loc></url><url><loc>/entries/crypto-summit-2-0-outcomes-report-track-1-f3204001/</loc></url><url><loc>/entries/crypto-summit-2-0-outcomes-report-track-2-d37df90e/</loc></url><url><loc>/tags/crypto-wars/</loc></url><url><loc>/tags/crypto-wars-i/</loc></url><url><loc>/tags/crypto-wars-ii/</loc></url><url><loc>/entries/cryptography-and-liberty-2000-an-international-sur-3c4921c1/</loc></url><url><loc>/entries/cryptography-s-role-in-securing-the-information-so-07be5799/</loc></url><url><loc>/tags/cyber-attacks/</loc></url><url><loc>/tags/cyber-command/</loc></url><url><loc>/tags/cybersecurity/</loc></url><url><loc>/entries/daniel-j-bernstein-v-u-s-department-of-state-11e93c28/</loc></url><url><loc>/tags/data-and-computer-security/</loc></url><url><loc>/tags/data-breach-prevention-and-compensation-act-of-2019/</loc></url><url><loc>/tags/data-breaches/</loc></url><url><loc>/tags/data-protection/</loc></url><url><loc>/tags/data-storage/</loc></url><url><loc>/entries/debate-law-enforcement-vs-smartphone-encryption-d2d753c0/</loc></url><url><loc>/entries/decryption-originalism-the-lessons-of-burr-a1d594eb/</loc></url><url><loc>/entries/deep-dive-into-crypto-exceptional-access-mandates-4ed0e169/</loc></url><url><loc>/entries/demystifying-u-s-encryption-export-controls-22620d22/</loc></url><url><loc>/tags/department-of-homeland-security/</loc></url><url><loc>/tags/department-of-justice/</loc></url><url><loc>/entries/deputy-attorney-general-rod-j-rosenstein-delivers-a3df0cc4/</loc></url><url><loc>/tags/diffe-hellman-key-exchange/</loc></url><url><loc>/tags/digital-security/</loc></url><url><loc>/entries/disputes-on-electronic-message-encryption-take-on-6dfb72b1/</loc></url><url><loc>/entries/doj-plans-to-strike-against-encryption-while-the-t-bdfdad83/</loc></url><url><loc>/tags/domestic-concerns/</loc></url><url><loc>/entries/dont-panic-making-progress-on-the-going-dark-debat-092ae356/</loc></url><url><loc>/entries/doomed-to-repeat-history-lessons-from-the-crypto-w-d9384864/</loc></url><url><loc>/tags/dual-use-technology/</loc></url><url><loc>/entries/dutch-government-backs-uncrackable-encryption-8169af3a/</loc></url><url><loc>/tags/e-commerce/</loc></url><url><loc>/tags/economic-impact/</loc></url><url><loc>/tags/eff/</loc></url><url><loc>/entries/efforts-to-ban-encryption-in-the-1990s-8cb36f84/</loc></url><url><loc>/tags/emergency-communications/</loc></url><url><loc>/tags/encrypt-act-of-2019/</loc></url><url><loc>/entries/encryption-101-a-non-technical-guide-to-protecting-a4994675/</loc></url><url><loc>/entries/encryption-and-globalization-9e3100e9/</loc></url><url><loc>/entries/encryption-and-the-first-amendment-333ee479/</loc></url><url><loc>/entries/encryption-and-the-press-clause-46f389c7/</loc></url><url><loc>/entries/encryption-backdoors-decrease-trust-in-the-interne-0da4e63b/</loc></url><url><loc>/tags/encryption-ban/</loc></url><url><loc>/entries/encryption-control-unconstitutional-b86acf50/</loc></url><url><loc>/entries/encryption-export-controls-1714ec24/</loc></url><url><loc>/entries/encryption-in-the-u-s-crypto-colloquium-outcomes-r-9fd86b2f/</loc></url><url><loc>/entries/encryption-is-a-human-rights-issue-your-privacy-an-62451d82/</loc></url><url><loc>/entries/encryption-policy-a-crowd-pleaser-eae182e4/</loc></url><url><loc>/entries/encryption-policy-for-the-21st-century-a-future-wi-516bac02/</loc></url><url><loc>/entries/encryption-policy-a-uk-perspective-f43cbc0b/</loc></url><url><loc>/entries/encryption-restrictions-54a58dd3/</loc></url><url><loc>/tags/encryption-standards/</loc></url><url><loc>/entries/encryption-under-fire-discussion-on-threats-to-pri-6bbe4ed7/</loc></url><url><loc>/entries/encryption-biometrics-and-the-status-quo-ante-6819368c/</loc></url><url><loc>/entries/encryption-trust-and-the-online-economy-an-assessm-b5968feb/</loc></url><url><loc>/entries/encryption-a-21st-century-national-security-dilemm-bc971f67/</loc></url><url><loc>/tags/end-to-end-encryption/</loc></url><url><loc>/entries/</loc></url><url><loc>/entries/entropy-and-random-numbers-d61c00fb/</loc></url><url><loc>/tags/epic/</loc></url><url><loc>/tags/eu/</loc></url><url><loc>/tags/europe/</loc></url><url><loc>/entries/ex-mi5-chief-warns-against-crackdown-on-encrypted-9cfea775/</loc></url><url><loc>/entries/ex-nsa-chief-thinks-the-government-is-dead-wrong-i-8b5c5590/</loc></url><url><loc>/tags/exceptional-access/</loc></url><url><loc>/tags/executive-order/</loc></url><url><loc>/entries/executive-order-13026-administration-of-export-con-edfd5315/</loc></url><url><loc>/entries/exploring-encryption-and-potential-mechanisms-for-26c5994f/</loc></url><url><loc>/tags/export-controls/</loc></url><url><loc>/tags/facebook/</loc></url><url><loc>/entries/faq-on-the-fcc-calea-expansion-cb61ed55/</loc></url><url><loc>/tags/fbi/</loc></url><url><loc>/entries/fbi-blasts-apple-google-for-locking-police-out-of-79e02027/</loc></url><url><loc>/entries/fbi-pressuring-google-facebook-to-allow-back-doors-71473338/</loc></url><url><loc>/entries/federal-bureau-of-investigation-fy-2010-budget-req-f44e795f/</loc></url><url><loc>/entries/federal-information-processing-standards-fips-197-d91011f8/</loc></url><url><loc>/tags/federal-trade-commission/</loc></url><url><loc>/tags/federalism/</loc></url><url><loc>/entries/feds-put-heat-on-web-firms-for-master-encryption-k-c6363e83/</loc></url><url><loc>/entries/first-and-fifth-amendment-challenges-to-export-con-41c9888c/</loc></url><url><loc>/tags/five-eyes/</loc></url><url><loc>/tags/foreign/</loc></url><url><loc>/tags/foreign-concerns/</loc></url><url><loc>/entries/former-gchq-boss-backs-end-to-end-encryption-8c807a3b/</loc></url><url><loc>/entries/former-national-security-officials-suddenly-see-th-d46b3725/</loc></url><url><loc>/entries/from-clipper-chip-to-smartphones-unlocking-the-enc-cbe23268/</loc></url><url><loc>/tags/g20/</loc></url><url><loc>/entries/gao-report-on-communications-privacy-9342867b/</loc></url><url><loc>/tags/gchq/</loc></url><url><loc>/tags/global/</loc></url><url><loc>/tags/going-dark/</loc></url><url><loc>/entries/going-dark-are-technology-privacy-and-public-safet-b115d093/</loc></url><url><loc>/entries/going-dark-lawful-electronic-surveillance-in-the-f-5165cb74/</loc></url><url><loc>/tags/golden-key/</loc></url><url><loc>/tags/government-access/</loc></url><url><loc>/tags/government-policy/</loc></url><url><loc>/tags/graphic/</loc></url><url><loc>/tags/gsm/</loc></url><url><loc>/entries/guidelines-for-encryption-in-land-mobile-radio-sys-b0ed6104/</loc></url><url><loc>/entries/h-r-2545-data-breach-prevention-and-compensation-a-2d6fd580/</loc></url><url><loc>/entries/h-r-4170-ensuring-national-constitutional-rights-f-808a9c8d/</loc></url><url><loc>/entries/h-r-4943-clarifying-lawful-overseas-use-of-data-ac-f1395da4/</loc></url><url><loc>/entries/h-r-4978-online-privacy-act-of-2019-7c0e40e7/</loc></url><url><loc>/tags/hacking/</loc></url><url><loc>/entries/hacking-journalism-04dbfbc9/</loc></url><url><loc>/entries/half-the-web-is-now-encrypted-that-makes-everyone-2100a1e7/</loc></url><url><loc>/tags/healthcare/</loc></url><url><loc>/tags/hearing/</loc></url><url><loc>/entries/holder-urges-tech-companies-to-leave-device-backdo-1737189d/</loc></url><url><loc>/entries/how-secure-is-aes-against-brute-force-attacks-a76070ac/</loc></url><url><loc>/entries/how-unvalidated-encryption-threatens-patient-data-f2fafa62/</loc></url><url><loc>/tags/https/</loc></url><url><loc>/entries/https-everywhere-for-government-5c0a30ab/</loc></url><url><loc>/tags/human-rights/</loc></url><url><loc>/entries/human-rights-and-encryption-380229a2/</loc></url><url><loc>/tags/human-rights-watch/</loc></url><url><loc>/entries/ic-on-the-record-video-odni-general-counsel-robert-f1f2db82/</loc></url><url><loc>/entries/in-re-application-for-an-order-pursuant-to-18-u-s-f42df79e/</loc></url><url><loc>/entries/information-security-and-privacy-in-network-enviro-73af6c6d/</loc></url><url><loc>/tags/intelligence/</loc></url><url><loc>/tags/interactive/</loc></url><url><loc>/tags/international/</loc></url><url><loc>/tags/international-/-national-security/</loc></url><url><loc>/entries/international-human-rights-organizations-express-p-07872304/</loc></url><url><loc>/tags/internet-/-world-wide-web/</loc></url><url><loc>/tags/investment/</loc></url><url><loc>/tags/iphone/</loc></url><url><loc>/entries/issue-brief-a-backdoor-to-encryption-for-governmen-feec9f35/</loc></url><url><loc>/entries/it-came-from-planet-clipper-the-battle-over-crypto-351f4ef6/</loc></url><url><loc>/tags/james-comey/</loc></url><url><loc>/entries/james-comey-f-b-i-director-hints-at-action-as-cell-f7538b3a/</loc></url><url><loc>/tags/journalism/</loc></url><url><loc>/tags/judicial-process-/-court-cases-/-court-decisions/</loc></url><url><loc>/entries/keeping-secrets-73be089b/</loc></url><url><loc>/tags/key-escrow/</loc></url><url><loc>/entries/key-escrow-880e03ca/</loc></url><url><loc>/entries/key-escrow-from-a-safe-distance-looking-back-at-th-acc94260/</loc></url><url><loc>/tags/key-recovery/</loc></url><url><loc>/tags/keys/</loc></url><url><loc>/entries/keys-under-doormats-mandating-insecurity-by-requir-5df4f072/</loc></url><url><loc>/tags/law-enforcement/</loc></url><url><loc>/tags/lawful-access/</loc></url><url><loc>/entries/lawful-access-consultation-document-a8b104aa/</loc></url><url><loc>/tags/map/</loc></url><url><loc>/entries/mccauls-crypto-commission-first-do-no-harm-478ce042/</loc></url><url><loc>/entries/memorandum-for-the-heads-of-executive-departments-beed0dbf/</loc></url><url><loc>/tags/mobile/</loc></url><url><loc>/entries/mozilla-cybersecurity-delphi-1-0-towards-a-user-ce-3db1081f/</loc></url><url><loc>/tags/national-security/</loc></url><url><loc>/tags/national-security-and-personal-data-protection-act-of-2019/</loc></url><url><loc>/tags/ned/</loc></url><url><loc>/entries/new-directions-in-cryptography-0e85af23/</loc></url><url><loc>/entries/new-perspectives-on-the-future-of-encryption-29240979/</loc></url><url><loc>/entries/newest-androids-will-join-iphones-in-offering-defa-48399d14/</loc></url><url><loc>/tags/nist/</loc></url><url><loc>/tags/nit/</loc></url><url><loc>/tags/nsa/</loc></url><url><loc>/entries/nsa-isnt-the-going-dark-solution-part-i-richard-cl-976df318/</loc></url><url><loc>/entries/nsa-isnt-the-going-dark-solution-part-ii-theres-no-9863433f/</loc></url><url><loc>/tags/nz/</loc></url><url><loc>/tags/obama/</loc></url><url><loc>/tags/oecd/</loc></url><url><loc>/entries/oecd-guidelines-for-cryptography-policy-3bce3cbf/</loc></url><url><loc>/tags/office-of-cybersecurity/</loc></url><url><loc>/entries/old-technopanic-in-new-ibottles-50857d54/</loc></url><url><loc>/tags/online-abuse/</loc></url><url><loc>/tags/online-privacy-act-of-2019/</loc></url><url><loc>/tags/online-safety/</loc></url><url><loc>/entries/open-letter-to-mark-zuckerberg-facebook-s-privacy-ac79aa39/</loc></url><url><loc>/entries/open-letter-to-mark-zuckerberg-facebook-s-end-to-e-81bc1514/</loc></url><url><loc>/tags/organisation-for-economic-cooperation-and-development/</loc></url><url><loc>/tags/oti/</loc></url><url><loc>/entries/oti-policy-director-kevin-bankston-offers-ten-reas-349f9fa5/</loc></url><url><loc>/entries/outside-looking-in-approaches-to-content-moderatio-3fcad0c7/</loc></url><url><loc>/entries/paper-on-codes-is-sent-despite-u-s-objections-be957f04/</loc></url><url><loc>/tags/passcode/</loc></url><url><loc>/tags/personal-privacy/</loc></url><url><loc>/tags/policy/</loc></url><url><loc>/entries/prepared-statement-by-senator-chuck-grassley-heari-63a8fa1c/</loc></url><url><loc>/entries/press-release-the-search-for-quantum-resistant-cry-90e3d809/</loc></url><url><loc>/tags/primer/</loc></url><url><loc>/tags/privacy-/-data-protection/</loc></url><url><loc>/tags/privacy-rights/</loc></url><url><loc>/tags/probable-cause/</loc></url><url><loc>/entries/promoting-public-saftey-privacy-and-the-rule-of-la-062fe8ee/</loc></url><url><loc>/tags/protecting-personal-health-data-act/</loc></url><url><loc>/entries/protecting-the-fourth-amendment-in-the-information-5c78fc7e/</loc></url><url><loc>/tags/public-key-encryption/</loc></url><url><loc>/tags/public-safety/</loc></url><url><loc>/tags/public-safety-radios/</loc></url><url><loc>/tags/quantum/</loc></url><url><loc>/tags/quantum-resistant/</loc></url><url><loc>/tags/quantum-safe/</loc></url><url><loc>/entries/questions-for-apple-b3e6b97c/</loc></url><url><loc>/entries/recommendation-of-the-council-concerning-guideline-8821d5fd/</loc></url><url><loc>/tags/regulated-encryption/</loc></url><url><loc>/entries/report-of-the-attorney-general-s-cyber-digital-tas-7bcf0590/</loc></url><url><loc>/entries/report-of-the-special-rapporteur-on-the-promotion-8c9333a5/</loc></url><url><loc>/entries/report-on-post-quantum-cryptography-ee42092b/</loc></url><url><loc>/entries/request-for-comments-revisions-to-encryption-items-0c68d1bf/</loc></url><url><loc>/tags/responsible-encryption/</loc></url><url><loc>/entries/rethinking-encryption-b0065e9b/</loc></url><url><loc>/entries/revealed-how-us-and-uk-spy-agencies-defeat-interne-6703184c/</loc></url><url><loc>/tags/rus/</loc></url><url><loc>/entries/russia-wants-to-make-an-example-of-telegram-7aa97786/</loc></url><url><loc>/entries/s-1336-data-breach-prevention-and-compensation-act-e1fa535f/</loc></url><url><loc>/entries/s-266-comprehensive-counter-terrorism-act-of-1991-780b290c/</loc></url><url><loc>/entries/s-2889-national-security-and-personal-data-protect-a7b6e85d/</loc></url><url><loc>/entries/s-1842-protecting-personal-health-data-act-8bffdbe7/</loc></url><url><loc>/tags/safe-act/</loc></url><url><loc>/tags/san-bernardino/</loc></url><url><loc>/tags/searches-and-seizures/</loc></url><url><loc>/entries/secret-us-cybersecurity-report-encryption-vital-to-9703fda8/</loc></url><url><loc>/entries/secrets-or-shields-to-share-new-dilemmas-for-dual-34d6ebbe/</loc></url><url><loc>/tags/section-230/</loc></url><url><loc>/tags/security/</loc></url><url><loc>/tags/security-requirements/</loc></url><url><loc>/entries/security-vs-security-rapid7-supports-strong-encryp-4634f37f/</loc></url><url><loc>/entries/security-win-burr-feinstein-proposal-declared-dead-728401be/</loc></url><url><loc>/entries/security-front-doors-vs-back-doors-a-distinction-w-27fb709b/</loc></url><url><loc>/entries/security-surveillance-and-the-truth-about-going-da-639358d3/</loc></url><url><loc>/entries/senator-backs-off-backdoors-b6e3901e/</loc></url><url><loc>/entries/shining-a-light-on-the-encryption-debate-a-canadia-9d78aca2/</loc></url><url><loc>/tags/snowden/</loc></url><url><loc>/entries/software-firms-call-u-s-plan-on-encryption-unworka-5550f1d3/</loc></url><url><loc>/entries/sources-we-were-pressured-to-weaken-the-mobile-sec-d482f436/</loc></url><url><loc>/tags/speech/</loc></url><url><loc>/tags/ss7/</loc></url><url><loc>/entries/ss7-hack-explained-what-can-you-do-about-it-2ca330ad/</loc></url><url><loc>/entries/standards-setting-and-federal-information-policy-t-0fafb4ad/</loc></url><url><loc>/tags/stanford-cis/</loc></url><url><loc>/tags/stanford-internet-observatory/</loc></url><url><loc>/tags/state-law/</loc></url><url><loc>/tags/states-rights/</loc></url><url><loc>/entries/statement-by-commerce-secretary-william-daley-re-a-f1d56237/</loc></url><url><loc>/entries/statement-by-the-press-secretary-617ea86a/</loc></url><url><loc>/entries/statement-of-cindy-a-cohn-testimony-on-encryption-5ab3bf4f/</loc></url><url><loc>/entries/statement-of-general-keith-b-alexander-commander-u-d467327a/</loc></url><url><loc>/entries/status-report-on-the-first-round-of-the-nist-post-579fe6e3/</loc></url><url><loc>/entries/submission-of-the-citizen-lab-munk-school-of-globa-8208d51f/</loc></url><url><loc>/tags/surveillance/</loc></url><url><loc>/entries/surveillance-costs-the-nsa-s-impact-on-the-economy-5c789458/</loc></url><url><loc>/entries/symposium-recent-development-key-escrow-encryption-7ab38e95/</loc></url><url><loc>/tags/</loc></url><url><loc>/entries/techies-urge-senator-to-drop-encryption-key-plan-7c42e2b5/</loc></url><url><loc>/tags/telecoms/</loc></url><url><loc>/tags/terrorism/</loc></url><url><loc>/entries/the-people-of-the-state-of-colorado-v-shaun-r-davi-ca69bf48/</loc></url><url><loc>/entries/the-burr-feinstein-proposal-is-simply-anti-securit-e9e5d5f1/</loc></url><url><loc>/entries/the-clipper-chip-edd3daa1/</loc></url><url><loc>/entries/the-earn-it-act-is-unconstitutional-fourth-amendme-a7207348/</loc></url><url><loc>/</loc></url><url><loc>/entries/the-encryption-debate-in-the-european-union-6437b4a5/</loc></url><url><loc>/entries/the-encryption-tightrope-balancing-americans-secur-8372b960/</loc></url><url><loc>/entries/the-evolution-of-us-government-restrictions-on-usi-2a478a7b/</loc></url><url><loc>/entries/the-five-eyes-statement-on-encryption-things-are-s-be5639a2/</loc></url><url><loc>/entries/the-human-rights-benefits-of-encryption-9be91f1d/</loc></url><url><loc>/entries/the-last-refuge-of-the-criminal-encrypted-smartpho-ba7ee311/</loc></url><url><loc>/entries/the-law-and-policy-of-client-side-scanning-7598c301/</loc></url><url><loc>/entries/the-metaphor-is-the-key-cryptography-the-clipper-c-9a3caf0b/</loc></url><url><loc>/tags/the-nsa-files/</loc></url><url><loc>/entries/the-nsas-split-key-encryption-proposal-is-not-seri-126e61d2/</loc></url><url><loc>/entries/the-risks-of-key-recovery-key-escrow-and-trusted-t-50dad67f/</loc></url><url><loc>/entries/the-risks-of-responsible-encryption-149c012c/</loc></url><url><loc>/entries/the-role-of-encryption-in-australia-4e0f543e/</loc></url><url><loc>/entries/the-shifting-landscape-of-global-internet-censorsh-92d9e491/</loc></url><url><loc>/entries/the-wassenaar-arrangement-on-export-controls-for-c-1d93278e/</loc></url><url><loc>/entries/the-way-forward-working-together-to-tackle-cybercr-9b44953b/</loc></url><url><loc>/tags/think-tank/</loc></url><url><loc>/entries/timeline-the-u-s-government-and-cybersecurity-5f7be48e/</loc></url><url><loc>/entries/travel-guide-to-the-digital-world-encryption-polic-2d5134d2/</loc></url><url><loc>/entries/u-s-relaxes-export-controls-on-supercomputers-a6ca258e/</loc></url><url><loc>/entries/u-s-says-it-has-unlocked-iphone-without-apple-c5d963b4/</loc></url><url><loc>/entries/u-s-supercomputer-export-control-policy-9f12a98a/</loc></url><url><loc>/entries/u-s-tries-to-make-it-easier-to-wiretap-the-interne-7c6b8243/</loc></url><url><loc>/tags/uk/</loc></url><url><loc>/tags/uk-news/</loc></url><url><loc>/tags/uk-security-and-counter-terrorism/</loc></url><url><loc>/tags/united-nations/</loc></url><url><loc>/tags/us-congress/</loc></url><url><loc>/entries/us-encryption-export-regualtion-us-to-eu-me-too-th-169deed5/</loc></url><url><loc>/entries/us-government-fines-intel-s-wind-river-over-crypto-09cbe60a/</loc></url><url><loc>/tags/user-controller-encryption/</loc></url><url><loc>/entries/wassenaar-arrangement-on-export-controls-for-conve-7584af0f/</loc></url><url><loc>/tags/wassenar-arrangement/</loc></url><url><loc>/entries/we-need-more-protection-from-government-surveillan-3c66d9c0/</loc></url><url><loc>/entries/what-is-the-wassenaar-arrangement-e44b92a7/</loc></url><url><loc>/tags/white-house/</loc></url><url><loc>/entries/who-holds-the-key-a-comparative-study-of-us-and-eu-2e2a0618/</loc></url><url><loc>/entries/why-an-encryption-backdoor-for-just-the-good-guys-918a9e9d/</loc></url><url><loc>/tags/wikileaks/</loc></url><url><loc>/tags/wiretap/</loc></url><url><loc>/entries/wiretapping-and-cryptography-today-925f8d0d/</loc></url><url><loc>/entries/world-map-of-encryption-laws-and-policies-af6d8b94/</loc></url><url><loc>/tags/world-news/</loc></url><url><loc>/entries/worried-about-apple-california-has-a-bill-that-wou-fa26214c/</loc></url><url><loc>/entries/five-eyes-governments-respond-to-coalition-demands-c670f1bb/</loc></url></urlset>