Restrictions on the import of cryptography: Difference between revisions

Content deleted Content added
Removed redundant and "how-to" info and adjusted tone.
See also: added
 
(30 intermediate revisions by 23 users not shown)
Line 1:
{{about|current restrictions on the import of cryptographic tools|restrictions on exporting cryptographic tools|Export of cryptography}}
{{Update|date=December 2015}}
Historically, a number of countries have attempted to restrict the import of [[cryptography]] tools.
 
Historically, aA number of countries have attempted to restrict the import of [[cryptography]] tools.
 
==Rationale==
Countries may wish to restrict import of cryptography technologies for a number of reasons:
* Imported cryptography may have [[Backdoor_Backdoor (computing)|backdoors]] or [[Security Holes|security holes]] (e.g. the [[FREAK|FREAK vulnerability]]), intentional or not, which allowallows foreignersthe country or group who created the backdoor technology, for example the [[National Security Agency|National Security Agency (NSA)]], to spy on persons using the imported cryptography; therefore the use of cryptography is restricted to that which the government thinks is safe, or which it develops itself.
* Cryptography may increase levels of privacy within the country beyond what the government wishes.
* Citizens can anonymously communicate with each other, preventing any external party from monitoring them.
* Encrypted transactions may impede external entities to control the conducting of business.
* Cryptography may sometimes increase levels of privacy within the country beyond what the government wishes.
* Imported cryptography may have [[Backdoor_(computing)|backdoors]] or security holes, intentional or not, which allow foreigners to spy on persons using the imported cryptography; therefore the use of cryptography is restricted to that which the government thinks is safe, or which it develops itself.
 
==Status by country==
Line 17 ⟶ 19:
{| class="wikitable sortable"
! Country
! class="unsortable" | Status
! Updated
|-
Line 44 ⟶ 46:
| 2008
|-
| [[Czech RepublicCanada]]
| style="background-color:#faf3a2cef2e0;" | [httphttps://www.cryptolawic.orggc.ca/cls2eic/site/ecic-ceac.htm#abnsf/eng/gv00366.html Green/Yellow]
| 20082015
|-
| [[China]]
| style="background-color:#faf3a2" | [http://www.cryptolaw.org/cls2.htm#prc Yellow]
| 2008
|-
| [[Czech Republic]]
| style="background-color:#faf3a2" | [http://www.cryptolaw.org/cls2.htm#cr Green/Yellow]
| 2008
|-
Line 84 ⟶ 90:
| 2008
|-
| [[KhazakstanKazakhstan]]
| style="background-color:#faf3a2" | [http://www.cryptolaw.org/cls2.htm#ka Yellow]
| 2008
Line 135 ⟶ 141:
| style="background-color:#faf3a2" | [http://www.cryptolaw.org/cls2.htm#po Green/Yellow]
| 2008
|-
| [[Romania]]
| style="background-color:#ffc9c9cef2e0" | [http://www2www.epiccryptolaw.org/reports/crypto2000/countriescls2.htmlhtm#_Toc477927407ro RedGreen]
| 1996 (Wassenaar)
|-
| [[Russia]]
Line 159 ⟶ 169:
| style="background-color:#faf3a2" | [http://www.cryptolaw.org/cls2.htm#sk Yellow]
| 2008
|-
| [[Tatarstan]]
| [http://www2.epic.org/reports/crypto2000/countries.html#_Toc477927393 Unknown]
| 2000
|-
| [[Tunisia]]
Line 175 ⟶ 181:
| style="background-color:#faf3a2" | [http://www.cryptolaw.org/cls2.htm#ukr Yellow]
| 2007
|-
| [[Uzbekistan]]
| style="background-color:#ffc9c9" | [http://www2.epic.org/reports/crypto2000/countries.html#_Toc477927407 Red]
| 2000
|-
| [[Vietnam]]
Line 188 ⟶ 190:
==See also==
 
* [[Code as speech]]
{{Portal|Cryptography}}
 
* [[Export of cryptography]]
 
==External links==
* ''[http://www.gilc.org/crypto/crypto-survey.html Cryptography and Liberty 1998, GILC Report]''
* ''[http://rechtenwww.uvt.nl/koops/cryptolaw/.org Crypto-Law survey 20082013]''
<!-- Link broken * ''[http://www.citrix.com/lang/English/lp/lp_1319021.asp Citrix list of restricted countries] - has no explanation of sources of the information or distinction over whether or not the restrictions are on export from certain locations (e.g. USA), or local importation restrictions. -->
 
[[Category:CryptographyExport lawand import control of cryptography]]