Content deleted Content added
m remove links to deleted portals |
→See also: added |
||
(6 intermediate revisions by 6 users not shown) | |||
Line 6:
==Rationale==
Countries may wish to restrict import of cryptography technologies for a number of reasons:
* Imported cryptography may have [[Backdoor (computing)|backdoors]] or [[Security Holes|security holes]] (e.g. the [[FREAK|FREAK vulnerability]]), intentional or not, which
* Citizens can anonymously communicate with each other, preventing any external party from monitoring them.
* Encrypted transactions may impede external entities to control the conducting of business.
Line 49:
| style="background-color:#cef2e0;" | [https://www.ic.gc.ca/eic/site/ecic-ceac.nsf/eng/gv00366.html Green]
| 2015
|-▼
| [[Czech Republic]]▼
| style="background-color:#faf3a2" | [http://www.cryptolaw.org/cls2.htm#ab Green/Yellow]▼
| 2008▼
|-
| [[China]]
| style="background-color:#faf3a2" | [http://www.cryptolaw.org/cls2.htm#prc Yellow]
▲| 2008
▲|-
▲| [[Czech Republic]]
| 2008
|-
Line 181:
| style="background-color:#faf3a2" | [http://www.cryptolaw.org/cls2.htm#ukr Yellow]
| 2007
|-
| [[Vietnam]]
Line 194 ⟶ 190:
==See also==
* [[Code as speech]]
* [[Export of cryptography]]
|