-
Notifications
You must be signed in to change notification settings - Fork 4
/
index.html
executable file
·11 lines (10 loc) · 7.81 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
<!doctype html><!--[if IE 8]> <html lang="en" class="no-js lt-ie10 lt-ie9"> <![endif]--><!--[if IE 9]> <html lang="en" class="no-js lt-ie10"> <![endif]--><!--[if gt IE 9]><!--><html lang="en" class="no-js"><!--<![endif]--><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"><title>Surveillance Principles for a Secure, Trusted Internet | #encryption</title><meta name="description" content="Tell the FBI to side with user security. #encryption"><meta name="viewport" content="width=device-width,initial-scale=1,maximum-scale=1,user-scalable=0"><link rel="icon" type="image/png" href="/img/touch/favicon.png"><!-- Add to homescreen for Chrome on Android --><meta name="mobile-web-app-capable" content="yes"><link rel="icon" sizes="196x196" href="/img/touch/chrome-touch-icon-196x196.png"><!-- Add to homescreen for Safari on iOS --><meta name="apple-mobile-web-app-capable" content="yes"><meta name="apple-mobile-web-app-status-bar-style" content="black"><meta name="apple-mobile-web-app-title" content="Surveillance - Mozilla"><!-- Tile icon for Win8 (144x144 + tile color) --><meta name="msapplication-TileImage" content="/img/touch/ms-touch-icon-144x144-precomposed.png"><meta name="msapplication-TileColor" content="#3372DF"><!-- inject:css --><link rel="stylesheet" href="/css/styles.min.css"><!-- endinject --><!-- inject:modernizr --><script src="/js/vendor/modernizr.min.js"></script><!-- endinject --></head><body><svg xmlns="http://www.w3.org/2000/svg" style="display: none"><symbol id="icon-arrow" viewBox="0 0 40 25"><title>Arrow Icon</title><desc>Arrow Icon</desc><path d="M35.333 0L20 15.333 4.667 0 0 4.667l20 20 20-20L35.333 0z"/></symbol><symbol id="icon-arrow-left" viewBox="0 0 16 16"><title>Left Arrow Icon</title><desc>Left Arrow Icon</desc><path d="M16 7H3.8l5.6-5.6L8 0 0 8l8 8 1.4-1.4L3.8 9H16V7z"/></symbol><symbol id="icon-close" viewBox="0 0 20 20"><title>Close Icon</title><desc>Close Icon</desc><path d="M20 2l-2-2-8 8-8-8-2 2 8 8-8 8 2 2 8-8 8 8 2-2-8-8 8-8z"/></symbol><symbol id="icon-facebook" viewBox="0 0 9 20"><title>Facebook Icon</title><desc>Facebook Icon</desc><path d="M1.92 20h3.843V10h2.85l.35-4H5.912V4.4c0-.78.5-.96.85-.96h2.155V.012L5.948 0C2.653 0 1.905 2.556 1.905 4.192V6H0v4h1.92v10z"/></symbol><symbol id="icon-twitter" viewBox="0 0 273.4 222.2"><title>Twitter Icon</title><desc>Twitter Icon</desc><path d="M273.4,26.3c-10.1,4.5-20.9,7.5-32.2,8.8c11.6-6.9,20.5-17.9,24.7-31C255,10.5,243,15.2,230.2,17.7
C220,6.8,205.4,0,189.3,0c-31,0-56.1,25.1-56.1,56.1c0,4.4,0.5,8.7,1.5,12.8C88,66.5,46.7,44.2,19,10.3c-4.8,8.3-7.6,17.9-7.6,28.2
c0,19.5,9.9,36.6,25,46.7c-9.2-0.3-17.8-2.8-25.4-7c0,0.2,0,0.5,0,0.7c0,27.2,19.3,49.8,45,55c-4.7,1.3-9.7,2-14.8,2
c-3.6,0-7.1-0.4-10.6-1c7.1,22.3,27.9,38.5,52.4,39c-19.2,15-43.4,24-69.7,24c-4.5,0-9-0.3-13.4-0.8c24.8,15.9,54.3,25.2,86,25.2
c103.2,0,159.6-85.5,159.6-159.6c0-2.4-0.1-4.9-0.2-7.3C256.4,47.4,265.9,37.5,273.4,26.3z"/></symbol><symbol id="icon-mozilla" viewBox="0 0 516.5 134.4"><title>Mozilla Icon</title><desc>Mozilla Icon</desc><path d="M21.3 38.5c1.6 2.4 2.3 4.6 3.1 9.1 6.1-6 13.7-9.1 21.9-9.1 7.4 0 13.5 2.4 18.3 7.3 1.3 1.2 2.5 2.8 3.6 4.4 8.2-8.4 15.6-11.7 25.4-11.7 7 0 13.7 2.1 17.7 5.6 5.1 4.4 6.7 9.7 6.7 21.9v63.9H95.2V70.6c0-10.7-1.3-12.8-7.4-12.8-4.4 0-10.5 3-15.6 7.6V130H49.9V71.4c0-11.2-1.6-13.8-8.2-13.8-4.3 0-10.4 2.2-15.4 6.8v65.5h-23V67.2c0-13-.9-18.6-3.4-23l21.4-5.7zM202 51.8c7.2 8.4 10.4 18.2 10.4 32.8 0 15.4-3.5 26-11.3 34.7-6.8 7.7-15.8 12.5-29.6 12.5-24.4 0-40.4-18.3-40.4-46.5 0-28.3 16.1-47 40.4-47 12.8 0 22.8 4.4 30.5 13.5zm-42.3 13c-1.6 4.8-2.5 11.1-2.5 20 0 10.3 1.1 18.1 3 22.6 2.1 4.9 7.4 7.4 11.9 7.4 10.2 0 14.5-9.1 14.5-30.3 0-12.1-1.6-20-4.7-24.1-2.3-3-5.9-4.7-10.2-4.7-5.5-.1-10.1 3.4-12 9.1zM288 40v16.1l-39.7 57.4h41.2l-5.6 16.3h-66.1v-14.6L260 56.5h-38.7V40H288zM327.7 15.3c0 8.1-6.4 14.5-14.6 14.5-7.9 0-14.3-6.5-14.3-14.5 0-8.1 6.7-14.6 14.7-14.6 8 0 14.2 6.5 14.2 14.6zM325 37.9v92h-23.5V41.6l23.5-3.7zM367.8 23.4v70c0 15.5.2 17.5 1.6 20 .9 1.6 2.8 2.5 4.8 2.5.8 0 1.3 0 2.6-.3l4 14c-4 1.6-8.9 2.4-14 2.4-10 0-18.1-4.7-20.9-12.3-1.8-4.6-2.1-7.4-2.1-20.2v-67c0-11.7-.3-18.9-1.2-27l24-5.4c.8 4.8 1.2 10.6 1.2 23.3zM416.6 23.4v70c0 15.5.2 17.5 1.6 20 .8 1.6 2.7 2.5 4.7 2.5.9 0 1.4 0 2.7-.3l4 14c-4 1.6-8.9 2.4-14 2.4-10 0-18.1-4.7-20.9-12.3-1.8-4.6-2.1-7.4-2.1-20.2v-67c0-11.7-.4-18.9-1.3-27l24-5.4c1 4.8 1.3 10.6 1.3 23.3zM453.4 43.4c8.7-3.7 16.3-5.3 24.5-5.3 15.1 0 25.5 5.6 29 15.6 1.2 3.7 1.7 6.5 1.6 16.1L508 100v1.6c0 9.6 1.6 13.3 8.5 18.4L504 134.4c-5.5-2.3-10.4-6.3-12.7-10.9-1.7 1.8-3.7 3.5-5.5 4.7-4.4 3.2-10.7 4.9-18.1 4.9-20 0-30.9-10.2-30.9-28.1 0-21.1 14.6-30.9 43.2-30.9 1.7 0 3.3 0 5.3.2v-3.7c0-10-1.9-13.4-10.6-13.4-7.5 0-16.3 3.7-25.9 10.2l-10-16.9c4.8-2.8 8.3-4.5 14.6-7.1zm30.5 47.2c-16.3 0-22 3-22 13.7 0 7 4.4 11.7 10.4 11.7 4.4 0 8.8-2.3 12.3-6.1l.4-19.3h-1.1z"/></symbol></svg><section class="section--screen section--screen-content"><header><a href="/action/" class="link--back"><span class="icon icon--arrow-left"><svg class="icon-svg"><use xlink:href="#icon-arrow-left"></use></svg></span> <span class="title">Take Action</span></a> <span class="icon icon--mozilla"><svg class="icon-svg"><use xlink:href="#icon-mozilla"></use></svg></span></header><h1 class="h2">Surveillance Principles for a Secure, Trusted Internet</h1><div class="content--wrap"><div class="content--left"><p>Government surveillance has a massive impact on the Internet. Even legitimate surveillance activities can harm user trust, safety and security. It’s time we innovate. We propose that governments adopt basic principles that guide the scope of their surveillance activities, balancing their legitimate needs with the broader good:</p><h4>User Security:</h4><p>Governments need to strengthen user security, including the best encryption, not weaken it.</p><p>Encryption is critical to protecting user security. Requirements to weaken encryption make it easier for bad actors to attack the technology we all depend on, exposing users to financial, physical and other harms.</p><h4>Minimal Impact:</h4><p>Government surveillance should minimize impact on user trust and security.</p><p>Governments should collect only the information that is needed and, whenever possible, only data about specific, identifiable users. Governments should avoid compromising systems and such actions should be viewed as unacceptable if other options for obtaining information are available.</p><h4>Accountability
:</h4><p>Surveillance activities need empowered, independent, and transparent oversight.</p><p>Oversight bodies should be independent of surveilling agencies, with broad mandates, enforcement authority, and transparent processes. They should have technical expertise and assess both the demonstrable national security benefits and the potential harms of the surveillance.</p></div></div><span class="icon icon--mozilla icon--mozilla-small"><svg class="icon-svg"><use xlink:href="#icon-mozilla"></use></svg></span> <small>Portions of this content are ©1998–2016 by individual mozilla.org contributors. Content available under a <a href="https://www.mozilla.org/en-US/foundation/licensing/website-content/" target="_blank">Creative Commons license</a>.</small> <small><a href="https://www.mozilla.org/en-US/privacy/">Privacy Policy</a></small></section><!-- bower:js --><script src="/js/vendor/bower-scripts.min.js"></script><!-- endinject --><!-- inject:js --><script src="/js/scripts.js"></script><!-- endinject --><!-- Google Analytics --><script>(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){
(i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),
m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)
})(window,document,'script','//www.google-analytics.com/analytics.js','ga');
ga('create', 'UA-35433268-63', 'auto');
ga('send', 'pageview');</script><!-- end Google Analytics --></body></html>