{"id":6356,"date":"2013-08-22T06:43:35","date_gmt":"2013-08-22T06:43:35","guid":{"rendered":"https:\/\/noi3.org\/site\/?p=6356"},"modified":"2013-08-22T06:43:35","modified_gmt":"2013-08-22T06:43:35","slug":"why-email-can-t-be-protected-from-government-surveillance","status":"publish","type":"post","link":"https:\/\/site.noi3.org\/?p=6356","title":{"rendered":"Why Email Can\u2019t Be Protected From Government Surveillance"},"content":{"rendered":"<p style=\"text-align: justify;\"> \t<img decoding=\"async\" alt=\"Why Email Can\u2019t Be Protected From Government Surveillance\" src=\"http:\/\/main.makeuseoflimited.netdna-cdn.com\/wp-content\/uploads\/2013\/08\/email-840x420.jpg\" style=\"width: 250px; height: 125px; \" \/><\/p>\n<div class=\"entry-content\" id=\"entry-details\" style=\"font-size: 12px; margin: 0px; padding: 5px 0px 0px; border: 0px; line-height: 18px; vertical-align: baseline; overflow: hidden; background-image: url(http:\/\/main.makeuseoflimited.netdna-cdn.com\/wp-content\/themes\/makeuseofnew_punchtabbed\/_ui\/images\/common\/dotted_line.gif); color: rgb(102, 102, 102); background-position: 0% 0%; background-repeat: repeat no-repeat;\">\n<div class=\"entry-wrap\" style=\"margin: 0px; padding: 0px 0px 15px; border: 0px; font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; background-image: none; text-align: justify;\"> \t\t<span style=\"font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; color: rgb(34, 34, 34);\">\u201cIf you knew what I know about email, you might not use it either,\u201d\u00a0<\/span><a href=\"http:\/\/www.forbes.com\/sites\/kashmirhill\/2013\/08\/09\/lavabits-ladar-levison-if-you-knew-what-i-know-about-email-you-might-not-use-it\/\" style=\"font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; border: 0px; vertical-align: baseline; text-decoration: none; color: rgb(4, 119, 205);\">said the owner of secure email service Lavabit<\/a><span style=\"font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; color: rgb(34, 34, 34);\">\u00a0as he recently shut it down. \u201cThere is no way to do encrypted e-mail where the content is protected,\u201d\u00a0<\/span><a href=\"http:\/\/www.forbes.com\/sites\/parmyolson\/2013\/08\/09\/e-mails-big-privacy-problem-qa-with-silent-circle-co-founder-phil-zimmermann\/\" style=\"font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; border: 0px; vertical-align: baseline; text-decoration: none; color: rgb(4, 119, 205);\">said Phil Zimmermann<\/a><span style=\"font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; color: rgb(34, 34, 34);\">\u00a0as he suddenly shut down Silent Circle\u2019s secure email service. The reality is that email is fundamentally insecure and can never be protected from government surveillance in the same way some other communications can.<\/span><\/div>\n<\/p><\/div>\n<p>  <!--more-->  <\/p>\n<p style=\"text-align: justify;\"> \t<img decoding=\"async\" alt=\"Why Email Can\u2019t Be Protected From Government Surveillance\" src=\"http:\/\/main.makeuseoflimited.netdna-cdn.com\/wp-content\/uploads\/2013\/08\/email-840x420.jpg\" style=\"width: 500px; height: 250px; \" \/><\/p>\n<div class=\"entry-content\" id=\"entry-details\" style=\"font-size: 12px; margin: 0px; padding: 5px 0px 0px; border: 0px; line-height: 18px; vertical-align: baseline; overflow: hidden; background-image: url(http:\/\/main.makeuseoflimited.netdna-cdn.com\/wp-content\/themes\/makeuseofnew_punchtabbed\/_ui\/images\/common\/dotted_line.gif); color: rgb(102, 102, 102); background-position: 0% 0%; background-repeat: repeat no-repeat;\">\n<div class=\"entry-wrap\" style=\"margin: 0px; padding: 0px 0px 15px; border: 0px; font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; background-image: none; text-align: justify;\"> \t\t<span style=\"font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; color: rgb(34, 34, 34);\">\u201cIf you knew what I know about email, you might not use it either,\u201d\u00a0<\/span><a href=\"http:\/\/www.forbes.com\/sites\/kashmirhill\/2013\/08\/09\/lavabits-ladar-levison-if-you-knew-what-i-know-about-email-you-might-not-use-it\/\" style=\"font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; border: 0px; vertical-align: baseline; text-decoration: none; color: rgb(4, 119, 205);\">said the owner of secure email service Lavabit<\/a><span style=\"font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; color: rgb(34, 34, 34);\">\u00a0as he recently shut it down. \u201cThere is no way to do encrypted e-mail where the content is protected,\u201d\u00a0<\/span><a href=\"http:\/\/www.forbes.com\/sites\/parmyolson\/2013\/08\/09\/e-mails-big-privacy-problem-qa-with-silent-circle-co-founder-phil-zimmermann\/\" style=\"font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; border: 0px; vertical-align: baseline; text-decoration: none; color: rgb(4, 119, 205);\">said Phil Zimmermann<\/a><span style=\"font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; color: rgb(34, 34, 34);\">\u00a0as he suddenly shut down Silent Circle\u2019s secure email service. The reality is that email is fundamentally insecure and can never be protected from government surveillance in the same way some other communications can.<\/span><span style=\"font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; color: rgb(34, 34, 34);\">Sure, you may be using a different encrypted and \u201csecure\u201d email service that hasn\u2019t shut down yet. But they\u2019re vulnerable to the same US government pressure Lavabit faced \u2014 that\u2019s why Silent Circle shut down before it was contacted by the government. Some less principled services will opt to cooperate with governments rather than shut down. We don\u2019t know exactly what demands Lavabit faced, as they\u2019re forbidden from disclosing anything they experienced as a result of backdoor orders from the secret US surveillance court that enables\u00a0<\/span><a href=\"http:\/\/www.makeuseof.com\/tag\/what-is-prism-everything-you-need-to-know\/\" style=\"font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; border: 0px; vertical-align: baseline; text-decoration: none; color: rgb(4, 119, 205);\">PRISM and other NSA surveillance programs<\/a><span style=\"font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; color: rgb(34, 34, 34);\">.<\/span><\/div>\n<\/p><\/div>\n<p style=\"margin: 0px; padding: 5px 0px; border: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-align: justify;\"> \tNow, let\u2019s look at why email is a poor choice for secure communications, and how it\u2019s an easy target for government snooping.<\/p>\n<h2 style=\"margin: 0px; padding: 20px 0px; border: 0px; font-family: inherit; font-size: 18px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-align: justify;\"> \tMetadata Can\u2019t Be Encrypted and XKEYSCORE Can Intercept It<\/h2>\n<p style=\"margin: 0px; padding: 5px 0px; border: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-align: justify;\"> \tAn email isn\u2019t really a single piece of data. It\u2019s multiple pieces of data: There\u2019s the message body, the subject line, the From field, the To\/CC\/BCC fields, and other metadata that includes the location you\u2019re sending the email from.<\/p>\n<p style=\"margin: 0px; padding: 5px 0px; border: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-align: justify;\"> \tEven if you use the best email encryption technology possible, you can only encrypt the message body of the email. Anyone monitoring the connection you\u2019re using can view the subject of the email, who you\u2019re communicating with, and where you\u2019re emailing from. Under the\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/XKeyscore\" style=\"margin: 0px; padding: 0px; border: 0px; font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-decoration: none; color: rgb(4, 119, 205);\">XKEYSCORE<\/a>\u00a0program that essentially allows the US government to capture most of the traffic flowing over the Internet by intercepting it at large backbone routers and gateways, the government can build up quite a picture of who you\u2019re communicating with, when you\u2019re communicating with them, where you\u2019re each communicating from, and what the subject lines of your emails are, which gives them an idea of what you\u2019re talking about. They may find the fact that you\u2019re encrypting the contents of your emails suspicious and target you for further, more in-depth surveillance of everything else you do.<\/p>\n<p style=\"margin: 0px; padding: 5px 0px; border: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-align: justify;\"> \tThe US government\u00a0<a href=\"http:\/\/www.theguardian.com\/world\/2013\/jun\/27\/nsa-data-mining-authorised-obama\" style=\"margin: 0px; padding: 0px; border: 0px; font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-decoration: none; color: rgb(4, 119, 205);\">collected US email records in bulk until 2011<\/a>. According to the NSA, this program was discontinued because it wasn\u2019t effective \u2014 but they\u2019re still gathering metadata under XKEYSCORE, so they\u2019re likely intercepting all the email metadata they can get their hands on. They\u2019ll get lots of information from you even if you encrypt your emails.<\/p>\n<p style=\"margin: 0px; padding: 5px 0px; border: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-align: justify;\"> \tFor more information, read about\u00a0<a href=\"http:\/\/www.makeuseof.com\/tag\/what-can-you-learn-from-an-email-header-metadata\/\" style=\"margin: 0px; padding: 0px; border: 0px; font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-decoration: none; color: rgb(4, 119, 205);\">the things you can learn from an email\u2019s \u201cheader\u201d, or metadata<\/a>.<\/p>\n<p style=\"margin: 0px; padding: 5px 0px; border: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-align: justify;\"> \t<img decoding=\"async\" alt=\"xkeyscore-metadata-slide\" src=\"http:\/\/main.makeuseoflimited.netdna-cdn.com\/wp-content\/uploads\/2013\/08\/xkeyscore-metadata-slide.png\" \/><\/p>\n<h2 style=\"margin: 0px; padding: 20px 0px; border: 0px; font-family: inherit; font-size: 18px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-align: justify;\"> \tMany \u201cSecure\u201d Email Providers Have the Encryption Keys For Convenience<\/h2>\n<p style=\"margin: 0px; padding: 5px 0px; border: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-align: justify;\"> \tEncrypting and decrypting emails is complicated. In theory, you\u2019d\u00a0<a href=\"http:\/\/www.makeuseof.com\/tag\/send-signed-encrypted-email-evolution-linux\/\" style=\"margin: 0px; padding: 0px; border: 0px; font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-decoration: none; color: rgb(4, 119, 205);\">use something like PGP or GPG on your local computer to decrypt emails<\/a>. In practice, the setup can be complicated and confusing, even for more tech-savvy users. This also makes it impossible to access the encrypted emails via a browser or lightweight mobile client.<\/p>\n<p style=\"margin: 0px; padding: 5px 0px; border: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-align: justify;\"> \tIn practice, many secure email providers have dealt with this by holding the encryption keys at their end, decrypting emails when you access them. This is how Silent Circle\u2019s secure email service worked \u2014 they had the encryption keys so they could easily decrypt emails and offer a good user experience. In practice, this means that the government could demand all the encryption keys \u2014 or just the ones they needed \u2014 and decrypt all the emails they wanted to. If the provider has the keys, they could hand them over. The only way to securely encrypt and decrypt email bodies is with complicated desktop software. Even all this effort leaves the metadata exposed.<\/p>\n<h2 style=\"margin: 0px; padding: 20px 0px; border: 0px; font-family: inherit; font-size: 18px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-align: justify;\"> \tThe Government Can Demand Backdoors: See Hushmail<\/h2>\n<p style=\"margin: 0px; padding: 5px 0px; border: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-align: justify;\"> \tCanada-based Hushmail is one of the most popular and widely-known encrypted email services. In 2007,\u00a0<a href=\"http:\/\/www.wired.com\/threatlevel\/2007\/11\/encrypted-e-mai\/\" style=\"margin: 0px; padding: 0px; border: 0px; font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-decoration: none; color: rgb(4, 119, 205);\">Canadian courts compelled Hushmail to hand over the emails of one of their users<\/a>. The emails were then passed to U.S. courts under a mutual legal assistance treaty between Canada and the USA.<\/p>\n<p style=\"margin: 0px; padding: 5px 0px; border: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-align: justify;\"> \tHushmail theoretically couldn\u2019t do this. They didn\u2019t keep users\u2019 encryption keys on their servers. They recommended users use PGP or similar software to decrypt the emails on their computers for maximum privacy. However, many people thought this was too inconvenient, so Hushmail also offered a downloadable Java applet located on a web page that allowed you to access your email. When you accessed the web page, the latest version of the Java applet would download to your computer, you\u2019d enter your encryption key, and the applet would download and locally decrypt your email without Hushmail gaining access to your encryption key.<\/p>\n<p style=\"margin: 0px; padding: 5px 0px; border: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-align: justify;\"> \tHushmail was compelled to serve a version of the\u00a0<a href=\"http:\/\/www.makeuseof.com\/tag\/is-java-unsafe-and-should-you-disable-it\/\" style=\"margin: 0px; padding: 0px; border: 0px; font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-decoration: none; color: rgb(4, 119, 205);\">Java<\/a>\u00a0applet with a built-in backdoor to the user in question. The modified Java applet sent the user\u2019s encryption key to Hushmail after it was entered and Hushmail gained access to the user\u2019s emails, which they handed over to the courts.<\/p>\n<p style=\"margin: 0px; padding: 5px 0px; border: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-align: justify;\"> \tIf you do use secure email, the provider can be forced to acquire your key in any way possible. Even if they couldn\u2019t gain access to your key, the provider could hand over your encrypted emails themselves, which would show the government who you\u2019re communicating with, when, and about what (via the email subject line).<\/p>\n<p style=\"margin: 0px; padding: 5px 0px; border: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-align: justify;\"> \t<img decoding=\"async\" alt=\"hushmail-legal-warning\" src=\"http:\/\/main.makeuseoflimited.netdna-cdn.com\/wp-content\/uploads\/2013\/08\/hushmail-legal-warning.png\" \/><\/p>\n<h2 style=\"margin: 0px; padding: 20px 0px; border: 0px; font-family: inherit; font-size: 18px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-align: justify;\"> \tEmail Messages Are Stored on a Server, Instant Messages Are Not<\/h2>\n<p style=\"margin: 0px; padding: 5px 0px; border: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-align: justify;\"> \tEven if the government can\u2019t get or intercept the encryption key, they may be able to decrypt your emails anyway. Your encrypted email messages are stored on a server \u2014 that\u2019s just how email works. If the government were to demand this data, the hosting provider would have to hand it over in encrypted form. The government could then try to break the encryption \u2014 new hardware regularly makes current encryption mechanisms much weaker, and the US government may be storing such encrypted communications in the hopes of breaking them in the future.<\/p>\n<p style=\"margin: 0px; padding: 5px 0px; border: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-align: justify;\"> \tIn contrast, instant message-style communications are harder to archive. An encrypted message can be sent directly to the recipient and not stored on a server where it can be accessed in the future. The government would have to install a monitoring device and capture all the communications in real time. If they failed to do so and didn\u2019t have all the encrypted data, they wouldn\u2019t be able to go get it years later \u2014 but they can often do this with email.<\/p>\n<h2 style=\"margin: 0px; padding: 20px 0px; border: 0px; font-family: inherit; font-size: 18px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-align: justify;\"> \tOther Types of Communication Can Be Secured<\/h2>\n<p style=\"margin: 0px; padding: 5px 0px; border: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-align: justify;\"> \tEmail just wasn\u2019t designed with encryption in mind. It\u2019s been bolted on after-the-fact, and it shows. Even the most careful of secure email service users can\u2019t hide who they\u2019re communicating with and when. If you really want to avoid government surveillance, you\u2019re better off using different secure messaging services instead of relying on email.<\/p>\n<p style=\"margin: 0px; padding: 5px 0px; border: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-align: justify;\"> \tThat\u2019s why Silent Circle still offers a\u00a0<a href=\"http:\/\/www.makeuseof.com\/tag\/3-ways-to-make-your-smartphone-communications-more-secure\/\" style=\"margin: 0px; padding: 0px; border: 0px; font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-decoration: none; color: rgb(4, 119, 205);\">secure messaging service<\/a>\u00a0that they\u2019re confident in the security of. It\u2019s not the only option either \u2014\u00a0<a href=\"https:\/\/crypto.cat\/\" style=\"margin: 0px; padding: 0px; border: 0px; font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-decoration: none; color: rgb(4, 119, 205);\">Cryptocat<\/a>\u00a0is another. Cryptocat\u00a0<a href=\"https:\/\/blog.crypto.cat\/2013\/07\/new-critical-vulnerability-in-cryptocat-details\/\" style=\"margin: 0px; padding: 0px; border: 0px; font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-decoration: none; color: rgb(4, 119, 205);\">had a recently publicized vulnerability<\/a>\u00a0and other services may have their own problems that we\u2019ll hear about in the future, but these services are on the right track \u2014 they\u2019re not fundamentally insecure by design the way email is.<\/p>\n<p style=\"margin: 0px; padding: 5px 0px; border: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-align: justify;\"> \tOf course, encrypted email isn\u2019t necessarily worthless. For example, if you want to secure important business communications against eavesdropping, it can be useful. But encrypted email isn\u2019t going to slow down the government very much \u2014 it\u2019s not the ideal communications tool when you\u2019re trying to talk without the NSA hearing.<\/p>\n<p style=\"text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 5px; padding-right: 0px; padding-bottom: 5px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; border-image: initial; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; \"> \t<img decoding=\"async\" alt=\"encrypt your data\" src=\"http:\/\/main.makeuseoflimited.netdna-cdn.com\/wp-content\/uploads\/2012\/11\/start-cryptocat-chat.png\" \/><\/p>\n<p style=\"margin: 0px; padding: 5px 0px; border: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-align: justify;\"> \tDo you agree with the principles behind Lavabit\u2019s and Silent Circle\u2019s shutdown?\u00a0Do you use a secure messaging service to communicate without your conversations being stored in a massive government database? \u00a0Leave a comment and let us know which email-alternative you prefer.<\/p>\n<p style=\"margin: 0px; padding: 5px 0px; border: 0px; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-align: justify;\"> \t<small style=\"margin: 0px; padding: 0px; border: 0px; font-family: inherit; font-size: x-small; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline;\">Image Credits:\u00a0<a href=\"http:\/\/www.shutterstock.com\/pic.mhtml?id=54326824\" rel=\"nofollow\" style=\"margin: 0px; padding: 0px; border: 0px; font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline; text-decoration: none; color: rgb(4, 119, 205);\">Metal detector<\/a>\u00a0Via Shutterstock<\/small><\/p>\n<hr \/>\n<p> \t<a href=\"http:\/\/www.makeuseof.com\/tag\/why-email-cant-be-protected-from-government-surveillance\/\">Articolul original<\/a><\/p>\n<hr \/>\n<p> \t\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cIf you knew what I know about email, you might not use it either,\u201d\u00a0said the owner of secure email service Lavabit\u00a0as he recently shut it&hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30],"tags":[51,1252,1023,1253,1254,1011,733],"class_list":["post-6356","post","type-post","status-publish","format-standard","hentry","category-informatica","tag-comunicatii","tag-criptare","tag-email","tag-oficial","tag-prism","tag-siguranta","tag-supraveghere"],"_links":{"self":[{"href":"https:\/\/site.noi3.org\/index.php?rest_route=\/wp\/v2\/posts\/6356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/site.noi3.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/site.noi3.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/site.noi3.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/site.noi3.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6356"}],"version-history":[{"count":0,"href":"https:\/\/site.noi3.org\/index.php?rest_route=\/wp\/v2\/posts\/6356\/revisions"}],"wp:attachment":[{"href":"https:\/\/site.noi3.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6356"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/site.noi3.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6356"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/site.noi3.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}