{"id":121,"date":"2008-01-02T15:02:32","date_gmt":"2008-01-02T19:02:32","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/zeroday\/2008\/01\/02\/secrecy-and-search-and-seizures\/"},"modified":"2008-01-02T15:02:32","modified_gmt":"2008-01-02T19:02:32","slug":"secrecy-and-search-and-seizures","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/zeroday\/2008\/01\/02\/secrecy-and-search-and-seizures\/","title":{"rendered":"Secrecy and Search and Seizures"},"content":{"rendered":"<p>Also called Sneak and Peeks the law enforcement community is sometimes permitted to search a persons place or things without telling them.  In certain cases, such as library records or your off site data storage provider, the LE agent will issue a gag order so no one will know they were searched.  One of these SSPs (storage service provider) has an interesting <a href=\"http:\/\/www.rsync.net\/resources\/notices\/canary.txt\">&#8220;canary&#8221;<\/a> to help their users know when privacy has been violated.<br \/>\nThe idea is simple.  They sign a notice (cryptographically) with a snippet of text from a news site to validate the timestamp stating no government agents have made a search against any users data.  If the message is not updated then something has gone wrong.  <\/p>\n<p>There is an obvious weakness which even they acknowledge.  &#8220;Signing the declaration makes it impossible for a third party to produce arbitrary declarations, it does not prevent them from using force to coerce rsync.net to produce false declarations.&#8221; [rsync.net]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Also called Sneak and Peeks the law enforcement community is sometimes permitted to search a persons place or things without telling them. In certain cases, such as library records or your off site data storage provider, the LE agent will issue a gag order so no one will know they were searched. One of these [&hellip;]<\/p>\n","protected":false},"author":214,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[272],"tags":[],"class_list":["post-121","post","type-post","status-publish","format-standard","hentry","category-digital-warfare"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/comments?post=121"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/121\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/media?parent=121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/categories?post=121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/tags?post=121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}