Cryptography law
Cryptography is the practice and study of hiding information. There are many different cryptography laws in different nations. Some countries prohibit export of cryptography software and/or encryption...
Digital rights management
Digital rights management (DRM) is a class of technologies that are used by hardware and software manufacturers, publishers, copyright holders, and individuals with the intent to control the use of di...
Rpmsg

An rpmsg file is a restricted-permission message with an extension of rpmsg [1]. It is used to implement IRM for Outlook messages with the aim of restricting certain actions such as the ability t...
Restrictions on the import of cryptography
Historically, a number of countries have attempted to restrict the import of cryptography tools.
Countries may wish to restrict import of cryptography technologies for a number of reasons:
Peter Junger
Peter D. Junger (1933 – November 2006) was a computer law professor and Internet activist, most famous for having fought against the U.S. government's regulations of and export controls on encryption ...
ECC patents
Patent-related uncertainty around elliptic curve cryptography (ECC), or ECC patents, is one of the main factors limiting its wide acceptance. For example, the OpenSSL team accepted an ECC patch only i...
Hardware restriction
A hardware restriction (sometimes called hardware DRM) is content protection enforced by electronic components. The hardware restriction scheme may complement a digital rights management system implem...
Qrpff
qrpff is a Perl script created by Keith Winstein and Marc Horowitz of the MIT SIPB. It performs DeCSS in six or seven lines. The name itself is an encoding of "decss" in rot-13.In fact, two versions...
Government Paperwork Elimination Act
The Government Paperwork Elimination Act (GPEA, Pub.L. 105–277 Title XVII) requires that, when practicable, Federal agencies use electronic forms, electronic filing, and electronic signatures to condu...
Electronic Signatures in Global and National Commerce Act
The Electronic Signatures in Global and National Commerce Act (ESIGN, Pub.L. 106–229, 114 Stat. 464, enacted June 30, 2000, 15 U.S.C. ch. 96) is a United States federal law passed ...
The Chamberlain Group, Inc. v. Skylink Technologies, Inc.
The Chamberlain Group, Inc. v. Skylink Technologies, Inc., 381 F.3d 1178 (Fed. Cir. 2004) is a legal case heard by the United States Court of Appeals for the Federal Circuit concerning the anti-traffi...
The Chamberlain Group, Inc. v. Skylink Technologies, Inc. - Wikipedia
Export of cryptography in the United States
The export of cryptography from the United States is the transfer from the United States to another country of devices and technology related to cryptography. Very strict export restriction has existe...
Illegal prime
An illegal prime is a prime number that represents information whose possession or distribution is forbidden in some legal jurisdiction. One of the first illegal primes was found in 2001. When interpr...
Illegal prime - Wikipedia
United States v. Fricosu
United States v. Fricosu, No. 10-cr-00509-REB-02, is a federal criminal case in Colorado that addressed whether a person can be compelled to reveal his or her encryption passphrase or password, despit...
United States v. Fricosu - Wikipedia
DeCSS
DeCSS was one of the first free computer programs capable of decrypting content on a commercially produced DVD video disc. Before the release of DeCSS, there was no way for computers running a Linux-...
DeCSS - Wikipedia
Bernstein v. United States
Bernstein v. United States is a set of court cases brought by Daniel J. Bernstein challenging restrictions on the export of cryptography from the United States.The case was first brought in 1995, when...
Bernstein v. United States - Wikipedia
Export of cryptography
The export of cryptography is the transfer from one country to another of devices and technology related to cryptography.In the early days of the Cold War, the U.S. and its allies developed an elabora...
Regulation of Investigatory Powers Act 2000
The Regulation of Investigatory Powers Act 2000 (c.23) (RIP or RIPA) is an Act of the Parliament of the United Kingdom, regulating the powers of public bodies to carry out surveillance and investigati...
Selectable Output Control
Selectable Output Control (SOC) is a content protection Digital Rights Management (DRM) technology that is incorporated into approved devices that enables the Multichannel Video Programming Distributo...
Electronic Communications Act 2000
The Electronic Communications Act 2000 (c.7) is an Act of the Parliament of the United Kingdom that:The United Kingdom government had come to the conclusion that encryption, encryption services and el...
Penet remailer
The Penet remailer (anon.penet.fi) was a pseudonymous remailer (type 0) operated by Johan "Julf" Helsingius of Finland from 1993 to 1996. Its initial creation stemmed from an argument in a Finnish new...
Seed (sculpture)
A Seed is a sculpture or object that contains digital data that is sold for the purpose of keeping the information out of the hands of pirates for as long as possible, in addition to associating the t...
Libdvdcss
libdvdcss (or libdvdcss2 in some repositories) is a free and open source software library for accessing and unscrambling DVDs encrypted with the Content Scramble System (CSS). libdvdcss is part of th...
Illegal number
An illegal number is a number that represents information which is illegal to possess, utter, propagate, or otherwise transmit in some legal jurisdiction. Any piece of information is representable as ...
Texas Instruments signing key controversy
The Texas Instruments signing key controversy refers to the controversy which resulted from Texas Instruments' (TI) response to a project to factorize the 512-bit RSA cryptographic keys needed to writ...
Texas Instruments signing key controversy - Wikipedia
Junger v. Daley
Junger v. Daley is a court case brought by Peter Junger challenging restrictions on the export of encryption software outside of the United States.The case was first brought in 1996 (as Junger v. Chri...
Information rights management
Information rights management (IRM) is a subset of digital rights management (DRM), technologies that protect sensitive information from unauthorized access. It is sometimes referred to as E-DRM or En...