{"id":205,"date":"2015-09-20T06:56:23","date_gmt":"2015-09-20T06:56:23","guid":{"rendered":"https:\/\/melangedmaculateme.wordpress.com\/2015\/09\/20\/draft-of-indias-national-encryption-policy\/"},"modified":"2023-07-28T16:25:10","modified_gmt":"2023-07-28T20:25:10","slug":"draft-of-indias-national-encryption-policy","status":"publish","type":"post","link":"https:\/\/melange.dmaculate.me\/home\/2015\/09\/20\/draft-of-indias-national-encryption-policy\/","title":{"rendered":""},"content":{"rendered":"<p><a href=\"http:\/\/deity.gov.in\/sites\/upload_files\/dit\/files\/draft%20Encryption%20Policyv1.pdf\" target=\"_blank\" rel=\"noopener\">Draft of India\u2019s \u201cNational Encryption Policy\u201d<\/a> (PDF) <a class=\"tag\" href=\"\/tags\/ViaDiasporaNativeWebApp\" target=\"_blank\" rel=\"noopener\">#ViaDiasporaNativeWebApp<\/a><\/p>\n<p>The government would prescribe the specifics of the encryption that is allowed, and require the availability of any encrypted stuff &lt;90 days old in plain text.<\/p>\n<p><a class=\"tag\" href=\"\/tags\/india\" target=\"_blank\" rel=\"noopener\">#india<\/a> <a class=\"tag\" href=\"\/tags\/encryption\" target=\"_blank\" rel=\"noopener\">#encryption<\/a><\/p>\n<p><a href=\"https:\/\/joindiaspora.com\/p\/99b8f35041920133f15a1e4b2f0bf956\" target=\"_blank\" rel=\"noopener\">original post<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Draft of India\u2019s \u201cNational Encryption Policy\u201d (PDF) #ViaDiasporaNativeWebApp The government would prescribe the specifics of the encryption that is allowed, and require the availability of any encrypted stuff &lt;90 days old in plain text. #india #encryption original post<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-205","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":288,"url":"https:\/\/melange.dmaculate.me\/home\/2015\/02\/06\/the-worlds-email-encryption-software-relies-on\/","url_meta":{"origin":205,"position":0},"title":"The World\u2019s Email Encryption Software Relies on One Guy, Who is Going Broke &#8211; ProPublica","author":"aslam","date":"February 6, 2015","format":"link","excerpt":"The World\u2019s Email Encryption Software Relies on One Guy, Who is Going Broke - ProPublica","rel":"","context":"In \"GnuPG\"","block_context":{"text":"GnuPG","link":"https:\/\/melange.dmaculate.me\/home\/tag\/gnupg\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":624,"url":"https:\/\/melange.dmaculate.me\/home\/2013\/07\/20\/encryption-works-how-to-protect-your-privacy-in\/","url_meta":{"origin":205,"position":1},"title":"Encryption Works: How to Protect Your Privacy in the Age of NSA Surveillance","author":"aslam","date":"July 20, 2013","format":false,"excerpt":"See on Scoop.it - Rights & Liberties\u201c\u2026thanks to the dedicated work of civilian cryptographers and the free and open source software community, it\u2019s still possible to have privacy on the Internet, and the software to do it is freely available to everyone.\u201dSee on pressfreedomfoundation.org","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":593,"url":"https:\/\/melange.dmaculate.me\/home\/2013\/12\/23\/how-did-the-nsa-hack-our-emails-by-numberphile\/","url_meta":{"origin":205,"position":2},"title":"How did the NSA hack\u2026","author":"aslam","date":"December 23, 2013","format":"video","excerpt":"How did the NSA hack our emails? (by Numberphile) Explains the NSA\u2019s \u201cbackdoor\u201d into encryption.(Source: https:\/\/www.youtube.com\/)","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/ulg_AHBOIQU\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/comments?post=205"}],"version-history":[{"count":1,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/205\/revisions"}],"predecessor-version":[{"id":2247,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/205\/revisions\/2247"}],"wp:attachment":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/media?parent=205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/categories?post=205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/tags?post=205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}