The Linux Foundation on global regulations and sanctions
It is disappointing that the open source community cannot operate independently of international sanctions programs, but these sanctions are the law of each country and are not optional. Many developers work on open source projects in their spare time, or for fun. Dealing with U.S. and international sanctions was unlikely on the list of things that most (or very likely any) open source developers thought they were signing up for. We hope that in time relevant authorities will clarify that open source and standards activities may continue unabated. Until that time, however, with the direct and indirect sponsorship of developers by companies, the intersection of sanctions on corporate entities leaves us in a place where we cannot ignore the potential risks.
Posted Feb 1, 2025 20:14 UTC (Sat)
by amarao (guest, #87073)
[Link] (6 responses)
Posted Feb 1, 2025 20:22 UTC (Sat)
by pizza (subscriber, #46)
[Link] (3 responses)
When ideals and laws collide, ideals invariably lose.
(except in _very_ rare circumstances)
Posted Feb 3, 2025 14:36 UTC (Mon)
by sheepdestroyer (guest, #54968)
[Link]
Posted Feb 18, 2025 10:50 UTC (Tue)
by ras (subscriber, #33059)
[Link] (1 responses)
Exportable crypto is one of those rare counter examples. Patents don't fare so well either. From memory, the law could have said to prevail against Decss, although it's author felt a lot of heat for a while. Now I think about it having the law on their side didn't help Sony when it came to running Linux on the play station.
In general if the law comes runs up against open sources ideas on transparency and free flow of ideas, my guess is the law usually loses in the long run.
Posted Feb 18, 2025 13:12 UTC (Tue)
by pizza (subscriber, #46)
[Link]
Problem here is that "the long run" refers to generational time scales and there's going to be a lot of suffering along the way.
There's a saying in gambling circles that goes something like "The house can afford to outwait you".
(this is why doubling-down is rarely a winning strategy -- the house can absorb far greater shorter-term losses than you can)
Posted Feb 1, 2025 22:46 UTC (Sat)
by nrdxp (guest, #142443)
[Link]
Posted Feb 5, 2025 17:31 UTC (Wed)
by tytso (subscriber, #9993)
[Link]
[1] https://lore.kernel.org/lkml/a52180ee7fe5ab1e55fa549d0391...
For those too lazy to click, the relevant bits of his statement are:
"... The precise requirement is that users be free to make and distribute copies of their modified versions as free software. Those Russian have a moral right to distribute copies of their modified versions of Linux. But they have no moral right to demand that the Linux developers use those changes. Whether you use someone else's changes should be up to you."
There is nothing about Stallman's "Four Freedoms" which require that kernel developers lend technical assistance to sanctioned entities. Which is what the sanctions (which are being promulgated not just by the US, but also by the European Union, Switzerland, Japan, and other countries) are all about.
Posted Feb 1, 2025 22:00 UTC (Sat)
by amacater (subscriber, #790)
[Link]
Every country maintains a regulatory and legal environment: citizens, individuals and entities within that country are subject to its laws. Linux Foundation took good legal advice as to possible consequences - as made clear in the article - and were constrained to act accordingly. Governments and legalities tend to take precedence over how we'd like the world to be - some apparent compromises on principles in fact are because of circumstances above and beyond anyone's particular control.
Posted Feb 1, 2025 22:48 UTC (Sat)
by NYKevin (subscriber, #129325)
[Link]
Posted Feb 2, 2025 2:41 UTC (Sun)
by linuxrocks123 (subscriber, #34648)
[Link] (7 responses)
Now, maybe, if you're talking with a designated foreign terrorist organization, AND you know that you're talking to a terrorist (no strict liability bullshit), AND the Supreme Court decides to go further down the Holder v. Humanitarian Law Project road once your case gets to them, THEN you could actually get in trouble for doing software development on the Internet. But that's a totally different situation than anything described in this tripe from the Linux Foundation.
Posted Feb 2, 2025 8:32 UTC (Sun)
by lunaryorn (subscriber, #111088)
[Link] (1 responses)
If this is "typical corporate legal department alarmism" then what's your comment? Typical Internet armchair layering? What would be your qualification to talk about applicability of US sanction laws?
Posted Feb 2, 2025 10:34 UTC (Sun)
by linuxrocks123 (subscriber, #34648)
[Link]
Posted Feb 3, 2025 11:19 UTC (Mon)
by neggles (subscriber, #153254)
[Link] (1 responses)
Posted Feb 4, 2025 1:05 UTC (Tue)
by linuxrocks123 (subscriber, #34648)
[Link]
And Linus Torvalds, of course, is not going to push back because he is a patriotic Finn.
Posted Feb 5, 2025 16:19 UTC (Wed)
by david.a.wheeler (subscriber, #72896)
[Link] (2 responses)
First, a caveat: I work full-time for the Linux Foundation. I'm speaking for myself here, though.
The cited article *did* lay out a case where they don't think there's a problem: "a one-way receipt of source code via an SDN therefore should be exempt from OFAC sanctions." In many cases that's all that's happening anyway.
Please note that the LF has lawyers who are quite smart & have a lot of understanding on these issues (it's literally their job). If they say "two-way communication discussing the patch..." is riskier, I would take that warning seriously. These aren't people who play being a lawyer on Reddit; they *are* lawyers, posting general advice after looking deeply at the issue.
You may think it alarmist, and it's your right to think that. It's *definitely* your right to examine these laws, and if you think they're bad, argue for changing them. But these are laws with teeth, and to my non-lawyerly eyes this seems like reasonable advice on how to comply with the current laws as they exist today.
Posted Feb 5, 2025 17:01 UTC (Wed)
by Wol (subscriber, #4433)
[Link]
ESPECIALLY if, as appears to be the case, these lawyers have had a visit from "men with guns", saying "nice foundation you have here, be a shame if something happened to it ...". It's all very well being full of bravado, but if you *have* had the "midnight visit", you're going to be a damn sight more cautious going forward ...
Cheers,
Posted Feb 6, 2025 10:32 UTC (Thu)
by geert (subscriber, #98403)
[Link]
The document does mention an exception to that:
"For example, if a developer from AcmeSDN (and AcmeSDN is an SDN subject to OFAC sanctions) contributes a driver that enables the AcmeSDN processor to work in your software, that contribution would likely be an issue."
> In many cases that's all that's happening anyway.
Anyone with statistics about how many (or: how few) patches and patch series have their v1 applied?
Posted Feb 2, 2025 7:16 UTC (Sun)
by johnjones (guest, #5462)
[Link] (42 responses)
this is the PGP replaying all over again... its silly just get off the reactionary roundabout.
switzerland has pretty much the same but reputationally very much ahead and China...
Posted Feb 2, 2025 8:11 UTC (Sun)
by lunaryorn (subscriber, #111088)
[Link]
The US generally holds that its sanction and export control laws apply worldwide; it specifically expects any entity doing business with any US entity to obey those laws. As such, Switzerland would not provide any relief; those laws would apply all the same.
Do remember that after the US sanctioned members of the Hong Kong government for their involvement in suppressing civil resistance against national security laws in 2020, the Hong Kong chief of government had her salary paid in cash because even Chinese banks closed her accounts for fear of secondary sanctions.
Posted Feb 3, 2025 6:50 UTC (Mon)
by bluca (subscriber, #118303)
[Link] (40 responses)
Posted Feb 3, 2025 7:07 UTC (Mon)
by NYKevin (subscriber, #129325)
[Link] (39 responses)
Posted Feb 3, 2025 10:31 UTC (Mon)
by farnz (subscriber, #17727)
[Link] (10 responses)
For example, for US sanctions, one of the "no loopholes allowed" provisions is that if anyone in the USA is involved in a breach, and the organisation as a whole is out of reach, they're personally liable for the breach to the full extent to which they're aware of it. That, in turn, means that no amount of "move the foundation" helps if there's a risk that Linus or Greg are going to be aware of the kernel breaching sanctions.
So in many respects, it's better for Linus to have the foundation in the USA, so that there's a larger entity that can take the blame for breach, than to have it in Switzerland where Linus gets personal liability if there's an issue with USA sanctions (even if Swiss sanctions rules don't apply here).
Posted Feb 3, 2025 22:06 UTC (Mon)
by bluca (subscriber, #118303)
[Link]
Posted Feb 4, 2025 2:33 UTC (Tue)
by linuxrocks123 (subscriber, #34648)
[Link] (8 responses)
Posted Feb 4, 2025 10:33 UTC (Tue)
by farnz (subscriber, #17727)
[Link] (7 responses)
The idea behind it is that foreign entities don't always report ownership or control to the US authorities in a clear fashion; this thus stops you having a Belizean, or Bahamian, or other non-US entity whose lines of control are hidden to the US, but which exists solely to allow a US entity to deal in sanctioned items with a sanctioned entity at arms' length. By making it a breach of sanctions if you know that the non-US entity is breaching sanctions, you make prosecuting the US entity much simpler; you show that they knew about the non-US entity's breach of sanctions, and you're done.
Posted Feb 4, 2025 12:35 UTC (Tue)
by Wol (subscriber, #4433)
[Link]
Okay, this is not sanctions-specific, but sounds very much like the British legal concept of "Knew or should have known". If you do something that may or may not be criminal - trespass is a classic example - the line for criminal liability is defined as "you should have known you weren't welcome". So a big sign saying "Trespassers will be prosecuted" converts a minor misdemeanor into a criminal act. And the fact that you can't read will simply be met with "well you should have asked someone what the sign said!".
Cheers,
Posted Feb 4, 2025 14:22 UTC (Tue)
by raven667 (subscriber, #5198)
[Link]
Posted Feb 5, 2025 23:41 UTC (Wed)
by linuxrocks123 (subscriber, #34648)
[Link] (4 responses)
Posted Feb 6, 2025 10:59 UTC (Thu)
by farnz (subscriber, #17727)
[Link] (3 responses)
If you need the details, I suggest you talk to your US sanctions lawyer.
Posted Feb 6, 2025 11:34 UTC (Thu)
by paulj (subscriber, #341)
[Link] (2 responses)
Posted Feb 6, 2025 14:34 UTC (Thu)
by farnz (subscriber, #17727)
[Link] (1 responses)
The only way to be safe is to limit your interactions to people you believe are in the same general jurisdiction as you, and to have citizenship or local equivalent in that jurisdiction - Indian citizens only associating with other Indian citizens, EU citizens with other EU citizens, Russians with Russians, UK citizens with UK citizens, Canadian citizens with other Canadian citizens etc. Otherwise, there's a risk that you'll hit one of the many edge cases, and get in trouble for doing something that you thought was perfectly legal, but isn't because you're hitting on your local jurisdiction's rules about international interactions.
Posted Feb 6, 2025 15:38 UTC (Thu)
by paulj (subscriber, #341)
[Link]
There are already a good number of contributors to various projects who keep themselves anonymous. I expect we'll see this continue. Young people today seem much more conscious of online privacy and keeping a wall between their online and offline identities, than my generation - so this may come naturally.
There are also spheres of Free Software where the nature of the software strongly leads contributors to elect to be anonymous, because the nature of the software offends 1 or more governments around the world. Often, that nature being that the software gives users privacy from the government, e.g. in their communications, their data, or their financial interactions.
Governments really hate privacy. Maybe we should exercise it more.
Posted Feb 4, 2025 2:57 UTC (Tue)
by linuxrocks123 (subscriber, #34648)
[Link] (27 responses)
I'd say we have a pretty good track record, wouldn't you? Perhaps the condescension is unwarranted?
Posted Feb 4, 2025 9:22 UTC (Tue)
by bluca (subscriber, #118303)
[Link] (13 responses)
Posted Feb 5, 2025 23:17 UTC (Wed)
by linuxrocks123 (subscriber, #34648)
[Link] (12 responses)
Is "technobeaver7914" on the SDN list? They don't know. Neither does GitHub.
If people actually acted like they could be fined megabucks if they interacted with technobeaver7914 on GitHub, would that basically destroy GitHub as a platform for engaging in protected speech about software? Yes? Okay, there you go then.
And it's not just software. Take a look at https://lwn.net/Articles/1007807/ where franz talks about advice he received to a random guy named "linuxrocks123". franz has no idea who I am, and he's exporting expert advice which he received from a legal consultation to me. For all he knows, linuxrocks123 is actually some Iranian on the SDN list. I'm _NOT_, but he doesn't know that. If I were, would franz be fined megabucks?
Again, there you go. A "yes" answer to that question would completely eviscerate my right to anonymous speech and franz's right to speak at all. It would make everyone in the US too terrified to participate in GitHub, too terrified to help people on reddit.com/r/tax, too terrified to answer questions on StackOverflow, and too terrified to participate in any other online forums of any kind focused on any topic, technical or nontechnical, whether software, cars, crochet, boating, whatever.
A "yes" answer to that question would, in short, entirely destroy the Internet as a platform for speech for all US persons. Now, knowing _THAT_, do you _REALLY_ think the US court system would let the answer to that question be "yes"?
Posted Feb 5, 2025 23:41 UTC (Wed)
by bluca (subscriber, #118303)
[Link] (7 responses)
Posted Feb 6, 2025 1:54 UTC (Thu)
by linuxrocks123 (subscriber, #34648)
[Link] (5 responses)
That claim is alarmist and ridiculous.
Posted Feb 6, 2025 2:09 UTC (Thu)
by linuxrocks123 (subscriber, #34648)
[Link]
If you're knowingly collaborating with a _LISTED_ _TERRORIST_, _THEN_ you are probably in trouble.
Posted Feb 6, 2025 10:14 UTC (Thu)
by bluca (subscriber, #118303)
[Link] (1 responses)
Posted Feb 7, 2025 0:50 UTC (Fri)
by linuxrocks123 (subscriber, #34648)
[Link]
Posted Feb 6, 2025 11:48 UTC (Thu)
by lunaryorn (subscriber, #111088)
[Link] (1 responses)
The article is about a a very specific kind of talk, namely collaboration on and contribution to an open source project with significant impact. And from that angle the claim in the article is neither alarmist nor ridiculous but describes the very reality of everyone working in areas routinely impacted by US export control laws and sanctions.
That's just a fact, whether you like it or not, and from the point of view of someone who's working in such an area I sorry to have to admit that I find it increasingly hard to take your somewhat unsubstantiated comments serious.
Posted Feb 7, 2025 0:58 UTC (Fri)
by linuxrocks123 (subscriber, #34648)
[Link]
You can certainly believe that the law requires that, and you won't get in trouble for believing that. You won't be _DOING_ much, but you won't get in trouble.
Posted Feb 6, 2025 11:29 UTC (Thu)
by paulj (subscriber, #341)
[Link]
Posted Feb 6, 2025 11:39 UTC (Thu)
by lunaryorn (subscriber, #111088)
[Link] (3 responses)
Specifically, it explicitly states to restrict availability to sanctioned entities and to use various sources to determine whether a user or organisation could possibly be subject to sanctions. Github generally knows a lot more than just the user name (such as mail addresses, payment history, commit, push, and interaction history, remote IP addresses, etc), and it does not need to come to a definite conclusion; it can already limit accounts on mere suspicion and require proof of identification (such as a valid credit card). Github also summarily blocks entire geographic regions. It used to block all of Iran, until it obtained a special license from the US government to restore services to Iran.
As such, Github exists as some kind of a walled garden where sanctioned entities are not present, and within with users can reasonably assume that other users legitimate or they'd not be on the platform in the first place. But the Linux Foundation runs its own infrastructure, and thus needs to care for this itself.
All of what you're describing in your comment literally exists in the more or less the very form; you were just lucky enough not to notice so far, because frankly, reddit discussions are not usually not a place where serious business is done, and neither are LWN comments.
But organisations doing serious business, especially in sensitive fields, will likely do their own checks for significant Github contributions or prolonged collaboration with external Github users. I know that my organisation would. It has a whole policy document about doing open source which includes regulations for accepting significant contributions which include concerns of export control and sanctions, and it's not even a US-based organisation.
And I'd like to remind you that under many jurisdiction export control and sanctions laws come with specific personal liability. Contrary to, say, financial regulations or product liability or customer safety you cannot routinely disclaim personal responsibility for violations done on behalf of your employer. Breaching sanctions or export control regulations is routinely a personal criminal offence, for which you're immediately liable, even if you did so on behalf of your employer, which is why no one is particularly keen to test the limits of these regulations in court.
Posted Feb 6, 2025 12:06 UTC (Thu)
by intelfx (subscriber, #130118)
[Link] (2 responses)
Is that supposed to be a good thing?
> As such, Github exists as some kind of a walled garden where sanctioned entities are not present, and within with users can reasonably assume that other users legitimate or they'd not be on the platform in the first place.
GitHub does this to protect its own ass, not the one of other users. If what you (and others in this thread) say about strict personal liability for breach of sanctions is true, then it's very obvious that you cannot rely on GitHub's "walled gardenness" to make any decisions in this space, so you didn't really refute what GP was saying.
Posted Feb 6, 2025 12:52 UTC (Thu)
by farnz (subscriber, #17727)
[Link]
Now, once the authorities have notified you, you'd have to stop working with sanctioned entities - but as a practical matter, the authorities get much more bang for their buck if they get the sanctioned entities blocked from all of GitHub than if they simply get your project to stop interacting with them.
Posted Feb 6, 2025 14:44 UTC (Thu)
by lunaryorn (subscriber, #111088)
[Link]
Github certainly protects itself first and foremost, but in doing so, also provides reasonable protection to most individuals who casually contribute to open source projects. I for my part am quite sure that my personal activity on Github does not bear much of a risk, simply because none of my projects have any particular impact or reach, so I'm effectively off the grid: In the exceedingly unlikely case a sanctioned top terrorist used Github to contribute to one of my repositories there's a long long chain of people to be in trouble before anyone would come after me.
However, that's not the case for my employer, which would be held to a much much higher standard. If said top terrorist contributed to one of my employer's repositories my employer would definitely be in trouble, and if the repository was under my responsibility, so would I, unless I could meticulously prove that I followed my employer's regulations for export control and open source work to the very letter, and thus did all I could possibly to do avoid this situation. And as said in my previous comment, my employer does maintain quite extensive regulations around all this.
Posted Feb 4, 2025 14:17 UTC (Tue)
by nix (subscriber, #2304)
[Link]
I think I'd rather try to hack the system in ways that do not involve harming people. (I expect everyone here feels the same way.)
Posted Feb 4, 2025 22:14 UTC (Tue)
by NYKevin (subscriber, #129325)
[Link] (10 responses)
* Tor is solving a technical problem, not a legal problem. If you get caught using it in a jurisdiction that bans it, you get penalized.
[1]: https://www.ce9.uscourts.gov/jury-instructions/node/338
Posted Feb 5, 2025 17:04 UTC (Wed)
by Lennie (subscriber, #49641)
[Link]
Ever noticed how when making partitions there is often a little bit of space left on the end ?
Wouldn't be surprised that was the intention.
The other option is to have a second storage device which seemed empty and sitting on a shelf (not attached to the computer).
Posted Feb 5, 2025 23:39 UTC (Wed)
by linuxrocks123 (subscriber, #34648)
[Link] (8 responses)
Yuzu was forked and is now on Tor :) Not that it needed to be since another fork is self-hosted on the open net: https://suyu.dev/
> I don't know of any examples of TrueCrypt hidden volumes actually being litigated w.r.t. the Fifth Amendment. Frankly, the whole thing has always struck me as ridiculous.
TrueCrypt hidden volumes have been litigated: https://storage.courtlistener.com/pdf/2012/02/23/In_Re_Gr...
There are actually a fairly large number of cases about forced decryption in the US. This opinion set a strong precedent in the Eleventh Circuit and involves TrueCrypt specifically. Its hidden volume functionality is discussed in the opinion.
Posted Feb 6, 2025 3:29 UTC (Thu)
by NYKevin (subscriber, #129325)
[Link] (7 responses)
> That said, if the Government is unaware of a particular file name, it still must show
But that is defeated just by regular full device encryption. You don't need hidden volumes to get there. Granted, the court did talk about hidden volumes, because that was the particular technology that this defendant chose to use, but in my reading, full device encryption would have done just as well.
The original use case for hidden volumes was altogether more bizarre. The idea was, roughly speaking, that you might end up in a situation where some authority (legitimate or otherwise) is threatening you (with rubber-hose cryptography, criminal charges, or whatever) if you don't decrypt your hard drive, and you "comply" by decrypting the innocuous non-hidden volume. But that has never made any logical sense, because you have to leave a large hole that never gets decrypted, which will make it hard to plausibly deny the hidden volume's existence. Moreover, if the authority is legitimate, lying about the hidden volume is not only a crime, but it may constitute a waiver of any Fifth Amendment rights (or the local equivalent) you might otherwise have had. It's actively making your situation worse, for no upside.
Posted Feb 6, 2025 7:30 UTC (Thu)
by linuxrocks123 (subscriber, #34648)
[Link] (6 responses)
You're not getting it. TrueCrypt will, if you CLICK THROUGH THE WIZARD AND ACCEPT THE DEFAULTS, fill half of the drive with random junk data, not make it part of the primary volume, and not make it a hidden volume. TrueCrypt will, BY DEFAULT, just waste half your space. So, if you CHOOSE THE DEFAULT OPTIONS, half of your space will look exactly like a hidden volume would, even though it isn't.
So, how is anyone ever going to prove there's a hidden volume there? It's entirely plausible that you just clicked Next a bunch of times in the wizard and didn't make a hidden volume. Most people would do that.
TrueCrypt's hidden volume behavior is an extremely clever technique for ensuring no one can be legally compelled to provide encryption keys they don't want to provide, because it makes it impossible for the government to know whether those keys even exist.
Posted Feb 6, 2025 9:54 UTC (Thu)
by lunaryorn (subscriber, #111088)
[Link] (5 responses)
The technical minutiae of hidden volumes would only matter if law enforcement and courts solely focused on the actual contents of storage devices and ignored all other evidence prosecution has already gathered to obtain a warrant to seize the defendants hardware in the first place. But a court would obviously consider all circumstantial evidence as well, and - upon hearing expert testimony about how Truecrypt can trivially create hidden volumes - would likely not find mere denial plausible anymore. The Fifth Amendment protects the defendant in this case, but it would do so too if the volume wasn't hidden.
If the Fifth Amendment didn't exist then law could just be written such that circumstantial evidence alone was already be sufficient to penalize the defendant for failing to surrender keys; the court would just be required to directly prove the existence of the volume in this case.
The whole idea of hidden volumes seems to rest on the idea that the law allows prosecution to legally force the defendant to surrender encryption keys, but then does not allow any evidence other than specifically proving that the encrypted data exists in the device contents. As a basic premise, that's rather absurd, in my opinion.
Posted Feb 6, 2025 11:09 UTC (Thu)
by mb (subscriber, #50428)
[Link] (2 responses)
Posted Feb 6, 2025 11:33 UTC (Thu)
by farnz (subscriber, #17727)
[Link]
Indeed, you're better off being able to give them the password and the data they want, because they "know" you have it, and will continue to beat you until they get it from you. If you claim you don't have it, then it's "obvious" that you're lying, you've done something to keep it from them (whether they're organised crime or a legitimate government body), and you deserve the beating until you give them the data they want.
Posted Feb 6, 2025 11:55 UTC (Thu)
by lunaryorn (subscriber, #111088)
[Link]
Posted Feb 6, 2025 11:58 UTC (Thu)
by lunaryorn (subscriber, #111088)
[Link]
I just noticed that this particular typo is somewhat crucial.
Posted Feb 7, 2025 0:49 UTC (Fri)
by linuxrocks123 (subscriber, #34648)
[Link]
The minority view, followed by some state supreme courts, is that the prosecution can make you decrypt things using a password you know and also can make you decrypt using biometrics.
People have been in prison for contempt of court for years before legal aid organizations appealed their cases high enough to get the contempt order overturned and thereby to establish the majority view. And, the majority view is still not universal, especially at the state level.
Using a TrueCrypt hidden volume would definitely make someone's contempt case more clear-cut: you are holding me in contempt for not producing something that there is a very good chance may not even exist.
Posted Feb 14, 2025 0:26 UTC (Fri)
by ghodgkins (subscriber, #157257)
[Link]
https://en.wikipedia.org/wiki/Tor_(network)#History
legalize over legalize
legalize over legalize
legalize over legalize
legalize over legalize
legalize over legalize
legalize over legalize
legalize over legalize
Sanctions and free software developers
Kudos to the Linux Foundation
This Is Pretty Alarmist
This Is Pretty Alarmist
This Is Pretty Alarmist
This Is Pretty Alarmist
This Is Pretty Alarmist
This Is Pretty Alarmist
This Is Pretty Alarmist
Wol
This Is Pretty Alarmist
appearances matter move to switzerland
appearances matter move to switzerland
appearances matter move to switzerland
appearances matter move to switzerland
I also find it surprising, after actually talking to a real lawyer, that software engineers are unaware that a lot of these complex problems in law have what amounts to "no loopholes allowed" provisions, where if you do try to exploit a loophole, they can get you another way.
Complexity of legal problems
Complexity of legal problems
Complexity of legal problems
It's not "just" conspiracy - it's something specific in US sanctions laws that's designed to deal with the loophole of "I did not breach sanctions - I gave plans to FriendlyCo AG in an allied country with explicit instructions not to breach US sanctions, and I can't be held responsible for them breaching US sanctions". The sanctions-specific bit is quite clear that as soon as you're aware that you're sharing with someone who breaches US sanctions (even indirectly), then you're effectively counted as dealing directly with the sanctioned entity yourself.
Complexity of legal problems
Complexity of legal problems
Wol
Complexity of legal problems
Complexity of legal problems
No, because my understanding of it is based on talking to a US lawyer (I'm not in the US, but I've been employed by US companies), who gave me the explanation about sanctions. Fundamental to it is that in as far as is possible in US law, sanctions are transitive; if entity A is sanctioned, and you know that entity B deals with entity A, then entity B is also sanctioned. And note that it's not about re-exporting per-se; it's about allowing entity A to bypass sanctions by using entity B as a cut-out.
Complexity of legal problems
Complexity of legal problems
These transitive properties for sanctions aren't unusual globally - I know that Russian, UK, EU and Chinese rules on sanctions all have similar transitive properties and rules around liability for breaching sanctions that lead to the same huge grey areas (joys of working at more than one multinational where this stuff matters).
Complexity of legal problems
Complexity of legal problems
appearances matter move to switzerland
- Freeing PGP by printing it out as a book
- Freeing the Internet by developing Tor
- Freeing video playback by first putting DeCSS on T-Shirts and then developing libdvdcss which, due to the MPAA's fatigue from unsuccessfully trying to stamp out DeCSS, was never attacked.
- Ensuring that the Fifth Amendment protects disk encryption keys by developing TrueCrypt hidden volumes
- Freeing financial transactions by developing BitCoin (I don't like that they did this, but they did.)
appearances matter move to switzerland
appearances matter move to switzerland
appearances matter move to switzerland
appearances matter move to switzerland
appearances matter move to switzerland
appearances matter move to switzerland
appearances matter move to switzerland
appearances matter move to switzerland
appearances matter move to switzerland
appearances matter move to switzerland
appearances matter move to switzerland
appearances matter move to switzerland
Using GitHub provides you with a degree of protection, AIUI. You're safe if you genuinely believed that you weren't breaching sanctions - and you could argue that you believed that GitHub would be applying sanctions, therefore you assumed that you were not breaching sanctions by using GitHub.
GitHub and sanctions
appearances matter move to switzerland
appearances matter move to switzerland
appearances matter move to switzerland
* DRM has always been doomed from the start at a technical level, but section 1201 is still regularly used against random FOSS projects that do things big companies don't like (most recently the Yuzu emulator). The programmers did not win the war, they merely won one relatively inconsequential battle.
* I don't know of any examples of TrueCrypt hidden volumes actually being litigated w.r.t. the Fifth Amendment. Frankly, the whole thing has always struck me as ridiculous. First of all, any drive with a hidden volume will appear to have a large, unallocated space filled with random noise. Then, the particulars of the case may provide circumstantial evidence that you stored specific data somewhere on the drive. When those factors are combined with expert testimony about how TrueCrypt works, a jury could plausibly decide that a hidden volume exists beyond a reasonable doubt (see [1] for what juries are told about the meaning of "reasonable doubt," especially this line: "It is not required that the government prove guilt beyond all possible doubt.").
* Sanctions are applicable to BTC. It is sometimes difficult to apply them in practice, but transacting with a sanctioned entity in BTC is just as illegal as transacting with them in any fiat currency. The goal of sanctions is not necessarily to completely eliminate transactions involving sanctioned entities, but to make them risky and unpleasant enough that large portions of the market refuse to engage. BTC has not meaningfully challenged that effect, it just lowered some of the costs for the gray-market and black-market actors who were already going to breach sanctions anyway.
appearances matter move to switzerland
appearances matter move to switzerland
> * DRM has always been doomed from the start at a technical level,
appearances matter move to switzerland
> with some reasonable particularity that it seeks a certain file and is aware, based on other
> information, that (1) the file exists in some specified location, (2) the file is possessed by the
> target of the subpoena, and (3) the file is authentic.
appearances matter move to switzerland
appearances matter move to switzerland
appearances matter move to switzerland
The challenge is that where XKCD 538 applies, hidden volumes don't protect you. Indeed, not actually having the data won't protect you - you're going to get assaulted because there's a belief you have the data, and no amount of technical evidence that you don't have it will help.
appearances matter move to switzerland
appearances matter move to switzerland
appearances matter move to switzerland
appearances matter move to switzerland
Development of Tor was funded by the US government to protect its covert operations abroad. appearances matter move to switzerland