Skip to main content

政府监听项目列表

国际项目

欧盟

  • INDECT: 欧盟出资支持的研究项目, 用于开发在城市环境中监控异常行为的方法 (例如处理闭路电视的数据流)。[1]

各国国内项目

中国 (中华人民共和国)

  • 金盾工程: 也称作 “防火长城”,是该国公安部设立的审查和监听项目。该项目始于1998年,于 2003年开始运作。[2]

法国

位于法国西南部东镇的 Frenchelon 的想象图

印度

俄罗斯

瑞典

瑞士

英国

美国

2013 年由爱德华·斯诺登泄露给 ㄍ卫报》 的一份机密级文档, 原定于2038年4月12日解密

来源不明

最近停止运作的项目

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...