Polityczne i prawne uwarunkowania techniki ochrony poufności informacji w Intemecie
[24] PGP http://www.pgpi.org/
[25] Terry Rittet, http://www.io. com/'-ritter/
[26] B. Schneier, Applied Cryptoyaphy - Protocols, Ałgmthms, andSource Code zn C, Second Edition,
John Wiley & Sons, 1996 [27] J. Shearer, P. Gutmann, Goyemment, Crypfography, andthe R/gA/ To Prwacy, Joucnal of Uni-
versal Computer Science, Vol. 2, No. 3, March 1996, p. 113 [28] D. L. Tiggre:, Echelon - Ri^its Violation in the Infonnation Agę,
b^T^L.,.LW\i^,^ohunie;,CQt-ii/Y3.^.^,.(^heloi!.J.il"il [29] B. Wallace, D.Rzeźmcki, Wielki Bratpafr-y, PC Worid Komputer nr 6, 2000, str. 28 [30] N.
Hager, Esposing the Global Surveillance Systern, Covect Action Quartely,
ht1p:_:_lca^,aw)/.(^(^/<:\i^^C}Iob,dS[loopJ]^rr•l.l