Force wasn't quite the right word. They can request the key and if they don't get it your closet door ends up in the front yard.
I would see the same outcome for decrypting. They might have tobdobthe legwork but bet the FBI guys have better decryption systems than the rest of us. -- Keith Stokes On Feb 4, 2010, at 11:02 AM, Karthik Poobalasubramanian <[email protected] > wrote: > Good summarization Dustin. > Also, if cops have a warrant to the house and no keys to the locked > closet, won't just break the lock than force someone to give them > the keys? Shouldn't the same thing apply to decrypting the hard drive? > > When its a child porn case, the grey area just gets wider. > > -- > Karthik Poobalasubramanian > Louisiana Board of Regents > [email protected] > [email protected] > (225) 341-5855 > skype: poobal > > > On Feb 4, 2010, at 10:27 AM, Dustin Puryear wrote: > >> To sum up that article: A guy was forced by a judge to decrypt his >> hard-drive for a child porn case. The ACLU and others feel that being >> forced to decrypt your hard-drive to provide evidence violates the >> Fifth >> Amendment (see >> http://law.jrank.org/pages/6880/Fifth-Amendment-Self-Incrimination-Claus >> e.html). >> >> Interesting case. >> >> To me, that is a violation of the Fifth Amendment. >> >> If I have a notebook that includes supposed proof that I committed a >> crime, the police have the right to use that against me. Fine. >> However, >> they can't force me to tell them where it is or even that I know of >> its >> existence, AFAIK. >> >> How is decrypting your hard-drive any different? >> >> --- >> Puryear IT, LLC - Baton Rouge, LA - http://www.puryear-it.com/ >> Active Directory Integration : Web & Enterprise Single Sign-On >> Identity and Access Management : Linux/UNIX technologies >> >> Download our free ebook "Best Practices for Linux and UNIX Servers" >> http://www.puryear-it.com/pubs/linux-unix-best-practices/ >> >> -----Original Message----- >> From: [email protected] [mailto:[email protected]] On >> Behalf Of Karthik Poobalasubramanian >> Sent: Thursday, February 04, 2010 10:15 AM >> To: [email protected] >> Subject: Re: [brlug-general] Police to get more access to your data? >> >> Except when you get forced to reveal you private key to decrypt your >> data. >> >> http://news.cnet.com/8301-13578_3-10172866-38.html >> >> >> -- >> Karthik Poobalasubramanian >> Louisiana Board of Regents >> [email protected] >> [email protected] >> (225) 341-5855 >> skype: poobal >> >> >> On Feb 4, 2010, at 10:12 AM, Dustin Puryear wrote: >> >>> Encrypted data is the only real way I suppose. >>> >>> --- >>> Puryear IT, LLC - Baton Rouge, LA - http://www.puryear-it.com/ >>> Active Directory Integration : Web & Enterprise Single Sign-On >>> Identity and Access Management : Linux/UNIX technologies >>> >>> Download our free ebook "Best Practices for Linux and UNIX Servers" >>> http://www.puryear-it.com/pubs/linux-unix-best-practices/ >>> >>> From: [email protected] [mailto:[email protected]] >>> On >> Behalf Of Keith Stokes >>> Sent: Thursday, February 04, 2010 9:22 AM >>> To: [email protected] >>> Subject: Re: [brlug-general] Police to get more access to your data? >>> >>> It probably doesn't exist. >>> >>> On Feb 4, 2010, at 9:19 AM, Tim Fournet wrote: >>> >>> >>> So, what exactly is the "safe from police" way to store data? >>> >>> >>> On Thu, Feb 4, 2010 at 9:10 AM, Dustin Puryear >> <[email protected]> wrote: >>> Karthik and I just talked about this yesterday! >>> >>> http://news.cnet.com/8301-13578_3-10446503-38.html?tag=digg2 >>> >>> Is your web data really safe? >>> >>> Uh, no. >>> >>> --- >>> Puryear IT, LLC - Baton Rouge, LA - http://www.puryear-it.com/ >>> Active Directory Integration : Web & Enterprise Single Sign-On >>> Identity and Access Management : Linux/UNIX technologies >>> >>> Download our free ebook "Best Practices for Linux and UNIX Servers" >>> http://www.puryear-it.com/pubs/linux-unix-best-practices/ >>> >>> >>> _______________________________________________ >>> General mailing list >>> [email protected] >>> http://mail.brlug.net/mailman/listinfo/general_brlug.net >>> >>> >>> _______________________________________________ >>> General mailing list >>> [email protected] >>> http://mail.brlug.net/mailman/listinfo/general_brlug.net >>> >>> >>> -- >>> >>> Keith Stokes >>> >>> >>> >>> >>> >>> _______________________________________________ >>> General mailing list >>> [email protected] >>> http://mail.brlug.net/mailman/listinfo/general_brlug.net >> >> >> _______________________________________________ >> General mailing list >> [email protected] >> http://mail.brlug.net/mailman/listinfo/general_brlug.net >> >> _______________________________________________ >> General mailing list >> [email protected] >> http://mail.brlug.net/mailman/listinfo/general_brlug.net > > > _______________________________________________ > General mailing list > [email protected] > http://mail.brlug.net/mailman/listinfo/general_brlug.net _______________________________________________ General mailing list [email protected] http://mail.brlug.net/mailman/listinfo/general_brlug.net
