I'd have to agree - if the laptop is evidence, they can take a shot at brute-force decryption, but forcing you to decrypt it seems a bit shaky, to say the least. I'm a bit unsure of the examples provided by Keith though - I was once told to carry any sensitive information in a separate lock box when driving, as that would not be covered by a warrant to search your car, but vehicular laws in that area differ from home search warrants, and the source of that advice was not an attorney.
Thanks, Warren "Tray" Torrance On Thu, Feb 4, 2010 at 11:02, Karthik Poobalasubramanian <[email protected] > wrote: > Good summarization Dustin. > Also, if cops have a warrant to the house and no keys to the locked closet, > won't just break the lock than force someone to give them the keys? > Shouldn't the same thing apply to decrypting the hard drive? > > When its a child porn case, the grey area just gets wider. > > -- > Karthik Poobalasubramanian > Louisiana Board of Regents > [email protected] > [email protected] > (225) 341-5855 > skype: poobal > > > On Feb 4, 2010, at 10:27 AM, Dustin Puryear wrote: > > > To sum up that article: A guy was forced by a judge to decrypt his > > hard-drive for a child porn case. The ACLU and others feel that being > > forced to decrypt your hard-drive to provide evidence violates the Fifth > > Amendment (see > > http://law.jrank.org/pages/6880/Fifth-Amendment-Self-Incrimination-Claus > > e.html). > > > > Interesting case. > > > > To me, that is a violation of the Fifth Amendment. > > > > If I have a notebook that includes supposed proof that I committed a > > crime, the police have the right to use that against me. Fine. However, > > they can't force me to tell them where it is or even that I know of its > > existence, AFAIK. > > > > How is decrypting your hard-drive any different? > > > > --- > > Puryear IT, LLC - Baton Rouge, LA - http://www.puryear-it.com/ > > Active Directory Integration : Web & Enterprise Single Sign-On > > Identity and Access Management : Linux/UNIX technologies > > > > Download our free ebook "Best Practices for Linux and UNIX Servers" > > http://www.puryear-it.com/pubs/linux-unix-best-practices/ > > > > -----Original Message----- > > From: [email protected] [mailto:[email protected]] On > > Behalf Of Karthik Poobalasubramanian > > Sent: Thursday, February 04, 2010 10:15 AM > > To: [email protected] > > Subject: Re: [brlug-general] Police to get more access to your data? > > > > Except when you get forced to reveal you private key to decrypt your > > data. > > > > http://news.cnet.com/8301-13578_3-10172866-38.html > > > > > > -- > > Karthik Poobalasubramanian > > Louisiana Board of Regents > > [email protected] > > [email protected] > > (225) 341-5855 > > skype: poobal > > > > > > On Feb 4, 2010, at 10:12 AM, Dustin Puryear wrote: > > > >> Encrypted data is the only real way I suppose. > >> > >> --- > >> Puryear IT, LLC - Baton Rouge, LA - http://www.puryear-it.com/ > >> Active Directory Integration : Web & Enterprise Single Sign-On > >> Identity and Access Management : Linux/UNIX technologies > >> > >> Download our free ebook "Best Practices for Linux and UNIX Servers" > >> http://www.puryear-it.com/pubs/linux-unix-best-practices/ > >> > >> From: [email protected] [mailto:[email protected]] On > > Behalf Of Keith Stokes > >> Sent: Thursday, February 04, 2010 9:22 AM > >> To: [email protected] > >> Subject: Re: [brlug-general] Police to get more access to your data? > >> > >> It probably doesn't exist. > >> > >> On Feb 4, 2010, at 9:19 AM, Tim Fournet wrote: > >> > >> > >> So, what exactly is the "safe from police" way to store data? > >> > >> > >> On Thu, Feb 4, 2010 at 9:10 AM, Dustin Puryear > > <[email protected]> wrote: > >> Karthik and I just talked about this yesterday! > >> > >> http://news.cnet.com/8301-13578_3-10446503-38.html?tag=digg2 > >> > >> Is your web data really safe? > >> > >> Uh, no. > >> > >> --- > >> Puryear IT, LLC - Baton Rouge, LA - http://www.puryear-it.com/ > >> Active Directory Integration : Web & Enterprise Single Sign-On > >> Identity and Access Management : Linux/UNIX technologies > >> > >> Download our free ebook "Best Practices for Linux and UNIX Servers" > >> http://www.puryear-it.com/pubs/linux-unix-best-practices/ > >> > >> > >> _______________________________________________ > >> General mailing list > >> [email protected] > >> http://mail.brlug.net/mailman/listinfo/general_brlug.net > >> > >> > >> _______________________________________________ > >> General mailing list > >> [email protected] > >> http://mail.brlug.net/mailman/listinfo/general_brlug.net > >> > >> > >> -- > >> > >> Keith Stokes > >> > >> > >> > >> > >> > >> _______________________________________________ > >> General mailing list > >> [email protected] > >> http://mail.brlug.net/mailman/listinfo/general_brlug.net > > > > > > _______________________________________________ > > General mailing list > > [email protected] > > http://mail.brlug.net/mailman/listinfo/general_brlug.net > > > > _______________________________________________ > > General mailing list > > [email protected] > > http://mail.brlug.net/mailman/listinfo/general_brlug.net > > > _______________________________________________ > General mailing list > [email protected] > http://mail.brlug.net/mailman/listinfo/general_brlug.net >
_______________________________________________ General mailing list [email protected] http://mail.brlug.net/mailman/listinfo/general_brlug.net
