When I read that article I was thinking, what if I "forgot" my
decryption pw! ha!

On Thu, Feb 4, 2010 at 11:07 AM, Keith Stokes <[email protected]> wrote:
> Force wasn't quite the right word. They can request the key and if
> they don't get it your closet door ends up in the front yard.
>
>
> I would see the same outcome for decrypting. They might have tobdobthe
> legwork but bet the FBI guys have better decryption systems than the
> rest of us.
>
> --
>
> Keith Stokes
>
> On Feb 4, 2010, at 11:02 AM, Karthik Poobalasubramanian <[email protected]
>  > wrote:
>
>> Good summarization Dustin.
>> Also, if cops have a warrant to the house and no keys to the locked
>> closet, won't just break the lock than force someone to give them
>> the keys? Shouldn't the same thing apply to decrypting the hard drive?
>>
>> When its a child porn case, the grey area just gets wider.
>>
>> --
>> Karthik Poobalasubramanian
>> Louisiana Board of Regents
>> [email protected]
>> [email protected]
>> (225) 341-5855
>> skype: poobal
>>
>>
>> On Feb 4, 2010, at 10:27 AM, Dustin Puryear wrote:
>>
>>> To sum up that article: A guy was forced by a judge to decrypt his
>>> hard-drive for a child porn case. The ACLU and others feel that being
>>> forced to decrypt your hard-drive to provide evidence violates the
>>> Fifth
>>> Amendment (see
>>> http://law.jrank.org/pages/6880/Fifth-Amendment-Self-Incrimination-Claus
>>> e.html).
>>>
>>> Interesting case.
>>>
>>> To me, that is a violation of the Fifth Amendment.
>>>
>>> If I have a notebook that includes supposed proof that I committed a
>>> crime, the police have the right to use that against me. Fine.
>>> However,
>>> they can't force me to tell them where it is or even that I know of
>>> its
>>> existence, AFAIK.
>>>
>>> How is decrypting your hard-drive any different?
>>>
>>> ---
>>> Puryear IT, LLC - Baton Rouge, LA - http://www.puryear-it.com/
>>> Active Directory Integration : Web & Enterprise Single Sign-On
>>> Identity and Access Management : Linux/UNIX technologies
>>>
>>> Download our free ebook "Best Practices for Linux and UNIX Servers"
>>> http://www.puryear-it.com/pubs/linux-unix-best-practices/
>>>
>>> -----Original Message-----
>>> From: [email protected] [mailto:[email protected]] On
>>> Behalf Of Karthik Poobalasubramanian
>>> Sent: Thursday, February 04, 2010 10:15 AM
>>> To: [email protected]
>>> Subject: Re: [brlug-general] Police to get more access to your data?
>>>
>>> Except when you get forced to reveal you private key to decrypt your
>>> data.
>>>
>>> http://news.cnet.com/8301-13578_3-10172866-38.html
>>>
>>>
>>> --
>>> Karthik Poobalasubramanian
>>> Louisiana Board of Regents
>>> [email protected]
>>> [email protected]
>>> (225) 341-5855
>>> skype: poobal
>>>
>>>
>>> On Feb 4, 2010, at 10:12 AM, Dustin Puryear wrote:
>>>
>>>> Encrypted data is the only real way I suppose.
>>>>
>>>> ---
>>>> Puryear IT, LLC - Baton Rouge, LA - http://www.puryear-it.com/
>>>> Active Directory Integration : Web & Enterprise Single Sign-On
>>>> Identity and Access Management : Linux/UNIX technologies
>>>>
>>>> Download our free ebook "Best Practices for Linux and UNIX Servers"
>>>> http://www.puryear-it.com/pubs/linux-unix-best-practices/
>>>>
>>>> From: [email protected] [mailto:[email protected]]
>>>> On
>>> Behalf Of Keith Stokes
>>>> Sent: Thursday, February 04, 2010 9:22 AM
>>>> To: [email protected]
>>>> Subject: Re: [brlug-general] Police to get more access to your data?
>>>>
>>>> It probably doesn't exist.
>>>>
>>>> On Feb 4, 2010, at 9:19 AM, Tim Fournet wrote:
>>>>
>>>>
>>>> So, what exactly is the "safe from police" way to store data?
>>>>
>>>>
>>>> On Thu, Feb 4, 2010 at 9:10 AM, Dustin Puryear
>>> <[email protected]> wrote:
>>>> Karthik and I just talked about this yesterday!
>>>>
>>>> http://news.cnet.com/8301-13578_3-10446503-38.html?tag=digg2
>>>>
>>>> Is your web data really safe?
>>>>
>>>> Uh, no.
>>>>
>>>> ---
>>>> Puryear IT, LLC - Baton Rouge, LA - http://www.puryear-it.com/
>>>> Active Directory Integration : Web & Enterprise Single Sign-On
>>>> Identity and Access Management : Linux/UNIX technologies
>>>>
>>>> Download our free ebook "Best Practices for Linux and UNIX Servers"
>>>> http://www.puryear-it.com/pubs/linux-unix-best-practices/
>>>>
>>>>
>>>> _______________________________________________
>>>> General mailing list
>>>> [email protected]
>>>> http://mail.brlug.net/mailman/listinfo/general_brlug.net
>>>>
>>>>
>>>> _______________________________________________
>>>> General mailing list
>>>> [email protected]
>>>> http://mail.brlug.net/mailman/listinfo/general_brlug.net
>>>>
>>>>
>>>> --
>>>>
>>>> Keith Stokes
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> _______________________________________________
>>>> General mailing list
>>>> [email protected]
>>>> http://mail.brlug.net/mailman/listinfo/general_brlug.net
>>>
>>>
>>> _______________________________________________
>>> General mailing list
>>> [email protected]
>>> http://mail.brlug.net/mailman/listinfo/general_brlug.net
>>>
>>> _______________________________________________
>>> General mailing list
>>> [email protected]
>>> http://mail.brlug.net/mailman/listinfo/general_brlug.net
>>
>>
>> _______________________________________________
>> General mailing list
>> [email protected]
>> http://mail.brlug.net/mailman/listinfo/general_brlug.net
>
> _______________________________________________
> General mailing list
> [email protected]
> http://mail.brlug.net/mailman/listinfo/general_brlug.net
>



-- 
Have Mercy & Say Yeah

_______________________________________________
General mailing list
[email protected]
http://mail.brlug.net/mailman/listinfo/general_brlug.net

Reply via email to