When I read that article I was thinking, what if I "forgot" my decryption pw! ha!
On Thu, Feb 4, 2010 at 11:07 AM, Keith Stokes <[email protected]> wrote: > Force wasn't quite the right word. They can request the key and if > they don't get it your closet door ends up in the front yard. > > > I would see the same outcome for decrypting. They might have tobdobthe > legwork but bet the FBI guys have better decryption systems than the > rest of us. > > -- > > Keith Stokes > > On Feb 4, 2010, at 11:02 AM, Karthik Poobalasubramanian <[email protected] > > wrote: > >> Good summarization Dustin. >> Also, if cops have a warrant to the house and no keys to the locked >> closet, won't just break the lock than force someone to give them >> the keys? Shouldn't the same thing apply to decrypting the hard drive? >> >> When its a child porn case, the grey area just gets wider. >> >> -- >> Karthik Poobalasubramanian >> Louisiana Board of Regents >> [email protected] >> [email protected] >> (225) 341-5855 >> skype: poobal >> >> >> On Feb 4, 2010, at 10:27 AM, Dustin Puryear wrote: >> >>> To sum up that article: A guy was forced by a judge to decrypt his >>> hard-drive for a child porn case. The ACLU and others feel that being >>> forced to decrypt your hard-drive to provide evidence violates the >>> Fifth >>> Amendment (see >>> http://law.jrank.org/pages/6880/Fifth-Amendment-Self-Incrimination-Claus >>> e.html). >>> >>> Interesting case. >>> >>> To me, that is a violation of the Fifth Amendment. >>> >>> If I have a notebook that includes supposed proof that I committed a >>> crime, the police have the right to use that against me. Fine. >>> However, >>> they can't force me to tell them where it is or even that I know of >>> its >>> existence, AFAIK. >>> >>> How is decrypting your hard-drive any different? >>> >>> --- >>> Puryear IT, LLC - Baton Rouge, LA - http://www.puryear-it.com/ >>> Active Directory Integration : Web & Enterprise Single Sign-On >>> Identity and Access Management : Linux/UNIX technologies >>> >>> Download our free ebook "Best Practices for Linux and UNIX Servers" >>> http://www.puryear-it.com/pubs/linux-unix-best-practices/ >>> >>> -----Original Message----- >>> From: [email protected] [mailto:[email protected]] On >>> Behalf Of Karthik Poobalasubramanian >>> Sent: Thursday, February 04, 2010 10:15 AM >>> To: [email protected] >>> Subject: Re: [brlug-general] Police to get more access to your data? >>> >>> Except when you get forced to reveal you private key to decrypt your >>> data. >>> >>> http://news.cnet.com/8301-13578_3-10172866-38.html >>> >>> >>> -- >>> Karthik Poobalasubramanian >>> Louisiana Board of Regents >>> [email protected] >>> [email protected] >>> (225) 341-5855 >>> skype: poobal >>> >>> >>> On Feb 4, 2010, at 10:12 AM, Dustin Puryear wrote: >>> >>>> Encrypted data is the only real way I suppose. >>>> >>>> --- >>>> Puryear IT, LLC - Baton Rouge, LA - http://www.puryear-it.com/ >>>> Active Directory Integration : Web & Enterprise Single Sign-On >>>> Identity and Access Management : Linux/UNIX technologies >>>> >>>> Download our free ebook "Best Practices for Linux and UNIX Servers" >>>> http://www.puryear-it.com/pubs/linux-unix-best-practices/ >>>> >>>> From: [email protected] [mailto:[email protected]] >>>> On >>> Behalf Of Keith Stokes >>>> Sent: Thursday, February 04, 2010 9:22 AM >>>> To: [email protected] >>>> Subject: Re: [brlug-general] Police to get more access to your data? >>>> >>>> It probably doesn't exist. >>>> >>>> On Feb 4, 2010, at 9:19 AM, Tim Fournet wrote: >>>> >>>> >>>> So, what exactly is the "safe from police" way to store data? >>>> >>>> >>>> On Thu, Feb 4, 2010 at 9:10 AM, Dustin Puryear >>> <[email protected]> wrote: >>>> Karthik and I just talked about this yesterday! >>>> >>>> http://news.cnet.com/8301-13578_3-10446503-38.html?tag=digg2 >>>> >>>> Is your web data really safe? >>>> >>>> Uh, no. >>>> >>>> --- >>>> Puryear IT, LLC - Baton Rouge, LA - http://www.puryear-it.com/ >>>> Active Directory Integration : Web & Enterprise Single Sign-On >>>> Identity and Access Management : Linux/UNIX technologies >>>> >>>> Download our free ebook "Best Practices for Linux and UNIX Servers" >>>> http://www.puryear-it.com/pubs/linux-unix-best-practices/ >>>> >>>> >>>> _______________________________________________ >>>> General mailing list >>>> [email protected] >>>> http://mail.brlug.net/mailman/listinfo/general_brlug.net >>>> >>>> >>>> _______________________________________________ >>>> General mailing list >>>> [email protected] >>>> http://mail.brlug.net/mailman/listinfo/general_brlug.net >>>> >>>> >>>> -- >>>> >>>> Keith Stokes >>>> >>>> >>>> >>>> >>>> >>>> _______________________________________________ >>>> General mailing list >>>> [email protected] >>>> http://mail.brlug.net/mailman/listinfo/general_brlug.net >>> >>> >>> _______________________________________________ >>> General mailing list >>> [email protected] >>> http://mail.brlug.net/mailman/listinfo/general_brlug.net >>> >>> _______________________________________________ >>> General mailing list >>> [email protected] >>> http://mail.brlug.net/mailman/listinfo/general_brlug.net >> >> >> _______________________________________________ >> General mailing list >> [email protected] >> http://mail.brlug.net/mailman/listinfo/general_brlug.net > > _______________________________________________ > General mailing list > [email protected] > http://mail.brlug.net/mailman/listinfo/general_brlug.net > -- Have Mercy & Say Yeah _______________________________________________ General mailing list [email protected] http://mail.brlug.net/mailman/listinfo/general_brlug.net
