That is a logical argument. There is standing law that you must hand over
keys at border crossing so they can examine your data, AFAIK.

Point of my method is destroy the usb device and then there is no way I can
be forced to provide access.

There were comments made years ago about pgp in some case where law enforce
it was asked how to get around pgp their answer was "we used other
information gathering methods to build our case". Translation they could
not get into the data and had to look elsewhere for evidence.
On Nov 30, 2011 3:37 PM, "Winterlight" <[email protected]> wrote:

>
>  You want to secure encryption you don't use password/passphrase, you use
>> randomly generated 1KB key files on a thumbdrive like ironkey. Container
>> on
>> hdd needs keys from ironkey container to be mounted
>>
>
> There is a interesting legal problem with that approach that is working
> it's way through the courts right now. A key that is a  physicall object,
> even one that is on a USB drive, can be legally obtained, and  accessed
> with a simple search warrant. But if a court orders you to give out a
> password that is in your head, you can say no, claiming  fifth amendment
> rights, in that providing the password would provide information that would
> tend to incriminate you. Maybe in ways that have nothing to do with the
> current investigation. It is an interesting case that originated out of
> Colorado. The defendant has refused to provide authorities or the court
> with the password to his encrypted computer claiming fifth amendment
> rights. His attorney has been working his way up to what everybody thinks
> will make it to the Supreme Court.
>

Reply via email to