When I read that article I was thinking, what if I "forgot" my decryption pw! ha!
On Thu, Feb 4, 2010 at 11:07 AM, Keith Stokes <kei...@neill.net> wrote: > Force wasn't quite the right word. They can request the key and if > they don't get it your closet door ends up in the front yard. > > > I would see the same outcome for decrypting. They might have tobdobthe > legwork but bet the FBI guys have better decryption systems than the > rest of us. > > -- > > Keith Stokes > > On Feb 4, 2010, at 11:02 AM, Karthik Poobalasubramanian <kart...@poobal.net > > wrote: > >> Good summarization Dustin. >> Also, if cops have a warrant to the house and no keys to the locked >> closet, won't just break the lock than force someone to give them >> the keys? Shouldn't the same thing apply to decrypting the hard drive? >> >> When its a child porn case, the grey area just gets wider. >> >> -- >> Karthik Poobalasubramanian >> Louisiana Board of Regents >> kart...@poobal.net >> kart...@la.gov >> (225) 341-5855 >> skype: poobal >> >> >> On Feb 4, 2010, at 10:27 AM, Dustin Puryear wrote: >> >>> To sum up that article: A guy was forced by a judge to decrypt his >>> hard-drive for a child porn case. The ACLU and others feel that being >>> forced to decrypt your hard-drive to provide evidence violates the >>> Fifth >>> Amendment (see >>> http://law.jrank.org/pages/6880/Fifth-Amendment-Self-Incrimination-Claus >>> e.html). >>> >>> Interesting case. >>> >>> To me, that is a violation of the Fifth Amendment. >>> >>> If I have a notebook that includes supposed proof that I committed a >>> crime, the police have the right to use that against me. Fine. >>> However, >>> they can't force me to tell them where it is or even that I know of >>> its >>> existence, AFAIK. >>> >>> How is decrypting your hard-drive any different? >>> >>> --- >>> Puryear IT, LLC - Baton Rouge, LA - http://www.puryear-it.com/ >>> Active Directory Integration : Web & Enterprise Single Sign-On >>> Identity and Access Management : Linux/UNIX technologies >>> >>> Download our free ebook "Best Practices for Linux and UNIX Servers" >>> http://www.puryear-it.com/pubs/linux-unix-best-practices/ >>> >>> -----Original Message----- >>> From: general-boun...@brlug.net [mailto:general-boun...@brlug.net] On >>> Behalf Of Karthik Poobalasubramanian >>> Sent: Thursday, February 04, 2010 10:15 AM >>> To: general@brlug.net >>> Subject: Re: [brlug-general] Police to get more access to your data? >>> >>> Except when you get forced to reveal you private key to decrypt your >>> data. >>> >>> http://news.cnet.com/8301-13578_3-10172866-38.html >>> >>> >>> -- >>> Karthik Poobalasubramanian >>> Louisiana Board of Regents >>> kart...@poobal.net >>> kart...@la.gov >>> (225) 341-5855 >>> skype: poobal >>> >>> >>> On Feb 4, 2010, at 10:12 AM, Dustin Puryear wrote: >>> >>>> Encrypted data is the only real way I suppose. >>>> >>>> --- >>>> Puryear IT, LLC - Baton Rouge, LA - http://www.puryear-it.com/ >>>> Active Directory Integration : Web & Enterprise Single Sign-On >>>> Identity and Access Management : Linux/UNIX technologies >>>> >>>> Download our free ebook "Best Practices for Linux and UNIX Servers" >>>> http://www.puryear-it.com/pubs/linux-unix-best-practices/ >>>> >>>> From: general-boun...@brlug.net [mailto:general-boun...@brlug.net] >>>> On >>> Behalf Of Keith Stokes >>>> Sent: Thursday, February 04, 2010 9:22 AM >>>> To: general@brlug.net >>>> Subject: Re: [brlug-general] Police to get more access to your data? >>>> >>>> It probably doesn't exist. >>>> >>>> On Feb 4, 2010, at 9:19 AM, Tim Fournet wrote: >>>> >>>> >>>> So, what exactly is the "safe from police" way to store data? >>>> >>>> >>>> On Thu, Feb 4, 2010 at 9:10 AM, Dustin Puryear >>> <dpury...@puryear-it.com> wrote: >>>> Karthik and I just talked about this yesterday! >>>> >>>> http://news.cnet.com/8301-13578_3-10446503-38.html?tag=digg2 >>>> >>>> Is your web data really safe? >>>> >>>> Uh, no. >>>> >>>> --- >>>> Puryear IT, LLC - Baton Rouge, LA - http://www.puryear-it.com/ >>>> Active Directory Integration : Web & Enterprise Single Sign-On >>>> Identity and Access Management : Linux/UNIX technologies >>>> >>>> Download our free ebook "Best Practices for Linux and UNIX Servers" >>>> http://www.puryear-it.com/pubs/linux-unix-best-practices/ >>>> >>>> >>>> _______________________________________________ >>>> General mailing list >>>> General@brlug.net >>>> http://mail.brlug.net/mailman/listinfo/general_brlug.net >>>> >>>> >>>> _______________________________________________ >>>> General mailing list >>>> General@brlug.net >>>> http://mail.brlug.net/mailman/listinfo/general_brlug.net >>>> >>>> >>>> -- >>>> >>>> Keith Stokes >>>> >>>> >>>> >>>> >>>> >>>> _______________________________________________ >>>> General mailing list >>>> General@brlug.net >>>> http://mail.brlug.net/mailman/listinfo/general_brlug.net >>> >>> >>> _______________________________________________ >>> General mailing list >>> General@brlug.net >>> http://mail.brlug.net/mailman/listinfo/general_brlug.net >>> >>> _______________________________________________ >>> General mailing list >>> General@brlug.net >>> http://mail.brlug.net/mailman/listinfo/general_brlug.net >> >> >> _______________________________________________ >> General mailing list >> General@brlug.net >> http://mail.brlug.net/mailman/listinfo/general_brlug.net > > _______________________________________________ > General mailing list > General@brlug.net > http://mail.brlug.net/mailman/listinfo/general_brlug.net > -- Have Mercy & Say Yeah _______________________________________________ General mailing list General@brlug.net http://mail.brlug.net/mailman/listinfo/general_brlug.net