When I read that article I was thinking, what if I "forgot" my
decryption pw! ha!

On Thu, Feb 4, 2010 at 11:07 AM, Keith Stokes <kei...@neill.net> wrote:
> Force wasn't quite the right word. They can request the key and if
> they don't get it your closet door ends up in the front yard.
>
>
> I would see the same outcome for decrypting. They might have tobdobthe
> legwork but bet the FBI guys have better decryption systems than the
> rest of us.
>
> --
>
> Keith Stokes
>
> On Feb 4, 2010, at 11:02 AM, Karthik Poobalasubramanian <kart...@poobal.net
>  > wrote:
>
>> Good summarization Dustin.
>> Also, if cops have a warrant to the house and no keys to the locked
>> closet, won't just break the lock than force someone to give them
>> the keys? Shouldn't the same thing apply to decrypting the hard drive?
>>
>> When its a child porn case, the grey area just gets wider.
>>
>> --
>> Karthik Poobalasubramanian
>> Louisiana Board of Regents
>> kart...@poobal.net
>> kart...@la.gov
>> (225) 341-5855
>> skype: poobal
>>
>>
>> On Feb 4, 2010, at 10:27 AM, Dustin Puryear wrote:
>>
>>> To sum up that article: A guy was forced by a judge to decrypt his
>>> hard-drive for a child porn case. The ACLU and others feel that being
>>> forced to decrypt your hard-drive to provide evidence violates the
>>> Fifth
>>> Amendment (see
>>> http://law.jrank.org/pages/6880/Fifth-Amendment-Self-Incrimination-Claus
>>> e.html).
>>>
>>> Interesting case.
>>>
>>> To me, that is a violation of the Fifth Amendment.
>>>
>>> If I have a notebook that includes supposed proof that I committed a
>>> crime, the police have the right to use that against me. Fine.
>>> However,
>>> they can't force me to tell them where it is or even that I know of
>>> its
>>> existence, AFAIK.
>>>
>>> How is decrypting your hard-drive any different?
>>>
>>> ---
>>> Puryear IT, LLC - Baton Rouge, LA - http://www.puryear-it.com/
>>> Active Directory Integration : Web & Enterprise Single Sign-On
>>> Identity and Access Management : Linux/UNIX technologies
>>>
>>> Download our free ebook "Best Practices for Linux and UNIX Servers"
>>> http://www.puryear-it.com/pubs/linux-unix-best-practices/
>>>
>>> -----Original Message-----
>>> From: general-boun...@brlug.net [mailto:general-boun...@brlug.net] On
>>> Behalf Of Karthik Poobalasubramanian
>>> Sent: Thursday, February 04, 2010 10:15 AM
>>> To: general@brlug.net
>>> Subject: Re: [brlug-general] Police to get more access to your data?
>>>
>>> Except when you get forced to reveal you private key to decrypt your
>>> data.
>>>
>>> http://news.cnet.com/8301-13578_3-10172866-38.html
>>>
>>>
>>> --
>>> Karthik Poobalasubramanian
>>> Louisiana Board of Regents
>>> kart...@poobal.net
>>> kart...@la.gov
>>> (225) 341-5855
>>> skype: poobal
>>>
>>>
>>> On Feb 4, 2010, at 10:12 AM, Dustin Puryear wrote:
>>>
>>>> Encrypted data is the only real way I suppose.
>>>>
>>>> ---
>>>> Puryear IT, LLC - Baton Rouge, LA - http://www.puryear-it.com/
>>>> Active Directory Integration : Web & Enterprise Single Sign-On
>>>> Identity and Access Management : Linux/UNIX technologies
>>>>
>>>> Download our free ebook "Best Practices for Linux and UNIX Servers"
>>>> http://www.puryear-it.com/pubs/linux-unix-best-practices/
>>>>
>>>> From: general-boun...@brlug.net [mailto:general-boun...@brlug.net]
>>>> On
>>> Behalf Of Keith Stokes
>>>> Sent: Thursday, February 04, 2010 9:22 AM
>>>> To: general@brlug.net
>>>> Subject: Re: [brlug-general] Police to get more access to your data?
>>>>
>>>> It probably doesn't exist.
>>>>
>>>> On Feb 4, 2010, at 9:19 AM, Tim Fournet wrote:
>>>>
>>>>
>>>> So, what exactly is the "safe from police" way to store data?
>>>>
>>>>
>>>> On Thu, Feb 4, 2010 at 9:10 AM, Dustin Puryear
>>> <dpury...@puryear-it.com> wrote:
>>>> Karthik and I just talked about this yesterday!
>>>>
>>>> http://news.cnet.com/8301-13578_3-10446503-38.html?tag=digg2
>>>>
>>>> Is your web data really safe?
>>>>
>>>> Uh, no.
>>>>
>>>> ---
>>>> Puryear IT, LLC - Baton Rouge, LA - http://www.puryear-it.com/
>>>> Active Directory Integration : Web & Enterprise Single Sign-On
>>>> Identity and Access Management : Linux/UNIX technologies
>>>>
>>>> Download our free ebook "Best Practices for Linux and UNIX Servers"
>>>> http://www.puryear-it.com/pubs/linux-unix-best-practices/
>>>>
>>>>
>>>> _______________________________________________
>>>> General mailing list
>>>> General@brlug.net
>>>> http://mail.brlug.net/mailman/listinfo/general_brlug.net
>>>>
>>>>
>>>> _______________________________________________
>>>> General mailing list
>>>> General@brlug.net
>>>> http://mail.brlug.net/mailman/listinfo/general_brlug.net
>>>>
>>>>
>>>> --
>>>>
>>>> Keith Stokes
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> _______________________________________________
>>>> General mailing list
>>>> General@brlug.net
>>>> http://mail.brlug.net/mailman/listinfo/general_brlug.net
>>>
>>>
>>> _______________________________________________
>>> General mailing list
>>> General@brlug.net
>>> http://mail.brlug.net/mailman/listinfo/general_brlug.net
>>>
>>> _______________________________________________
>>> General mailing list
>>> General@brlug.net
>>> http://mail.brlug.net/mailman/listinfo/general_brlug.net
>>
>>
>> _______________________________________________
>> General mailing list
>> General@brlug.net
>> http://mail.brlug.net/mailman/listinfo/general_brlug.net
>
> _______________________________________________
> General mailing list
> General@brlug.net
> http://mail.brlug.net/mailman/listinfo/general_brlug.net
>



-- 
Have Mercy & Say Yeah

_______________________________________________
General mailing list
General@brlug.net
http://mail.brlug.net/mailman/listinfo/general_brlug.net

Reply via email to