
“The arrest came months after the authorities told a federal judge they were unable to decrypt the drives and needed the defendant to disclose his passwords — pitting the constitutional right against compelled self-incrimination against the government’s need to access data. In June, the authorities urged the court to demand that Feldman fork over his passcodes, saying the suspect could ‘forget his passwords.’ The authorities did not say what type of encryption Feldman used. But the case illustrates that encryption isn’t foolproof and that the authorities are making headway cracking encryption.”
http://www.wired.com/threatlevel/2013/08/feds-crack-encrypted-drives/
Related posts:
The Best Enemy Money Can Buy
Cisco Won't Buy Any US Companies Or Hire Any US Workers Until The Tax Code Is Changed
Student Expelled After Investigation By Cop Who Was Dating His Girlfriend
China’s Shadow Currency Addiction: ‘The Mother of All Bubbles’
Inhofe seeks hearings addressing the EPA's monstrous "illegal human experiments"
South Korea's Crypto Craze Explained by Seoul's Largest Investor
Former MSNBC host Dylan Ratigan, now organic farmer, thanks marijuana growers for hydroponics
Sgt. Bales sentenced to life in prison without parole for Afghan massacre
Hawaii's Forgotten Internment Camps
The richest man in Asia is selling everything in China
Heavy Smog In China Blocked Out Everything But A Giant TV Screen
What’s the Difference Between Romneycare and Obamacare?
Rentalutions enables US residents to pay rent in bitcoins
This Company Saved Money By Tracking Employees With Fitbits
Wells Fargo Lays Off Mortgage Workers. Why? Rising Rates.