“The arrest came months after the authorities told a federal judge they were unable to decrypt the drives and needed the defendant to disclose his passwords — pitting the constitutional right against compelled self-incrimination against the government’s need to access data. In June, the authorities urged the court to demand that Feldman fork over his passcodes, saying the suspect could ‘forget his passwords.’ The authorities did not say what type of encryption Feldman used. But the case illustrates that encryption isn’t foolproof and that the authorities are making headway cracking encryption.”
http://www.wired.com/threatlevel/2013/08/feds-crack-encrypted-drives/
Related posts:
Chicago Speed Cameras to Photograph Children?
Even who we’re in a drone war with is classified
The Debt Transfer Game; Slovakia Needs EUR 264M for ESM
The Failing War on Drugs, the Benefits of Natural Cannabis Cultivation
Singaporean photographer Leslie Kee arrested for selling art book containing uncensored genitalia
Missouri man arrested at hospital for refusing to leave gay partner
Gold: The One Commodity Buffett and Bernanke Just Don’t Understand
Accused of War Crimes, White House Closes Down War Crimes Office
Russia Restructures Cyprus Debt; Cyprus Prohibits US Strikes On Syria
Obama To College Grads: Reject Voices That Warn About Government Tyranny
Obama Bombs Yemen Hours After Winning Reelection
After JFK was killed, Truman letter called for the abolition of CIA covert ops
How the Federal Reserve Just Hid Important Data
Man Charged with Murder After Cop Wrecks Trying to Give Him Ticket
Has Bitcoin Finally Arrived?