
“The arrest came months after the authorities told a federal judge they were unable to decrypt the drives and needed the defendant to disclose his passwords — pitting the constitutional right against compelled self-incrimination against the government’s need to access data. In June, the authorities urged the court to demand that Feldman fork over his passcodes, saying the suspect could ‘forget his passwords.’ The authorities did not say what type of encryption Feldman used. But the case illustrates that encryption isn’t foolproof and that the authorities are making headway cracking encryption.”
http://www.wired.com/threatlevel/2013/08/feds-crack-encrypted-drives/
Related posts:
Target confirms up to 40 million credit and debit cards are at risk
Jim Rogers: If You Want to Make Money, Become a Farmer
Wash. state bill allows police to search students without parental consent
Vermont Becomes the 17th State to Decriminalize Marijuana
Man tries to float from Mexico to U.S. on duffel bag filled with pot
Outrage in Missouri: Teacher to be Fired for using Free-Market Materials
I Bought Subway With Bitcoin and It Was Awesome
Armed Bounty Hunters Storm Fancy Miami Beach Gym
Israeli Bombs Over Syria, Part Two
A Helping Hand for Bernanke and Co.
Supreme Court puts TV-over-Internet startup Aereo out of business
Activists converge on Rahm Emanuel’s home for Fourth of July protest
Two Dark Money Groups Outspending All Super PACs Combined
How Obama Officials Cried ‘Terrorism’ to Cover Up a Paperwork Error
Massachusetts: Police Cannot Search Nervous Motorists