
“The arrest came months after the authorities told a federal judge they were unable to decrypt the drives and needed the defendant to disclose his passwords — pitting the constitutional right against compelled self-incrimination against the government’s need to access data. In June, the authorities urged the court to demand that Feldman fork over his passcodes, saying the suspect could ‘forget his passwords.’ The authorities did not say what type of encryption Feldman used. But the case illustrates that encryption isn’t foolproof and that the authorities are making headway cracking encryption.”
http://www.wired.com/threatlevel/2013/08/feds-crack-encrypted-drives/
Related posts:
Iran Vows "Immediate Destruction Of Israel" If Syria Attacked
Robert Parry: Can MSM Handle the Contra-Cocaine Truth?
WaPo and Bezos: The Hope and the Reality
China Accounts For Nearly Half Of World's New Money Supply Since 2005
What's An American To Do?
University of Nicosia Receives First Tuition Payment Using Bitcoin
Marc Faber: Massive Financial Crisis May Be Coming
UK deploys toy-sized spy drones in Afghanistan
Precious Metals True To Form As Markets Wake To Reality
Now Mexico Bans Cash Transactions
Man Threatened By SF Cops For Holding 'John 3:16' Sign in Front of Ballpark
IMF Discusses A Super Tax Of 10% On All Savings In Eurozone
DEA paid Amtrak secretary $854,460 for data available to it for free
The Hyperloop: Elon Musk’s futuristic plan to blast Californians through a tube
To Be A Domestic Terrorist, Set Animals Free