
“The arrest came months after the authorities told a federal judge they were unable to decrypt the drives and needed the defendant to disclose his passwords — pitting the constitutional right against compelled self-incrimination against the government’s need to access data. In June, the authorities urged the court to demand that Feldman fork over his passcodes, saying the suspect could ‘forget his passwords.’ The authorities did not say what type of encryption Feldman used. But the case illustrates that encryption isn’t foolproof and that the authorities are making headway cracking encryption.”
http://www.wired.com/threatlevel/2013/08/feds-crack-encrypted-drives/
Related posts:
Oklahoma Parking Lot Patriots Kicked to the Curb by the Republican National Committee
The Empire’s Next Effort to Extract Your Wealth
Top five American cities with most Bitcoin-friendly merchants
Court Orders YouTube To Delete Every Copy Of 'Innocence Of Muslims'
A New Backdoor Around the Fourth Amendment: The CLOUD Act
Snowden Is No Traitor: 55% to 34%
Children 'Traumatized and Re-Traumatized by Drones' in Yemen
Police Nationwide Say “You’re On Your Own”
Bradley Manning’s trial is no more than a ‘judicial lynching’
Woman jailed for late-night water purchase after anti-sexual assault rally
Justin Raimondo: Why the Korean ‘Crisis’ Is Completely Phony
Police hid use of cell phone tracking device from judge because of NDA
Is Switzerland Still Open to Americans?
Controversial Florida pastor Terry Jones arrested for kerosene-soaked Korans
Google Launches Same-Day Delivery in San Francisco Bay Area