“The arrest came months after the authorities told a federal judge they were unable to decrypt the drives and needed the defendant to disclose his passwords — pitting the constitutional right against compelled self-incrimination against the government’s need to access data. In June, the authorities urged the court to demand that Feldman fork over his passcodes, saying the suspect could ‘forget his passwords.’ The authorities did not say what type of encryption Feldman used. But the case illustrates that encryption isn’t foolproof and that the authorities are making headway cracking encryption.”
http://www.wired.com/threatlevel/2013/08/feds-crack-encrypted-drives/
(Visited 78 times, 1 visits today)
Related posts:
Evidence Snowden is Being Protected By the CIA?
Idaho Adopts Khan’s Free Online Academy
Bono: “Capitalism takes more people out of poverty than aid”
Ex-Marine Arrested for Wearing Wrong T-Shirt at Supreme Court
Let’s Look a Little More Closely at What Bernanke Told Congress
Bank of Canada Admits Recession, The Solution: More Bubbles
Bitcoin is political, deal with it. Welcome to Dark Wallet
Police now accompanying Smart Meter installations: Two homeowners arrested for saying NO
Iowa Troopers Steal $100,000 in Poker Winnings From Two Drivers
Trump doesn’t want ISIS “using our Internet”
Google: Gmail users ‘have no legitimate expectation of privacy’
Just Six Percent Of Americans Want Jail Time For Marijuana Users
The Nine States with the Most Underfunded Pensions
How the Pentagon Enlisted Trump to Continue Its Perpetual "War on Terror"
Philip Giraldi: The USS Liberty Wins One!