“The arrest came months after the authorities told a federal judge they were unable to decrypt the drives and needed the defendant to disclose his passwords — pitting the constitutional right against compelled self-incrimination against the government’s need to access data. In June, the authorities urged the court to demand that Feldman fork over his passcodes, saying the suspect could ‘forget his passwords.’ The authorities did not say what type of encryption Feldman used. But the case illustrates that encryption isn’t foolproof and that the authorities are making headway cracking encryption.”
http://www.wired.com/threatlevel/2013/08/feds-crack-encrypted-drives/
Related posts:
Ron Paul: The Economics of Disaster
TSA Harasses Ron Paul and His Wife in Florida
Louisiana Deputies Bust Gays with Unconstitutional Sodomy Law
Gold and Silver Coins in Arizona May Become Legal Tender
Security audit finds developer outsourced his 9-5 job to China to goof off at work
Murder Mystery? Michael Hastings and a CyberSecurity Firm Called Endgame
Peak Cantillon Effect: Swiss National Bank Prints Its Way To Prosperity
Dutch Government Investigates Inaccurate Photo Speed Tickets
Your Tax Dollars at Work: Medicare Financing Plastic Surgery
Finally, Some Good News about FATCA
WikiLeaks: Snowden Risks Being Stuck in Russia 'Permanently'
International Tax Evasion Crackdown: Slow, Tricky, And Only First Step
Argentina Turns To Gold As Inflation Tops 26%
Survey: Quarter Of US Consumers Has Heard Of Bitcoin — And Majority Of Them Trust It
Ukraine Security Chief Blasted for Targeting Jews