“The arrest came months after the authorities told a federal judge they were unable to decrypt the drives and needed the defendant to disclose his passwords — pitting the constitutional right against compelled self-incrimination against the government’s need to access data. In June, the authorities urged the court to demand that Feldman fork over his passcodes, saying the suspect could ‘forget his passwords.’ The authorities did not say what type of encryption Feldman used. But the case illustrates that encryption isn’t foolproof and that the authorities are making headway cracking encryption.”
http://www.wired.com/threatlevel/2013/08/feds-crack-encrypted-drives/
Related posts:
Breaking the NSA Spy Ring: “What Rule of Law” Would Look Like
Suspension of U.S.-EU Visa-Free Travel Would Have Negative Consequences
Arizona legislators authorize gold and silver as legal tender, again
The Privileged Poacher on the Police Payroll
Americans: One Divorce You'll Never Get
Marijuana By Itself Not a Significant Factor in Fatal and Injury Crashes in 2012
5 GMO Myths Busted
Why bitcoin has a firm foothold in the online gambling world
The End of the Battery – Getting All Charged Up over Supercapacitors
Student Debt Bubble Officially Pops; 90+ Day Delinquency Rate Goes Parabolic
Ballot initiative looks to save Los Angeles pot shops
Hannity Then and Now on NSA Surveillance
Portrait of a Bitcoin miner: How one man made $192K in virtual currency
Shakil Khan: Bitcoin can be “money over IP”, but services must get more intuitive
Pennsylvania police chief suspended over profanity-laced, anti-liberal gun videos