
“The arrest came months after the authorities told a federal judge they were unable to decrypt the drives and needed the defendant to disclose his passwords — pitting the constitutional right against compelled self-incrimination against the government’s need to access data. In June, the authorities urged the court to demand that Feldman fork over his passcodes, saying the suspect could ‘forget his passwords.’ The authorities did not say what type of encryption Feldman used. But the case illustrates that encryption isn’t foolproof and that the authorities are making headway cracking encryption.”
http://www.wired.com/threatlevel/2013/08/feds-crack-encrypted-drives/
Related posts:
The Next Domino: Slovenia Government Bond Yields Spike
LAPD Spied on 21 Using StingRay Anti-Terrorism Tool
Bill Bonner: This Credit Event Could Crush the Stock Market
France will no longer cut off Internet for illegal downloading
The Dark Side of the iPhone 5S Lines
Treasury Delays Obamacare Implementation For Businesses Until 2015
U.S. Navy caught spying on whole state of Washington
Why Is the U.S. Funding International Drug Rehabs Known for Torture and Abuse?
Ohio nuclear plant finds radioactive goldfish in lemonade pitcher with reactor water
Litecoin, Dogecoin ATMs Launching This Week in Mexico
Who Are the Monarchs of Money?
Germany’s Green-Energy Disaster
FinCEN Fines Ripple Labs for Bank Secrecy Act Violations
Texas Governor Candidate Welcomes 'Bitcoin Community' to Campaign
The Path to $10,000 an Ounce Gold, Revisited