Kaydol

Flood göndermek, insanların floodlarını okumak ve diğer insanlarla bağlantı kurmak için sosyal Floodlar ve Flood Yanıtları Motorumuza kaydolun.

Oturum aç

Flood göndermek, insanların floodlarını okumak ve diğer insanlarla bağlantı kurmak için sosyal Floodlar ve Flood Yanıtları Motorumuza giriş yapın.

Şifremi hatırlamıyorum

Şifreni mi unuttun? Lütfen e-mail adresinizi giriniz. Bir bağlantı alacaksınız ve e-posta yoluyla yeni bir şifre oluşturacaksınız.

3 ve kadim dostu 1 olan sj'yi rakamla giriniz. ( 31 )

Üzgünüz, Flood yazma yetkiniz yok, Flood girmek için giriş yapmalısınız.

Lütfen bu Floodun neden bildirilmesi gerektiğini düşündüğünüzü kısaca açıklayın.

Lütfen bu cevabın neden bildirilmesi gerektiğini kısaca açıklayın.

Please briefly explain why you feel this user should be reported.

Reminder that US police can hold you in prison indefinitely without charging you if you refuse to decrypt hard drives.

Reminder that US police can hold you in prison indefinitely without charging you if you refuse to decrypt hard drives.

Benzer Yazılar

Yorum eklemek için giriş yapmalısınız.

26 Yorumları

  1. >**Reminder that US police can hold you in prison indefinitely without charging you if you refuse to decrypt hard drives.**

    **The court can; the police can’t.**

    There is a very important distinction between the power of the court and the power of the police. Police have no authority to compel you to decrypt a hard drive or even to view the contents of an unencrypted hard drive without an order from the court.

  2. I’m sorry what?
    I think the US has to evolve a bit to call itself democratic again. How can it be that you they literally hold you until you incriminate yourself?!
    Sorry but the democracy in the US is a bad joke compared to most europea countries (and many of them aren’t perfect either)

  3. Should have used Vera Crypt with hidden volume encryption (dunno if Vera Crypt supports it like the original True Crypt). In this case you create a file that’s actually 2 volumes except for one being hidden and only revealed if you use the other password – otherwise it remains invisible, you can simply give the password for the fake volume even if that will compromise the hidden volume.

  4. How do they prove that files are encrypted, out of interest? Couldn’t you just claim to be storing a shit ton of completely random data on your drive?

  5. hmmm… I wonder if there are any encryption programs with duilt in deletion options. Like password A unlocks data. Password B deletes it all. (yes yes, deleted data really isnt deleted, that takes time to wipe and overwrite, and if they are worth their salt, they have drive copies already made to avoid that.)

  6. Meh, a judge just ruled somewhere that refusing to decrypt was covered by the 5th amendment so who knows. Who knows though.

    Buy a yacht. Become a country. Make your own rules.

  7. As a potential workaround .. would it work to keep all your personal documents on your own ultra-secure, encrypted cloud server? So on your laptop you actually only have the applications, but absolutely no documents etc.

  8. “Officer, I’m sorry, I would help you if I could, but I forgot my password”

  9. Hang on this article is 2 years old and ~~the~~ a different ruling was just overturned by the Pennsylvania Supreme Court https://arstechnica.com/tech-policy/2019/11/police-cant-force-child-porn-suspect-to-reveal-his-password-court-rules/

    EDIT: The cases were so similar I didn’t even notice they were different defendants and jurisdictions… still kind of goes to show the case law around this isn’t settled yet

  10. From the article:

    > The courts also concluded that it was a “foregone conclusion” that kid porn was on the drives because a forensic examination revealed that the “hash” values of the files have been linked by the authorities to known child pornography.

    So wait…. If the child porn is a foregone conclusions, then why put the defendant though contempt of court? Why not just prosecute him, it’s “foregone”, and if they have hash values is that not enough evidence? Wouldn’t that make the contempt of court charge excessive?

    Don’t get me wrong, child porn is terrible, and the guy should be thrown in jail forever… but either we got evidence on him, or not…. and it’s pretty clear cut to me. He cannot be forced to testify against himself, but that is exactly what they are trying to do. And yet, they have the hash values, so they can create a nexus from the porn to the hash values… and, if they know these values, they have the evidence already, right? They are “known” values… so the defence could simply convince court to generate the evidence from the FBI evidence they apparently keep to themselves.

  11. The key point in the case, “The courts also concluded that it was a “foregone conclusion” that kid porn was on the drives because a forensic examination revealed that the “hash” values of the files have been linked by the authorities to known child pornography.”

    If they have multiple hashes that match up and we’re talking about cryptographically secure values, then it’s more than likely (it’s a mathematical certainty) that he has child porn. Why they haven’t used this to sentence him is another question.

  12. Pardon my enormous ignorance: there’s absolutely, definitely no way, AT ALL, that the USA intelligence services can decrypt the hard drives? I have always wanted to know, and I’m very curious.

    Edit: I’ve read all the replies, big shout out to all of you who helped cleared this out of my mind. You the MVPs.

  13. What a moral dillema.

    On one hand, taking a stance against actions against person’s like that is great. We have rights that must be upheld.

    On the other hand, dude is at the center of a CP investigation and refuses to decrypt his drives? Screams guilt so you would want to see them decrypted.

  14. 1) Why are these stories never about bitlocker or linux FDE? It’s always an apple device – a phone or a hard drive.

    Do people not use the others, or do they have backdoors? (I’m prepared to believe no-one uses desktop linux with encryption. I do and it breaks a lot of things so I know it’s not common even in linux land).

    2) How do you identify files by the hash from an encrypted hard drive?

    Assuming it wasn’t full disk, and just the files were encrypted, any hash would be the hash of the encrypted file. You don’t know what’s in that file without the key.

  15. I still wouldn’t decrypt. Fuck them, I hope he gets out.