Unfortunately not. Under The Regulation of Investigatory Powers Act 2000, Part III.BiH-Kira said:Couldn't you just say you don't know how or don't know the password?
They can't prove you know or don't know it.
If they ask you hod you accessed it, you say you had it written on a piece of paper and lost it.
Just asking.![]()
But that means that you're guilty until you prove your self innocent. That's totally against democracy. They should prove me guilty, not the other way around.FrostyChick said:Unfortunately not. Under The Regulation of Investigatory Powers Act 2000, Part III.BiH-Kira said:Couldn't you just say you don't know how or don't know the password?
They can't prove you know or don't know it.
If they ask you hod you accessed it, you say you had it written on a piece of paper and lost it.
Just asking.![]()
It is an offence to refuse to decrypt information when requested to do so by law enforcement.
Failure to provide decrypted information or the keys to read the information can carry a penalty of up to 2 years in prison.
The thing about pleading ignorance is, how do you prove you don't know something in a court of law?
What evidence could one offer up that proves they don't know something other than their word?
It massively sucks as it is very possible for people to go to jail for not knowing how to access an encrypted file on their own system.
It can be massively abused, a point that my IT legislation lecturer loves to bring up.BiH-Kira said:But that means that you're guilty until you prove your self innocent. That's totally against democracy. They should prove me guilty, not the other way around.
IMHO, makes no sense and should be changed ASAP. I know that that could make some cases harder even tho the defendant is obviously guilty, but the current situation can be abused to easily.
It's funny how people like you come here and talk about stuff you literally know NOTHING about.Evil Alpaca said:Its kinda funny how everyone here thinks data encryption means its untouchable. Nothing could be farther from the truth.
1) Decrypting data takes time and I think the FBI wanted to shortcut the process. Since the feds already had warrants for the material, if the man had decrypted the data and then the appeals court overturned the ruling, the data might still be admissible in court since it was obtained under a warrant.
2) If it were a high profile case, don't you think the people at TrueCrypt would help and probably have methods for bypassing their own security. Enough with the doomsday scenarios.
The problem is that he gave them access to the computer and the data. It's not his problem that they don't know how to use/read the data.Therumancer said:The point you, and others, miss here is that in this case there has already been a safeguard imposed. That is to say that the evidence has been seized legally, a judge has already looked this over, and approved the seizure of that computer and data as relevent within the scope of the search. This is about access, not self incrimination, because the evidence has already been approved and entered, which is why it's a contempt issue. This isn't about testimony but a totally differant section of the legal system.
Does the UK even have protection against self-incrimination?Matthew94 said:I hope they do this in the UK too, as far as I know they can force you to unencrypt your data.
Firstly, the bill of rights is different from the constitution. Secondly, the bill of rights has not, nor will it ever be, made irrelevant by the passage of time. It defines what rights the government isn't allowed to infringe upon. What technology is available at the time is irrelevant to those rights. The court system was created partially to make sure that new technology didn't create loopholes, which is exactly what's being done now.Tipsy Giant said:They are irrelevant nowadays, the world is so different today than it was then, they need to write a new constitution, that's right I said it.cobra_ky said:a hard drive can only store binary data, which can be interpreted as text, images, or what have you. In any case, means of encrypting or hiding data, whether visual or textual, has existed for millenia and the Founding Fathers were certainly aware of the methods available to them, as they used them extensively throughout the Revolution.Tipsy Giant said:but only text based information, whereas a hard drive can store more than textcobra_ky said:uh, their encryption was used to pass messages with hidden information in them.Tipsy Giant said:Except that their encryption is for passing on messages and ours is for hiding information of varying descriptioncobra_ky said:The principle is literally identical.Tipsy Giant said:LOL hardly encryption compared to modern standardscobra_ky said:<a href=http://en.wikipedia.org/wiki/Jefferson_disk>The Founding Fathers DID know about encryption.Tipsy Giant said:I love that 'The Founding Fathers' knew about computing and encryption when they wrote the constitution!
Any chance your old document could be slightly irrelevant to a modern day problem *Cough*Bible*Cough*
The pieces of the shredded paper are still in the world, they are not contained in your head. The encryption code IS in your head. They are making you give up a piece of information that may or may not lead to incriminating evidence. A key to a safe isn't a piece of information, it is a physical object that the police have every right to take with a warrant. You equaly cannot tell if it is a drug dealer hiding behind the Bill of Rights, or an innocent man just trying to use the rights he has been given. Innocent before proven guilty, remember that.albino boo said:If you are ordered by a court to produce a printed document you shred it not only are you guilty of contempt the shred document can be put together and used in evidence against you. Why should the process of encryption be treated any different from shredding? It is also clear that he was ordered to by a court after due process. The FBI didn't walk and demand he decrypt without a warrant is the same way that they bugged Rod Blagojevich phone. Why should it be treated any different, in both cases due process occurred. In encryption case he actually knew that and order was beginning potentiality made against him and had an opportunity defend himself in court which is more than Rod Blagojevich had. Why should data held on disk have greater legal protection than the same information held on paper or the same information exchanged by spoken word?Andy Chalk said:You could make the same argument for warrantless phone taps, searches without any sort of probable cause and pretty much anything else. How far are you willing to go in the name of security? What are you willing to sacrifice?albino boo said:But hey data privacy is way more important than protecting the democratic process.
Thanks for the article, interesting read.Athinira said:It's funny how people like you come here and talk about stuff you literally know NOTHING about.Evil Alpaca said:snip
Modern encryption algorithms, the ones employed by TrueCrypt, are so strong that if you employ a strong password (and potentially keyfiles) they can't be cracked within the lifetime of the universe, even if you gathered the earths collective computer power and multiplied it by a trillion. Even quantum computers cannot help bruteforce modern algorithms (their application is in factoring prime-numbers, which can crack public key crypto like RSA, but not symmetrical key crypto like AES, Twofish and Serpent).
Neither the FBI, nor any other organization (NSA, CIA, Russians, Chinese) have the capabilities to crack modern symmetrical key crypto with a proper password/key. And no, the TrueCrypt developers cannot help them either. The system is designed with no backdoors. TrueCrypt is Open-Source, uses well-known encryption algorithms (including AES which the US Government themself use to protect data), and TrueCrypt containers have already been attempted cryptoanalyzed before. They just look like random data.
Edit: Decided to fetch you an article [http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204], that might be able to put things into perspective.
People who actively employ encryption typically don't use cheap passwords. TrueCrypt itself actually warns you if you try to create a container with a password with a length shorter than 20 characters (20 characters is enough to make the password uncrackable within the lifetime of the universe). Now assuming that someone doesn't pick something stupid (like combining the name of their cat with their phone number). Most modern encryption programs activelyEvil Alpaca said:Thanks for the article, interesting read.
Decryption may not be the right word I'm looking for. What would you call figuring out a person's password based on what you know of the individual. I agree that a bruteforce solution to cracking the software is unlikely.
I wasn't trying to say the FBI would crack the software, but that they could find the necessary password key files. Given human tendency for password redundancy and the fact that the feds have the man's hardware, I was thinking in terms of cracking this particular man's software would involve searching through the man's life for figuring out what password and key files he would have picked. That too takes time which could easily be saved if the man gave up his password information.
That is called social engineering or something similar.Evil Alpaca said:Thanks for the article, interesting read.Athinira said:It's funny how people like you come here and talk about stuff you literally know NOTHING about.Evil Alpaca said:snip
Modern encryption algorithms, the ones employed by TrueCrypt, are so strong that if you employ a strong password (and potentially keyfiles) they can't be cracked within the lifetime of the universe, even if you gathered the earths collective computer power and multiplied it by a trillion. Even quantum computers cannot help bruteforce modern algorithms (their application is in factoring prime-numbers, which can crack public key crypto like RSA, but not symmetrical key crypto like AES, Twofish and Serpent).
Neither the FBI, nor any other organization (NSA, CIA, Russians, Chinese) have the capabilities to crack modern symmetrical key crypto with a proper password/key. And no, the TrueCrypt developers cannot help them either. The system is designed with no backdoors. TrueCrypt is Open-Source, uses well-known encryption algorithms (including AES which the US Government themself use to protect data), and TrueCrypt containers have already been attempted cryptoanalyzed before. They just look like random data.
Edit: Decided to fetch you an article [http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204], that might be able to put things into perspective.
Decryption may not be the right word I'm looking for. What would you call figuring out a person's password based on what you know of the individual. I agree that a bruteforce solution to cracking the software is unlikely.
I wasn't trying to say the FBI would crack the software, but that they could find the necessary password key files. Given human tendency for password redundancy and the fact that the feds have the man's hardware, I was thinking in terms of cracking this particular man's software would involve searching through the man's life for figuring out what password and key files he would have picked. That too takes time which could easily be saved if the man gave up his password information.
No. Social Engineering is more like scamming. Like sending an e-mail pretending to be someone else. "hi Danny. I need the password to your computer so i can use it for a while. Love, Mom!"Tubez said:That is called social engineering or something similar.
Because it's better to use a really complicated password and write it down than using a weak password that is easy to remember (and you use elsewhere).Tubez said:And honestly why bother encrypting something if you write the password on a usb stick/notepad? seems a bit stupid tbh![]()
Of course its better to use a complicated password. I just do not see the need to have it written down somewhere for longer then a day at most.Athinira said:No. Social Engineering is more like scamming. Like sending an e-mail pretending to be someone else. "hi Danny. I need the password to your computer so i can use it for a while. Love, Mom!"Tubez said:That is called social engineering or something similar.
Because it's better to use a really complicated password and write it down than using a weak password that is easy to remember (and you use elsewhere).Tubez said:And honestly why bother encrypting something if you write the password on a usb stick/notepad? seems a bit stupid tbh![]()
Once you've learned the complicated password in your sleep, you can destroy whatever you wrote it down on.
Some people really have terrible memories, and will take quite a while to safely learn a long password. Remember, if you encrypt your data and forget your password, it's a really shitty situation for youTubez said:Of course its better to use a complicated password. I just do not see the need to have it written down somewhere for longer then a day at most.