What if you don't remember them?
What if you don't remember them?
Last edited by onearmedbandit; 20th December 2010 at 23:49.
so the logical conclusion of that is a jail full of child pr0n owners who "forgot"their passwords
which throws up an interesting question-at what stage of disc data recovery(assuming a password has not been forthcoming) does a fragmented bunch of data become a crime?
"more than two strokes is masturbation"
www.motoparts-online.com
Nope - we don't have a constitution in NZ. Laws can be made at any time to override old ones.
Just found an article here http://www.nzherald.co.nz/nz-governm...ectid=10689847
I only gave it a quick skim but at a glance it looks like you can remain silent if it's going to incriminate yourself, but you have to hand it over if it might incriminate someone else. My immediate thought is then that if you don't hand it over you are impliciltly confessing guilt.
You don't have to remember your encryption keys. Most of them are too long to reliably memorize. So the way to make sure the bad men don't get hold of them is to set up something automated, either a cronjob, or a check when the machine is rebooted, a dead man's switch, whatever and if the check fails the keys are deleted.
Zen wisdom: No matter what happens, somebody will find a way to take it too seriously. - obviously had KB in mind when he came up with that gem
Artificial intelligence is no match for natural stupidity
So what you are telling me, is that if your passwords, which were long complex strings of random numbers and letters therefore virtually impossible to remember, were destroyed in a fire for example and you have no chance of remembering them, then how the fuck does 'you don't have any right to remain silent' going to help your case then. So, will they hold you indefinitely?
All encryptions I have used require a human input to use them. Could be a pass key. Could be a finger print. Could be a smart card. Could be a one time key.
If you refuse the provide the mechanism to decrypt the data when a court has ordered you to hand them over then you can go to jail.
Perhaps you are not familiar with an electronic interception warrant?
Most ISPs have the capability to mirror a users data to another port for collection, and this can also be done under an electronic interception warrant. Personally, I like using the free Wireshark to analyse the traffic dumps.
There is plenty of software out there that installs like a root kit, so you can not tell it is installed, then can monitor your machine - which can be legally installed with an electronic interception warrant.
There are currently 1 users browsing this thread. (0 members and 1 guests)
Bookmarks