Page 2 of 2 FirstFirst 12
Results 16 to 29 of 29

Thread: The FBI can't crack hard drive encryption

  1. #16
    Join Date
    25th January 2007 - 21:37
    Bike
    2011 ER-6N
    Location
    Glenfield
    Posts
    2,888
    What if you don't remember them?

  2. #17
    Join Date
    13th December 2008 - 18:22
    Bike
    Your mom
    Location
    Christchurch
    Posts
    3,901
    Quote Originally Posted by p.dath View Post

    So you have to decide between an indefinite stay in jail, or giving up the encryption keys.
    Are we still talking about NZ?

  3. #18
    Join Date
    10th May 2009 - 15:22
    Bike
    2010 Honda CB1000R Predator
    Location
    Orewa, Auckland
    Posts
    4,490
    Blog Entries
    19
    Quote Originally Posted by Slyer View Post
    What if you don't remember them?
    You'll have to convince the Judge. I think "I can't remember" won't be very convincing.

    Quote Originally Posted by SMOKEU View Post
    Are we still talking about NZ?
    Yes. Getting more draconian.

  4. #19
    Join Date
    25th October 2002 - 17:30
    Bike
    GSXR1000
    Location
    Christchurch
    Posts
    9,291
    Quote Originally Posted by p.dath View Post
    You'll have to convince the Judge. I think "I can't remember" won't be very convincing.


    It would be up to the court to prove that you can remember, and short of stealing your thoughts in your dreams Inception stylz I don't see how they could do that.
    Last edited by onearmedbandit; 20th December 2010 at 23:49.

  5. #20
    Join Date
    24th September 2008 - 01:32
    Bike
    a shiny new(ish) one
    Location
    Dunedin
    Posts
    3,650
    Quote Originally Posted by Usarka View Post
    There's been lots of changes to our laws in this area, i'd be surprised if we'd have the right to remain silent on passwords if suspected of something dodgy...... (anyone know for surez?)
    something about your right to remain silent in NZ, and in the USA, you have a constitutional right not to say anything that might incriminate yourself. remember, the burden of proof lies with the accuser. so fuck them.

  6. #21
    Join Date
    1st January 2007 - 19:48
    Bike
    Suzuki RG400 Yamaha ST125 Yamaha TDR250
    Location
    Singapura/Banks Peninsula
    Posts
    1,474
    Blog Entries
    1
    so the logical conclusion of that is a jail full of child pr0n owners who "forgot"their passwords

    which throws up an interesting question-at what stage of disc data recovery(assuming a password has not been forthcoming) does a fragmented bunch of data become a crime?
    "more than two strokes is masturbation"
    www.motoparts-online.com

  7. #22
    Join Date
    19th July 2007 - 20:05
    Bike
    750 auw
    Location
    Mianus
    Posts
    2,247
    Quote Originally Posted by tigertim20 View Post
    something about your right to remain silent in NZ, and in the USA, you have a constitutional right not to say anything that might incriminate yourself. remember, the burden of proof lies with the accuser. so fuck them.
    Nope - we don't have a constitution in NZ. Laws can be made at any time to override old ones.

    Just found an article here http://www.nzherald.co.nz/nz-governm...ectid=10689847

    I only gave it a quick skim but at a glance it looks like you can remain silent if it's going to incriminate yourself, but you have to hand it over if it might incriminate someone else. My immediate thought is then that if you don't hand it over you are impliciltly confessing guilt.

  8. #23
    Join Date
    10th May 2009 - 15:22
    Bike
    2010 Honda CB1000R Predator
    Location
    Orewa, Auckland
    Posts
    4,490
    Blog Entries
    19
    Quote Originally Posted by onearmedbandit View Post
    It would be up to the court to prove that you can remember, and short of stealing your thoughts in your dreams Inception stylz I don't see how they could do that.
    Negative, that law does not work that way. You don't have any right to remain silent, and they don't have to prove guilt. I think the burden of proof is "suspicion". So if they can establish reasonable suspicion then it is game over.

  9. #24
    Join Date
    9th August 2005 - 19:52
    Bike
    CBR450RR
    Location
    Hamilton
    Posts
    6,368
    Blog Entries
    77
    You don't have to remember your encryption keys. Most of them are too long to reliably memorize. So the way to make sure the bad men don't get hold of them is to set up something automated, either a cronjob, or a check when the machine is rebooted, a dead man's switch, whatever and if the check fails the keys are deleted.
    Zen wisdom: No matter what happens, somebody will find a way to take it too seriously. - obviously had KB in mind when he came up with that gem

    Artificial intelligence is no match for natural stupidity

  10. #25
    Join Date
    25th October 2002 - 17:30
    Bike
    GSXR1000
    Location
    Christchurch
    Posts
    9,291
    Quote Originally Posted by p.dath View Post
    Negative, that law does not work that way. You don't have any right to remain silent, and they don't have to prove guilt. I think the burden of proof is "suspicion". So if they can establish reasonable suspicion then it is game over.
    So what you are telling me, is that if your passwords, which were long complex strings of random numbers and letters therefore virtually impossible to remember, were destroyed in a fire for example and you have no chance of remembering them, then how the fuck does 'you don't have any right to remain silent' going to help your case then. So, will they hold you indefinitely?

  11. #26
    Join Date
    13th December 2008 - 18:22
    Bike
    Your mom
    Location
    Christchurch
    Posts
    3,901
    Quote Originally Posted by gammaguy View Post
    so the logical conclusion of that is a jail full of child pr0n owners who "forgot"their passwords

    which throws up an interesting question-at what stage of disc data recovery(assuming a password has not been forthcoming) does a fragmented bunch of data become a crime?
    The government doesn't really have any way of finding kiddy porn on someones computer unless they deliberately snoop around on that persons computer looking for evidence. Going on Google and typing in "child porn torrent downloads" is likely to arouse suspicion.

  12. #27
    Join Date
    20th August 2006 - 11:29
    Bike
    2023 MT 09 SP
    Location
    Car Ter Town
    Posts
    1,200
    Quote Originally Posted by SMOKEU View Post
    The government doesn't really have any way of finding kiddy porn on someones computer unless they deliberately snoop around on that persons computer looking for evidence. Going on Google and typing in "child porn torrent downloads" is likely to arouse suspicion.

    Hahahahahahaha. You just keep on believing that.
    Quote Originally Posted by Mully
    The mind boggles.

    Unless you were pillioning the sheep - which is more innocent I suppose (but no less baffling)

  13. #28
    Join Date
    10th May 2009 - 15:22
    Bike
    2010 Honda CB1000R Predator
    Location
    Orewa, Auckland
    Posts
    4,490
    Blog Entries
    19
    Quote Originally Posted by onearmedbandit View Post
    So what you are telling me, is that if your passwords, which were long complex strings of random numbers and letters therefore virtually impossible to remember, were destroyed in a fire for example and you have no chance of remembering them, then how the fuck does 'you don't have any right to remain silent' going to help your case then. So, will they hold you indefinitely?
    All encryptions I have used require a human input to use them. Could be a pass key. Could be a finger print. Could be a smart card. Could be a one time key.

    If you refuse the provide the mechanism to decrypt the data when a court has ordered you to hand them over then you can go to jail.

  14. #29
    Join Date
    10th May 2009 - 15:22
    Bike
    2010 Honda CB1000R Predator
    Location
    Orewa, Auckland
    Posts
    4,490
    Blog Entries
    19
    Quote Originally Posted by SMOKEU View Post
    The government doesn't really have any way of finding kiddy porn on someones computer unless they deliberately snoop around on that persons computer looking for evidence. Going on Google and typing in "child porn torrent downloads" is likely to arouse suspicion.
    Perhaps you are not familiar with an electronic interception warrant?

    Most ISPs have the capability to mirror a users data to another port for collection, and this can also be done under an electronic interception warrant. Personally, I like using the free Wireshark to analyse the traffic dumps.

    There is plenty of software out there that installs like a root kit, so you can not tell it is installed, then can monitor your machine - which can be legally installed with an electronic interception warrant.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •