Defendant's encrypted laptop yields secrets

Discuss

8 Responses to “Defendant's encrypted laptop yields secrets”

  1. That_Anonymous_Coward says:

    Was her password 1 2 3 4 5 like the judges luggage?

  2. Abe Lincoln says:

    For anyone who doesn’t know about this wonderful open source software:
    http://www.truecrypt.org/
    Read up on the “partition within a partition” scheme.  Very cool.

    • You mean the “plausible deniability” thing?  Which everyone knows about, so that in countries where “I’ve forgotten” is no defence (which apparently includes the US, now) it’s completely useless?

      Even if you haven’t used the feature, it’s in the cops best interest to assume that you have and prosecute you if you don’t hand over the password.  They have nothing to lose. 

      (It might be an idea to use the feature anyway.  Maybe if you don’t, you’ll be sent to jail for failing to provide a non-existent password….)

      • matlockexpressway says:

        The problem with your latter suggestion is that they’ll just think you gave them the password to the decoy partition (whether filled with innocuous files or empty), and so they’ll never think your denial is plausible–even if your denial is an affirmation!

        • Agreed.  Denial doesn’t work.  What I meant was, better have that hidden partition set up so that they don’t think you are denying when you actually aren’t…

  3. Billy Barnes says:

    When did the refusal to give the password raise issues of unreasonable search and seizure? I must have missed that.

Leave a Reply