On Mar 4, 2009, at 9:17 PM, Robert J. Hansen wrote:
David Shaw wrote:
Indeed, and also (in the US at least), the attorneys for each side
can (to a limited degree that varies from situation to situation)
remove people from the "potential juror" list after interviewing them
(a "Voir Dire" challen
David Shaw wrote:
> Indeed, and also (in the US at least), the attorneys for each side
> can (to a limited degree that varies from situation to situation)
> remove people from the "potential juror" list after interviewing them
> (a "Voir Dire" challenge).
Voir dire is the name given to the intervi
On Wed, Mar 04, 2009 at 05:46:38PM -0500, Robert J. Hansen wrote:
> David Shaw wrote:
> > I suspect things would go rather like this:
> > http://www.mail-archive.com/cryptogra...@metzdowd.com/msg10391.html
>
> Perry is an optimist. It's considerably worse than he makes it out to be.
>
> Judges a
David Shaw wrote:
> I suspect things would go rather like this:
> http://www.mail-archive.com/cryptogra...@metzdowd.com/msg10391.html
Perry is an optimist. It's considerably worse than he makes it out to be.
Judges are not idiots. They are very well-trained and have a great deal
of experience a
gerry_lowry (alliston ontario canada) wrote:
> on vedaal's laptop design ...
>
> [5] marry the drive to the motherboard so that removing the drive
> to another computer would cause the drive to self destruct.
>
> [6] design the drive as a secondary only never bootable drive;
>
On Wed, Mar 04, 2009 at 10:38:23AM -0500, ved...@hush.com wrote:
> >Date: Tue, 3 Mar 2009 19:21:46 -0500
> >From: David Shaw
> >Subject: Re: surrendering one's passphrase to authorities
>
> >> Folks on this list have said for years that rubber-hose key
> &
on vedaal's laptop design ...
[5] marry the drive to the motherboard so that removing the drive
to another computer would cause the drive to self destruct.
[6] design the drive as a secondary only never bootable drive;
it's sister drive would carry the O/S and detect any O/S
>Date: Tue, 3 Mar 2009 19:21:46 -0500
>From: David Shaw
>Subject: Re: surrendering one's passphrase to authorities
>> Folks on this list have said for years that rubber-hose key
>extraction
>> is orders of magnitude faster than brute-force computation.
On Tue, Mar 03, 2009 at 05:12:23PM -0500, David Shaw wrote:
> It's an odd case. Law enforcement *knows* what is on the laptop in
> this case. They saw it there before the computer was powered down
> (thus locking the drive). They are arguing over whether the
> protection against self-incriminati
On Tue, Mar 03, 2009 at 07:31:03PM -0500, Robert J. Hansen wrote:
> Atom Smasher wrote:
> > most people don't use pass-phrases that strong.
>
> Let me see if I have this clear:
>
> - He knew he was approaching a border
> - He knew he had child porn on his system
> - He knew his laptop might be se
On Mar 3, 2009, at 6:04 PM, Atom Smasher wrote:
On Tue, 3 Mar 2009, David Shaw wrote:
This article caught my eye. One of the things that I gleaned from
the article is that it's obvious that law enforcement (at this
level) does not have the ability to brute-force crack PGP
encrypted data.
Atom Smasher wrote:
> most people don't use pass-phrases that strong.
Let me see if I have this clear:
- He knew he was approaching a border
- He knew he had child porn on his system
- He knew his laptop might be searched at the border
- And you think, knowing all this, he'd use a weak passphrase
On Mar 3, 2009, at 7:08 PM, John Clizbe wrote:
gerry_lowry (alliston ontario canada) wrote:
unfortunately, it's likely that certain countries handle this using
torture.
Folks on this list have said for years that rubber-hose key extraction
is orders of magnitude faster than brute-force compu
On Tue, 3 Mar 2009, Robert J. Hansen wrote:
Yes. It's the same as the S2K in OpenPGP, last I checked -- which is
specifically designed to make brute forcers slow.
Let's say the guy has a passphrase with 64 bits of entropy. Assume you
have a massively distributed network and some truly cutti
On Tuesday 03 March 2009 23:26:21 Robert J. Hansen wrote:
> For the UK, I believe the Regulation of Investigatory Powers Act
> (RIPA) is still in effect. Quite a ghastly bill, really.
Yes. Lot like being tortured ;)
--
Richard
___
Gnupg-users maili
gerry_lowry (alliston ontario canada) wrote:
> unfortunately, it's likely that certain countries handle this using torture.
Folks on this list have said for years that rubber-hose key extraction
is orders of magnitude faster than brute-force computation.
--
John P. Clizbe In
On Tuesday 03 March 2009 23:26:21 Robert J. Hansen wrote:
> For the UK, I believe the Regulation of Investigatory Powers Act
> (RIPA) is still in effect. Quite a ghastly bill, really.
Yes. Lot like being tortured ;)
--
Richard
___
Gnupg-users maili
Atom Smasher wrote:
> i would think the FBI (presuming that they're involved) would be able to
> brute-force a pass-phrase in less than a year. they have the disk, so in
> all likelihood the weakest link in the chain is the pass-phrase (and
> that's assuming that there's no cache/tmp files that are
On Tue, 3 Mar 2009, David Shaw wrote:
This article caught my eye. One of the things that I gleaned from the
article is that it's obvious that law enforcement (at this level) does
not have the ability to brute-force crack PGP encrypted data. Instead,
the courts are attempting to force the surre
Joseph Oreste Bruni wrote:
> it's obvious that law enforcement (at this level) does
> not have the ability to brute-force crack PGP encrypted data.
That capability would literally be worth people's lives. It makes no
sense to think that they would reveal that capability just to bag a
run-of-the-m
unfortunately, it's likely that certain countries handle this using torture.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
On Tue, Mar 03, 2009 at 02:31:13PM -0700, Joseph Oreste Bruni wrote:
> http://www.theregister.co.uk/2009/03/03/encryption_password_ruling/
>
> Hi List,
>
> This article caught my eye. One of the things that I gleaned from the
> article is that it's obvious that law enforcement (at this level) doe
Hi,
Reference:
> From: Joseph Oreste Bruni
> Date: Tue, 03 Mar 2009 14:31:13 -0700
> Message-id: <63b6c107-1520-484f-9069-bbf387251...@me.com>
Joseph Oreste Bruni wrote:
> http://www.theregister.co.uk/2009/03/03/encryption_password_ruling/
>
> Hi List,
>
> This article caug
http://www.theregister.co.uk/2009/03/03/encryption_password_ruling/
Hi List,
This article caught my eye. One of the things that I gleaned from the
article is that it's obvious that law enforcement (at this level) does
not have the ability to brute-force crack PGP encrypted data. Instead,
t
24 matches
Mail list logo