Man jailed over computer password refusal(in the UK)

ummmm, depends on the encryption type used. Some types of encryption there really is no way around it, except having a supercomputer well beyond that of any currently built or as I like to call it, "rubber hose cryptanalysis" :roflmao:

if you have a 50 char key, using really any sort of encryption, it would take forever to brute force on even a supercomputer.

Lets assume he could use any of the 128 ASCII chars, that would give:

50^128= 2.93873588 × 10^217 possible keys....

He probably was looking at child porn or else he would have given up the key. Hes not stupid, hed rather serve 16 weeks than God knows what for having kiddie porn.

Some one said that he was underage so he was just looking at porn for his own age. Ok... but that means some kids still had to MAKE the porn.
 
Agreed, though most people stick to upper and lowercase characters, numerics, and symbols (32 present on the standard ANSI keyboard, so a total of 94 valid characters.)

Before I used systems that don't support alt-code entry via the keyboard, I used to randomly throw in one or two upper code page characters in the middle of my password. Almost no bruteforce tool in existence actually checks those, which means a password containing them is vastly more secure.
 
ummmm, depends on the encryption type used. Some types of encryption there really is no way around it, except having a supercomputer well beyond that of any currently built or as I like to call it, "rubber hose cryptanalysis" :roflmao:

^This.

"Just put someone smarter on it" doesn't work.
 
I wouldn't give up the password, even if I was completely innocent; unless I was advised to by my non-court-appointed attorney.

I watched a video recently about why you shouldn't talk to the police without your lawyer present - I imagine it could be the same with something like this.
 
I wouldn't give up the password, even if I was completely innocent; unless I was advised to by my non-court-appointed attorney.

I watched a video recently about why you shouldn't talk to the police without your lawyer present - I imagine it could be the same with something like this.

Just one, that actually is an entire course as part of that video you watched. It was very informative provided it was the same one, taught by a cop and a lawyer.
 
Yeah, I caught the one on wimp.com.

I'll have to look for the rest of the videos, it was supremely interesting.
 
Some thoughts on this:

At present, there are Fifth Amendment protections against having to surrender your password. The specific case that brought this up in 2007 stemmed from a US citizen re-entering the US whose laptop was inspected on suspicion of it containing child pornography. This in turn resulted in a ruling in Vermont that surrendering the password may be a form of self-incrimination, and is thus protected under the Fifth Amendment. While I'd rather not get into debating the judge's opinion on this matter, see Google search "In re: Boucher" for more info.

Related to that: there are definitely efforts underway to undermine this protection, largely because it would make law enforcement's job easier. They have not yet passed at a legislative level (to the best of my knowledge), but there has been some debate on the issue, largely centred around the contentious problem of child pornography. Pretty much everyone other than paedophiles is in agreement that it should be stopped, but the contention arises because of the legal issues - particularly surrounding personal digital rights - that it raises.

My personal opinion is that legislators are seeking a one-size-fits-all approach from an enforcement perspective whereby anti-child porn legislation can also be applied to other areas (specifically: terrorism) rather than engaging in surveillance and intelligence-gathering to accomplish the same end result. It's pretty clear where this would be highly-detrimental to individual rights.

With respect to what happened regarding the surrender of the password in the UK: my suspicion is that the Counterterrorism Act of 2008 (and others) would have legally-compelled him to do so when asked. That he did not resulted in jail time, to be certain, but should not be construed as an admission of wrongdoing as there is no evidence at this time to support such an assertion. Unfortunately, the Counterterrorism Act (along with other such legislation) makes the Patriot Act look tame by comparison in many ways given the differences in (effectively) Constitutional protections between the UK and US; he should count himself lucky that he wasn't given more time or an indefinite hold as a suspected terrorist.

Having a strong password is a good starting point - but that's about all that it is. If the data on or in transit to and from the machine is not itself encrypted, the password is pretty much moot as the data can be acquired, forensically-examined, and anything potentially-incriminating recovered in an immediately-readable format. If this is a concern of yours, I would recommend taking a look at Truecrypt (free) or PGP Whole Disk Encryption (commercial).

Ultimately, there's very little that resists rubber-hose cryptanalysis all the way through. If you really, Really, REALLY don't want to divulge the contents of whatever the other guy has already intercepted or acquired, don't be found, don't let anything that may give them a leg-up on getting it into the clear be found, and be prepared to physically destroy and/or defend with your life the data as a last resort.
 
What are they going to do if after 16 weeks in jail, he gives them the password, they open up his computer and find nothing? Apologize? Seems like they haven't done a good job here. I hope they catch him some how if he is guilty of a crime. I hope they are prepared to compensate if he isn't.
 
What are they going to do if after 16 weeks in jail, he gives them the password, they open up his computer and find nothing? Apologize? Seems like they haven't done a good job here. I hope they catch him some how if he is guilty of a crime. I hope they are prepared to compensate if he isn't.
No need to compensate. It is apparently a crime not to provide the password when instructed to do so. He did not provide the password and was sentenced to 16 weeks as a result. Even if not guilty of the suspected crime, he is still guilty of a crime.
 
No need to compensate. It is apparently a crime not to provide the password when instructed to do so. He did not provide the password and was sentenced to 16 weeks as a result. Even if not guilty of the suspected crime, he is still guilty of a crime
.

Well thats pretty convenient then. As soon as his 16 weeks is up and they let him out, they can ask him for his password again, as part of the ongoing investigation. Hahahaha..
 
Unless there's some sort of double jeopardy type law that they couldn't just keep doing the same thing over and over. :D
 
Back
Top