• Man jailed for concealing password
    28 replies, posted
[url]http://www.bbc.co.uk/news/uk-25745989#sa-ns_mchannel=rss&ns_source=PublicRSS20-sa[/url]
"Never tell your password to anyone"
I know it's the UK but surely they have something protecting people from being forced to incriminate themselves like the US? Being forced to give a password seems like it would be incriminating oneself to me.
[QUOTE=Article]memory stick's password was "$ur4ht4ub4h8"[/QUOTE] No capital letters?
I would do the same thing to protect my fap folders.
I wonder which encryption software he used. TrueCrypt has a plausible deniability feature, where you can have two partitions with different passwords. You fill the decoy partition with a bunch of innocent crap, and the sensitive partition is indistinguishable from the random noise of free space. [url]http://www.truecrypt.org/docs/plausible-deniability[/url]
[QUOTE=Alice3173;43544935]I know it's the UK but surely they have something protecting people from being forced to incriminate themselves like the US? Being forced to give a password seems like it would be incriminating oneself to me.[/QUOTE] That's already been fucked by precedent in the US [url]http://news.cnet.com/8301-31921_3-57364330-281/judge-americans-can-be-forced-to-decrypt-their-laptops/[/url]
[QUOTE=BLOODGA$M;43550418]That's already been fucked by precedent in the US [url]http://news.cnet.com/8301-31921_3-57364330-281/judge-americans-can-be-forced-to-decrypt-their-laptops/[/url][/QUOTE] That's fucked. I don't honestly see how it couldn't violate the right to not incriminate yourself.
[QUOTE=ShaunOfTheLive;43545655]I wonder which encryption software he used. TrueCrypt has a plausible deniability feature, where you can have two partitions with different passwords. You fill the decoy partition with a bunch of innocent crap, and the sensitive partition is indistinguishable from the random noise of free space. [url]http://www.truecrypt.org/docs/plausible-deniability[/url][/QUOTE] That sounds useful.
[QUOTE=ShaunOfTheLive;43545655]I wonder which encryption software he used. TrueCrypt has a plausible deniability feature, where you can have two partitions with different passwords. You fill the decoy partition with a bunch of innocent crap, and the sensitive partition is indistinguishable from the random noise of free space. [url]http://www.truecrypt.org/docs/plausible-deniability[/url][/QUOTE] Why not self-destruct if a specific password is given?
[quote]He was already in jail for being part of a cell that considered attacking a Territorial Army base in the town... Hussain and three other men were jailed in 2012 after admitting discussing attacking the town's TA headquarters by placing a homemade bomb on to a remote controlled toy car.[/quote] I don't know about you guys but I don't really mind this guy's privacy being molested. I think you forfeit that right when you are [I]​actually doing[/I] terrorist acts.
[QUOTE=pentium;43554613]Why not self-destruct if a specific password is given?[/QUOTE] thats destroying evidence
[QUOTE=darkgodmaste;43544936]No capital letters?[/QUOTE] I don't use them in mine either for facepunch, which is mnb864dsa@@# [editline]16th January 2014[/editline] OH SHIT WAIT NO NO EDIT ISNT WORKING
[QUOTE=Alice3173;43550634]That's fucked. I don't honestly see how it couldn't violate the right to not incriminate yourself.[/QUOTE] The whole self incrimination thing stems from the fifth amendment. The majority of the time it implies only to when in trial, but also in interrogations. The thing is that hes probably already fucked, and he cant "plead the fifth" when a court orders him to hand over the password. Giving a password isnt really incrimination anyway. Its giving the password.
[IMG]http://i.imgur.com/Pp7VyqZ.png[/IMG] For anyone curious.
[QUOTE=areolop;43554970]Giving a password isnt really incrimination anyway. Its giving the password.[/QUOTE] The end result is incriminating though. The end result is that the password unlocks locked files which incriminate the person who was forced to hand over the password.
And at the thousandth wrong attempt in a row, [del]a small charge goes off[/del] a short is created.
[QUOTE=Forumaster;43555064] For anyone curious.[/QUOTE] But does that also take into account a GPU? I remember I made some MD5 hashes of silly words and cracked them in about half an hour with a 460 GTX SE.
I like the idea of a encrypted volume that when the wrong password is input it scrambles itself.
[QUOTE=Lonestriper;43554650]thats destroying evidence[/QUOTE] I'm fairly sure that's not illegal if you do it for your own sake, at least that's the case in Germany.
[QUOTE=Forumaster;43555064][IMG]http://i.imgur.com/Pp7VyqZ.png[/IMG] For anyone curious.[/QUOTE] "for a desktop PC" Well, that doesn't say much. Did it use the CPU or GPU to crack it? Also, crackers use several GPUs connected to eachother to maximize the deciphering speed, not just a desktop PC.
[QUOTE=Charades;43545332]I would do the same thing to protect my fap folders.[/QUOTE] you probably shouldn't have illegal stuff in there (unless the police would persecute you for warez Porn? Do they care about such shit?)
Am I the only one who feels dirty reading their passwords in plaintext, let alone saying it (which I never had)? [QUOTE=ShaunOfTheLive;43545655]I wonder which encryption software he used. TrueCrypt has a plausible deniability feature, where you can have two partitions with different passwords. You fill the decoy partition with a bunch of innocent crap, and the sensitive partition is indistinguishable from the random noise of free space. [url]http://www.truecrypt.org/docs/plausible-deniability[/url][/QUOTE] It's safe to assume anyone who uses TrueCrypt uses plausible deniability.
[QUOTE=Gordon Frohm;43555928]you probably shouldn't have illegal stuff in there (unless the police would persecute you for warez Porn? Do they care about such shit?)[/QUOTE] If it was torrented porn I would guess they would care since they do care about movies.
[QUOTE=areolop;43554970]The whole self incrimination thing stems from the fifth amendment. The majority of the time it implies only to when in trial, but also in interrogations. The thing is that hes probably already fucked, and he cant "plead the fifth" when a court orders him to hand over the password. Giving a password isnt really incrimination anyway. Its giving the password.[/QUOTE] The UK kinda doesn't have a fifth amendment.
[QUOTE=BananaMed;43555902]"for a desktop PC" Well, that doesn't say much. Did it use the CPU or GPU to crack it? Also, crackers use several GPUs connected to eachother to maximize the deciphering speed, not just a desktop PC.[/QUOTE] Exactly, that was kind of the point. If it took a typical desktop PC 2000 years, I'm pretty sure the government could throw a more high end computing force at it and have it inside a month or less.
he has some unibrow going on
[QUOTE=Forumaster;43555064][IMG]http://i.imgur.com/Pp7VyqZ.png[/IMG] For anyone curious.[/QUOTE] This makes me want to change my password and start using LastPass. [editline]16th January 2014[/editline] [IMG]http://puu.sh/6n7JU.png[/IMG] Good.
[QUOTE=Kannata;43559644]This makes me want to change my password and start using LastPass. [editline]16th January 2014[/editline] [IMG]http://puu.sh/6n7JU.png[/IMG] Good.[/QUOTE] [IMG]http://i.imgur.com/ORrNeqM.png[/IMG] Get on my sexy level. Sex.
Sorry, you need to Log In to post a reply to this thread.