Massassi Forums Logo

This is the static archive of the Massassi Forums. The forums are closed indefinitely. Thanks for all the memories!

You can also download Super Old Archived Message Boards from when Massassi first started.

"View" counts are as of the day the forums were archived, and will no longer increase.

ForumsDiscussion Forum → "Youth jailed for not handing over encryption password"
12
"Youth jailed for not handing over encryption password"
2010-10-06, 5:39 AM #1
http://www.theregister.co.uk/2010/10/06/jail_password_ripa/

I don't know much about the law but this seems very wrong to me. Whatever happened to innocent until proven guilty?

What if he claimed he'd forgotten the password? Could they still sentence him?

Presumably then, I can encrypt a random file, put it online without the key and get anyone who downloads it in trouble because they can't prove what it is.
TheJkWhoSaysNiTheJkWhoSaysNiTheJkWhoSaysNiTheJkWho
SaysNiTheJkWhoSaysNiTheJkWhoSaysNiTheJkWhoSaysNiTh
eJkWhoSaysNiTheJkWhoSaysNiTheJkWhoSaysNiTheJkWhoSa
ysNiTheJkWhoSaysNiTheJkWhoSaysNiTheJkWhoSaysNiTheJ
k
WhoSaysNiTheJkWhoSaysNiTheJkWhoSaysNiTheJkWhoSays
N
iTheJkWhoSaysNiTheJkWhoSaysNiTheJkWhoSaysNiTheJkW
2010-10-06, 5:51 AM #2
He should have used a hidden volume, then he could give away the outer volume password and saved his privacy

Also

Quote:
Police say they are still trying to crack the password.

Good luck with that.
Bassoon, n. A brazen instrument into which a fool blows out his brains.
2010-10-06, 5:55 AM #3
I don't know the laws over there, but wouldn't that be self incriminating?
ᵗʰᵉᵇˢᵍ๒ᵍᵐᵃᶥᶫ∙ᶜᵒᵐ
ᴸᶥᵛᵉ ᴼᵑ ᴬᵈᵃᵐ
2010-10-06, 7:59 AM #4
It would be, yeah.

I suppose it'd technically count as impeding the course of justice or however the hell they word it?
nope.
2010-10-06, 8:01 AM #5
I thought password cracking was easy with the right software (the kind law enforcement typically have access to)?

Still, 50 characters is hardcore.
Quote Originally Posted by FastGamerr
"hurr hairy guy said my backhair looks dumb hurr hairy guy smash"
2010-10-06, 8:04 AM #6
Yeah, I'm sure the local lancashire police have access to the best software around. :P
nope.
2010-10-06, 8:14 AM #7
Originally posted by KOP_AoEJedi:
I thought password cracking was easy with the right software (the kind law enforcement typically have access to)?

Still, 50 characters is hardcore.


Not all levels of hashing or encryption are created equal.

Is it easy to crack a simple, unsalted MD5 hash with a rainbow table? Yes.

Is it easy to crack Rijndael/AES? No.
2010-10-06, 8:46 AM #8
Originally posted by Baconfish:
Yeah, I'm sure the local lancashire police have access to the best software around. :P


I don't know where that is (Assuming UK considering the URL) so it must be a small town?

Originally posted by Darth:
Not all levels of hashing or encryption are created equal.

Is it easy to crack a simple, unsalted MD5 hash with a rainbow table? Yes.

Is it easy to crack Rijndael/AES? No.


I'm not a security expert. My extent of knowledge for password cracking expired in early 2000s, when I used to steal people's User/Pass from places using software and password lists over proxies.
Quote Originally Posted by FastGamerr
"hurr hairy guy said my backhair looks dumb hurr hairy guy smash"
2010-10-06, 8:58 AM #9
Originally posted by Darth:
Is it easy to crack Rijndael/AES? No.

See you in 400 years!
Bassoon, n. A brazen instrument into which a fool blows out his brains.
2010-10-06, 9:03 AM #10
Originally posted by KOP_AoEJedi:
I don't know where that is (Assuming UK considering the URL) so it must be a small town?


In the time it took to type that question you could have googled it.

And Lancashire is a county.

A backward county >_>

Bloody pie-eaters.
2010-10-06, 9:38 AM #11
Originally posted by Emon:
See you in 400 years!


Hey, now, you're assuming there is no technical progression. In twenty years we might have GPU-powered software capable of doing it in 2 years instead of 380 :P
2010-10-06, 9:39 AM #12
GPUs are not magical computing devices. Brute forcing AES takes an astronomical amount of computing power.
Bassoon, n. A brazen instrument into which a fool blows out his brains.
2010-10-06, 9:42 AM #13
Originally posted by Emon:
GPUs are not magical computing devices. Brute forcing AES takes an astronomical amount of computing power.


I didn't say they were, simply that they'd be fast enough to do it a great deal faster than 400 years, after 20 years of technological progression. :P

After all, today's computers could be seen as an "astronomical amount of computing power" compared to a computer in 1990. :P
2010-10-06, 9:51 AM #14
At which point we'll have an even more complex encryption standard that will take 400 years for that hardware to brute force. :P
2010-10-06, 9:57 AM #15
:P:P:P:P:P:P:P:P:P

People in this thread need their emoticon privileges revoked
Bassoon, n. A brazen instrument into which a fool blows out his brains.
2010-10-06, 9:59 AM #16
**** you, emon :P
2010-10-06, 10:25 AM #17
50 characters??!?!?!
seems a bit excessive, but I guess if you have a line from a movie or song memorized.... :P
(JKLE_Cougar) from JK MP Community
discord.me/jediknightdarkforces2
2010-10-06, 10:29 AM #18
Originally posted by Martyn:
In the time it took to type that question you could have googled it.


I wasn't really looking for an answer, or I would have.
Quote Originally Posted by FastGamerr
"hurr hairy guy said my backhair looks dumb hurr hairy guy smash"
2010-10-06, 10:31 AM #19
Not sure what the problem is here. I don't see how it's any different from refusing to comply with a search warrant.
If you think the waiters are rude, you should see the manager.
2010-10-06, 10:37 AM #20
a friend of mine has a long password which uses a book

it uses the chapter numbers in reverse with the reverse chapter numbers being used to determine the letter used from the first page of each chapter
eat right, exercise, die anyway
2010-10-06, 10:41 AM #21
Haha. The kid serves the 4 months of time.

I wonder how long the cops will try to 'crack' the password after that. I wouldn't be surprised if those Brits formed a whole department for it and several people milked it their entire careers. "Don't bother us, we're doing important computer forensics."
"it is time to get a credit card to complete my financial independance" — Tibby, Aug. 2009
2010-10-06, 10:41 AM #22
Hmm...I don't know enough about the law (here or there) to know what to think of this. How do police usually handle search warrants and safes inside houses? I mean, it seems like making someone give up information that may lead to their incrimination is pretty wrong, even if GETTING that information is not wrong.
Warhead[97]
2010-10-06, 10:48 AM #23
I don't think it would work in America. Seems covered by the 5th amendment. Forget safes, though. No safe is even remotely secure with enough time and expertise.
"it is time to get a credit card to complete my financial independance" — Tibby, Aug. 2009
2010-10-06, 10:51 AM #24
Well, the level of security isn't really comparable, but the situation is essentially analogous so as far as the law is concerned, I think that's what it SHOULD be based on (as far as how the authorities may access that information and the suspects rights concerning it). Now whether or not it actually IS based on that concept is...well, who knows, these days.
Warhead[97]
2010-10-06, 11:11 AM #25
After a bit of research, this does look a little more complicated than I originally thought, at least in the United States. That's because giving the police the password is an act that's partially testimonial; it's basically an admission that he has control of the volume.

It still seems to me that it would be fair to have a rule requiring people to turn over their passwords, but making the fact that they did so inadmissible at trial. (I don't know if this is already done, either here or in the U.K.) I'll probably look into this a little more when I get home.

Edit: Wikipedia has information on a relevant case here.
If you think the waiters are rude, you should see the manager.
2010-10-06, 11:13 AM #26
Originally posted by Michael MacFarlane:
It still seems to me that it would be fair to have a rule requiring people to turn over their passwords, but making the fact that they did so inadmissible at trial.


What could possibly be the point of this?
"it is time to get a credit card to complete my financial independance" — Tibby, Aug. 2009
2010-10-06, 11:19 AM #27
Originally posted by Freelancer:
What could possibly be the point of this?


Presumably, it would allow the police to access unprivileged evidence (the contents of the laptop) while preventing the suspect from being made a witness against himself at trial.
If you think the waiters are rude, you should see the manager.
2010-10-06, 11:20 AM #28
Originally posted by DrkJedi82:
a friend of mine has a long password which uses a book

it uses the chapter numbers in reverse with the reverse chapter numbers being used to determine the letter used from the first page of each chapter


I was taught in Information Security 1 and 2 to start using really long simple passwords instead of short complicated ones, something about it being easier to remember and harder to crack :P
(JKLE_Cougar) from JK MP Community
discord.me/jediknightdarkforces2
2010-10-06, 12:03 PM #29
"You have the right to remain silent"... unless we ask you for your password.

Is that what this amounts to?

Incidentally, I am not sure how they know that the password is 50 characters long without knowing what the password is.
2010-10-06, 12:30 PM #30
Considering the charges, he got away with a lot.
2010-10-06, 12:51 PM #31
Originally posted by Obi_Kwiet:
Considering the charges, he got away with a lot.


:carl:
"it is time to get a credit card to complete my financial independance" — Tibby, Aug. 2009
2010-10-06, 1:40 PM #32
Originally posted by GHarris:
"You have the right to remain silent"... unless we ask you for your password.

Is that what this amounts to?

Incidentally, I am not sure how they know that the password is 50 characters long without knowing what the password is.


I'm pretty sure Miranda v Arizona does not apply to other countries....:v:
woot!
2010-10-06, 1:47 PM #33
especialy when in the UK, you get told "you don't have to say anything, but it may harm your defense if you don't say anything now that you later rely on in court".
Snail racing: (500 posts per line)------@%
2010-10-07, 12:07 AM #34
I know that the law isn't the same in the UK. I said that as a way of pointing out why I don't agree with this as a matter of principle.
2010-10-07, 1:27 AM #35
Originally posted by GHarris:
I know that the law isn't the same in the UK. I said that as a way of pointing out why I don't agree with this as a matter of principle.


Your way of pointing out why you don't agree with it is indirectly citing a US Supreme Court case?

You are an interesting person.
woot!
2010-10-07, 7:24 AM #36
Originally posted by JLee:
Your way of pointing out why you don't agree with it is indirectly citing a US Supreme Court case?

You are an interesting person.


well...

ONLY AMERICA COUNTS
eat right, exercise, die anyway
2010-10-07, 8:08 AM #37
Originally posted by DrkJedi82:
well...

ONLY
THE NETHERLANDS
COUNTS

.
2010-10-07, 8:41 AM #38
watch out DrkJedi82 hes going to attack with his sharp wit and spider legs!
Welcome to the douchebag club. We'd give you some cookies, but some douche ate all of them. -Rob
2010-10-07, 9:08 AM #39
IN RUSSIA
THE PARTY
FINDS YOU
幻術
2010-10-07, 11:31 AM #40
Originally posted by alpha1:
especialy when in the UK, you get told "you don't have to say anything, but it may harm your defense if you don't say anything now that you later rely on in court".


This still doesn't cover "you have to speak when we ask for a password", though, does it? To me, at least, that phrase says "if you are going to say something in your defence, say it at the earliest opportunity or it will not carry as much weight".

I'm not saying anything about whether the phrase "should" cover this aspect of the law, just that it doesn't support it.

Originally posted by JLee:
Your way of pointing out why you don't agree with it is indirectly citing a US Supreme Court case?


It seemed as good a way of referring to the right to silence as any. Especially as "ONLY AMERICA COUNTS" - it's a part of popular culture for whatever reason so people have actually heard that phrase before.

On another note, I expect there is more to the story - that's why I asked how they knew that the password was 50 characters long. Perhaps, for example, the guy gloated to the police that they'd never crack his encryption and mentioned how long the password was - which clears a lot of the ambiguity with possibilities mentioned in the first post such as him not actually being the creator of the encrypted volume/not knowing what the password was and being unable to comply with the request.

Quote:
You are an interesting person.


How dare you sir.
12

↑ Up to the top!