you would get done with obstruction i'd imagine
Only if they could prove that you'd destroyed something of use, which by definition they can't.
you would get done with obstruction i'd imagine
well unless the police were really stupid they would mount the volume as read only and/or create a backup first.
What if it's made so it will only work if theres write privileges and must be run from exactly the same hardware?
Sounds like you could get a job in MI5 Delvis.![]()
What are you talking about then?
Funnily enough, the only way to crack a password isn't only via bruteforce![]()
imadirtypaedophilewhohideshispasswordlolziam1337!1
Sadly not, be nice.
Funnily enough, the only way to crack a password isn't only via bruteforce![]()
lol, I don't think you understand the amount of effort it takes to break encryption.
Assuming he is using something like AES (probably) and the password is 50 characters as it says.
If you dedicated 100% of the CPU of every computer in the whole world including supercomputers to brute forcing it, I guarentee you that he would have died of old age before the password was broken.
edit assuming there are 50 characters and there are only uppercase, lowercase and numbers then there are this many possibilities for the password:
416,470,721,148,178,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000
FYI the number of atoms in the universe is around
100,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000
They have enough evidence to sieze his PC, somit goes a bit beyond your standard "nothing to hide" discussion.
Oh ignore him, he's talking out of his bunghole.Explain? There are no practical better than brute force attacks against AES? Or tbh any other mainstream ciphers.
Unless you mean external techniques like torture, keyboard radiation monitoring, surveillance etc?
Oh ignore him, he's talking out of his bunghole.
What kind of software will he use to encrypt a system???
I'm inclined to agree. He only real scope for abuse is if there is genuinely no encrypted volume, but they believe there is, or there is one but they think you're giving a duress key. They could press for your bein jailed on the belief that you have a key to dodgy stuff somewhere, though hopefully a judge would seek proof that such encrypted data existed in the first place.
what ever happened to 'you have the right to remain silent?'
what ever happened to 'you have the right to remain silent?'