Judge Places Limits on Airport Laptop Searches

Page 3 - Seeking answers? Join the Tom's Guide community: where nearly two million members share solutions and discuss the latest tech.
Status
Not open for further replies.

shanky887614

Distinguished
Feb 5, 2010
232
0
18,840
2
better use ccleaners gutman before i take a trip to america then

anyway why you talking about truecrypt as being broken?

i use Serpent-Twofish-AES

http://www.truecrypt.org/docs/

if they can break through this quickly ill be suprised considering i use a 22 password with a mix of characters and numbers
(from truecrypts website)
Three ciphers in a cascade [15, 16] operating in XTS mode (see the section Modes of Operation). Each 128-bit block is first encrypted with AES (256-bit key) in XTS mode, then with Twofish (256-bit key) in XTS mode, and finally with Serpent (256-bit key) in XTS mode. Each of the cascaded ciphers uses its own key. All encryption keys are mutually independent (note that header keys are independent too, even though they are derived from a single password – see the section Header Key Derivation, Salt, and Iteration Count). See above for information on the individual cascaded ciphers.

 

captjack5169

Distinguished
Sep 3, 2008
35
0
18,580
0
Please dont forget that encryption is only as strong as the password password of 20 characters of types has better odds than people who use 1234 or password. The bigger the password the better chance you have, but as someone above has already state if you are zombied or you have a keylogger embedded, your screwed anyway.
 

Christopher1

Distinguished
Aug 29, 2006
197
0
18,640
1
[citation][nom]tethoma[/nom]They require you give them the pass phrase and or encryption key. Not sure what happens when you say no.[/citation]

Nothing. They cannot force you to cooperate with a investigation nor violate your right to not incriminate yourself.
 

Montezuma

Distinguished
Mar 25, 2008
216
0
18,830
0
This is why I never bring laptops back with me when traveling outside of the United States(of which I am a citizen). I also do not take laptops out of the country, either. I usually arrange for a laptop to be waiting for me in whatever country I am visiting and I just download and/or upload everything needed to a locally-based storage server.

Really, though, this is absolutely wrong and blatantly illegal. The U.S. Government is violating the U.S. Constitution and there seems to be no judge that is willing to stand up for the citizenry.
 

stromm

Distinguished
Jun 23, 2004
64
0
18,580
0
Correction... CHILD porn. Sad that a sicko is running around free.
[citation][nom]jerreece[/nom]And here I thought the whole point was to prevent terrorist attacks. Now we're going to search people's electronic devices for... porn and what, top secret materials?[/citation]
 

Maxor127

Distinguished
Jul 16, 2007
362
0
18,930
0
I thought it was going to be something about checking laptops to make sure they're not bombs, which I don't see a problem with as long they don't tear it open or something. But I think scanning private files is completely wrong and there's absolutely no reason for it.
 

fanscale

Distinguished
May 30, 2009
20
0
18,560
0
You can just set up your home computer as a server and upload all your stuff. Then format your laptop hard drive. When they turn on your computer to search it and they get an error message shout, "Hey you broke it!"
 

shanky887614

Distinguished
Feb 5, 2010
232
0
18,840
2
why not add a hidden operating system using truecrypt.

im pretty sure you could make them think you just installed the operating system a few days ago with nothing on it

god you could probably do it on the plane
 
G

Guest

Guest
Truecrypt is uncrackable, except through brute force.
There are AES, Serpent and Twofish encryptions available, and if you cascade all three, you're off to a good start. Then, assuming you spend a good chunk of time creating your random seed, and create a non-excrypted, encrypted, and a encrypted-shadow partition, no worries. Of course, it helps to create seperate passwords at least 20 characters long and total gibberish, including punctuation marks and random non-alphabet symbols for both encrypted partitions. Then, store some seemingly sensitive data in the regular encrypted drive.
Now, a bigger concern is having stored any sensitive data on nonencrypted portions of a disk. If you have, then you're screwed. But then again, most people, even when they run Truecrypt, choose simple passwords that their family memberes can guess! Most of the time, security problems are in the user, not the system :)
 

Gulli

Distinguished
Sep 26, 2008
85
0
18,580
0
You could just mail the dirty pics to yourself because customs are not allowed to open mail without the sniffing dogs barking. Why is this not allowed? Because it violates the right to privacy. Why should it be any different when you bring stuff with you at the airport?
 
G

Guest

Guest
It sounds like many of the commenters here are in favor of people being able to hold onto their child pornography. What's the deal? Anything you are bringing across the international border is subject to search. Expect it and get over it. I for one would rather have my stuff gone through and have kids safer world wide. Made it too dangerous to have the stuff and the market will get smaller.
 
G

Guest

Guest
knownalien:

REALLY??

http://belowthebeltway.com/2010/06/12/debunking-yet-another-birther-myth-the-case-of-tim-adams/
 

killerclick

Distinguished
Jan 13, 2010
459
0
18,930
0
[citation][nom]John Stickler[/nom]I for one would rather have my stuff gone through and have kids safer world wide. Made it too dangerous to have the stuff and the market will get smaller.[/citation]

It would take anyone with basic knowledge of web design less than five minutes to make a web page that'll put a bunch of kiddy porn images and kiddy porn websites in your browser's cache and history without you even seeing them on the page. They just have to include them on the page and make them invisible so you don't see them but they'll still be visible in your browser cache and history folder when the authorities search your computer.

Imagine what hackers with viruses and trojans could do to you if for example your business partner/competitor/estranged wife hires them to put you in prison for a few years.

Imagine what a hotel employee could do if you leave your computer in your room.

Convicting people for pedophilia based on a few images on their computer is kind of like convicting people for drug trafficking based on the cocaine traces on their money or clothes.
 

bison88

Distinguished
May 24, 2009
249
0
18,830
0
Data Decryption hah! What a joke. If someone was hiding something worthy enough to encrypt they wouldn't use a 10 key password which would still take the full power of a supercomputer a chunk of time to brute force (which no federal agency would every allow unless it was vital to national security).

You're talking the average randomly generate key is 56 characters long. If they can break it, either there is a flaw in the encryption algorithem or a backdoor (which would break confidence in consumer based encryption across the board). I just find it hilarious the Government always trys to sound big and bad using scare tactics like our parents used on us as kids. "Mommy and Daddy know and see all and we'll ALWAYS find out kids!"

Bullshit, kiss my ass Feds. Seriously, you pricks have put yourself on a pedastol and one of these days this is all going to back fire on you all.
 

razor512

Distinguished
Jun 16, 2007
501
0
18,940
4
what's stopping a TSA worker from helping them self to the top secret xbox 720 plans on the laptop of the microsoft worker, then selling it to another company?
 

CChick

Distinguished
Oct 21, 2008
126
0
18,630
0
[citation][nom]drutort[/nom]i wonder how they plan to deal with cloud computing and other such of site data storage what will they say... hand over your password to your gmail account too? and other bank or other private things as well?were does it end?[/citation]

Those overweight morons at DHS/TSA dont even know what Mac Book air was and thought that its fake.

so u expect these morons to know what cloud computing is? sure. maybe 10-20 years later they would know what it is.
 
Status
Not open for further replies.
Thread starter Similar threads Forum Replies Date
G Streaming Video & TVs 11
exfileme Streaming Video & TVs 18
exfileme Streaming Video & TVs 23
G Streaming Video & TVs 38
exfileme Streaming Video & TVs 27
exfileme Streaming Video & TVs 29
exfileme Streaming Video & TVs 46
exfileme Streaming Video & TVs 12
exfileme Streaming Video & TVs 53
G Streaming Video & TVs 35
JMcEntegart Streaming Video & TVs 33
JMcEntegart Streaming Video & TVs 37
exfileme Streaming Video & TVs 32
exfileme Streaming Video & TVs 43
exfileme Streaming Video & TVs 64
exfileme Streaming Video & TVs 37
JMcEntegart Streaming Video & TVs 24
exfileme Streaming Video & TVs 68
Marcus Yam Streaming Video & TVs 45
exfileme Streaming Video & TVs 49

ASK THE COMMUNITY