Judge Places Limits on Airport Laptop Searches

Page 3 - Seeking answers? Join the Tom's Guide community: where nearly two million members share solutions and discuss the latest tech.
Status
Not open for further replies.
better use ccleaners gutman before i take a trip to america then

anyway why you talking about truecrypt as being broken?

i use Serpent-Twofish-AES

http://www.truecrypt.org/docs/

if they can break through this quickly ill be suprised considering i use a 22 password with a mix of characters and numbers
(from truecrypts website)
Three ciphers in a cascade [15, 16] operating in XTS mode (see the section Modes of Operation). Each 128-bit block is first encrypted with AES (256-bit key) in XTS mode, then with Twofish (256-bit key) in XTS mode, and finally with Serpent (256-bit key) in XTS mode. Each of the cascaded ciphers uses its own key. All encryption keys are mutually independent (note that header keys are independent too, even though they are derived from a single password – see the section Header Key Derivation, Salt, and Iteration Count). See above for information on the individual cascaded ciphers.

 
Please dont forget that encryption is only as strong as the password password of 20 characters of types has better odds than people who use 1234 or password. The bigger the password the better chance you have, but as someone above has already state if you are zombied or you have a keylogger embedded, your screwed anyway.
 
[citation][nom]tethoma[/nom]They require you give them the pass phrase and or encryption key. Not sure what happens when you say no.[/citation]

Nothing. They cannot force you to cooperate with a investigation nor violate your right to not incriminate yourself.
 
This is why I never bring laptops back with me when traveling outside of the United States(of which I am a citizen). I also do not take laptops out of the country, either. I usually arrange for a laptop to be waiting for me in whatever country I am visiting and I just download and/or upload everything needed to a locally-based storage server.

Really, though, this is absolutely wrong and blatantly illegal. The U.S. Government is violating the U.S. Constitution and there seems to be no judge that is willing to stand up for the citizenry.
 
Correction... CHILD porn. Sad that a sicko is running around free.
[citation][nom]jerreece[/nom]And here I thought the whole point was to prevent terrorist attacks. Now we're going to search people's electronic devices for... porn and what, top secret materials?[/citation]
 
I thought it was going to be something about checking laptops to make sure they're not bombs, which I don't see a problem with as long they don't tear it open or something. But I think scanning private files is completely wrong and there's absolutely no reason for it.
 
You can just set up your home computer as a server and upload all your stuff. Then format your laptop hard drive. When they turn on your computer to search it and they get an error message shout, "Hey you broke it!"
 
why not add a hidden operating system using truecrypt.

im pretty sure you could make them think you just installed the operating system a few days ago with nothing on it

god you could probably do it on the plane
 
Truecrypt is uncrackable, except through brute force.
There are AES, Serpent and Twofish encryptions available, and if you cascade all three, you're off to a good start. Then, assuming you spend a good chunk of time creating your random seed, and create a non-excrypted, encrypted, and a encrypted-shadow partition, no worries. Of course, it helps to create seperate passwords at least 20 characters long and total gibberish, including punctuation marks and random non-alphabet symbols for both encrypted partitions. Then, store some seemingly sensitive data in the regular encrypted drive.
Now, a bigger concern is having stored any sensitive data on nonencrypted portions of a disk. If you have, then you're screwed. But then again, most people, even when they run Truecrypt, choose simple passwords that their family memberes can guess! Most of the time, security problems are in the user, not the system :)
 
You could just mail the dirty pics to yourself because customs are not allowed to open mail without the sniffing dogs barking. Why is this not allowed? Because it violates the right to privacy. Why should it be any different when you bring stuff with you at the airport?
 
It sounds like many of the commenters here are in favor of people being able to hold onto their child pornography. What's the deal? Anything you are bringing across the international border is subject to search. Expect it and get over it. I for one would rather have my stuff gone through and have kids safer world wide. Made it too dangerous to have the stuff and the market will get smaller.
 
knownalien:

REALLY??

http://belowthebeltway.com/2010/06/12/debunking-yet-another-birther-myth-the-case-of-tim-adams/
 
[citation][nom]John Stickler[/nom]I for one would rather have my stuff gone through and have kids safer world wide. Made it too dangerous to have the stuff and the market will get smaller.[/citation]

It would take anyone with basic knowledge of web design less than five minutes to make a web page that'll put a bunch of kiddy porn images and kiddy porn websites in your browser's cache and history without you even seeing them on the page. They just have to include them on the page and make them invisible so you don't see them but they'll still be visible in your browser cache and history folder when the authorities search your computer.

Imagine what hackers with viruses and trojans could do to you if for example your business partner/competitor/estranged wife hires them to put you in prison for a few years.

Imagine what a hotel employee could do if you leave your computer in your room.

Convicting people for pedophilia based on a few images on their computer is kind of like convicting people for drug trafficking based on the cocaine traces on their money or clothes.
 
Data Decryption hah! What a joke. If someone was hiding something worthy enough to encrypt they wouldn't use a 10 key password which would still take the full power of a supercomputer a chunk of time to brute force (which no federal agency would every allow unless it was vital to national security).

You're talking the average randomly generate key is 56 characters long. If they can break it, either there is a flaw in the encryption algorithem or a backdoor (which would break confidence in consumer based encryption across the board). I just find it hilarious the Government always trys to sound big and bad using scare tactics like our parents used on us as kids. "Mommy and Daddy know and see all and we'll ALWAYS find out kids!"

Bullshit, kiss my ass Feds. Seriously, you pricks have put yourself on a pedastol and one of these days this is all going to back fire on you all.
 
what's stopping a TSA worker from helping them self to the top secret xbox 720 plans on the laptop of the microsoft worker, then selling it to another company?
 
[citation][nom]drutort[/nom]i wonder how they plan to deal with cloud computing and other such of site data storage what will they say... hand over your password to your gmail account too? and other bank or other private things as well?were does it end?[/citation]

Those overweight morons at DHS/TSA dont even know what Mac Book air was and thought that its fake.

so u expect these morons to know what cloud computing is? sure. maybe 10-20 years later they would know what it is.
 
Status
Not open for further replies.