ChasingMoxie
Member
- Joined
- Jan 7, 2009
- Messages
- 394
- Reaction score
- 17
It would be a waste of time to try to crack strong encryption on Josh's drive. If they had people assigned to that task, most likely they were trying to automate a correct guess of his password(s). Strong encryption cannot currently be broken, and Josh was most likely using strong encryption. I would be pretty upset if they wasted resources trying to break an encryption algorithm that is currently undergoing unsuccessful cracking attempts with incredible amounts of computing power all over the world - there are far better ways to expend those resources.
In a lawless world, they would have the team work on a targeted client side attack on Josh's systems/phones to gather information useful towards greater penetration of his confiscated systems, but there are laws in place that prevent the good guys (LE) from taking that route.
Anyway, I just wanted to post really quick to say that HotLavaJavas is correct, the encryption cannot be cracked. That's how good encryption works - even knowing the algorithm you still can't decrypt encrypted data without the right key pair.
ETA: This is actually a similar situation to old DNA cases - because as computing power increases, encryption technology advances - so as with trace DNA evidence, they have hopefully imaged the drive, and they can store that until a future date when perhaps the encryption technologies have advanced beyond where we are now.
In a lawless world, they would have the team work on a targeted client side attack on Josh's systems/phones to gather information useful towards greater penetration of his confiscated systems, but there are laws in place that prevent the good guys (LE) from taking that route.
Anyway, I just wanted to post really quick to say that HotLavaJavas is correct, the encryption cannot be cracked. That's how good encryption works - even knowing the algorithm you still can't decrypt encrypted data without the right key pair.
ETA: This is actually a similar situation to old DNA cases - because as computing power increases, encryption technology advances - so as with trace DNA evidence, they have hopefully imaged the drive, and they can store that until a future date when perhaps the encryption technologies have advanced beyond where we are now.