On Tuesday, September 12, 2017, 10:14:47 PM PDT, grarpamp wrote: [1]https://arstechnica.com/tech-policy/2017/09/judge-wont-release-man-j ailed-2-years-for-refusing-to-decrypt-drives/ [2]https://arstechnica.com/tech-policy/2017/03/man-jailed-indefinitely- for-refusing-to-decrypt-hard-drives-loses-appeal/ [3]https://arstechnica.com/wp-content/uploads/2017/09/rawlsstaysinpriso nruling.pdf [4]https://arstechnica.com/wp-content/uploads/2017/05/rawlsrehearingpet ition.pdf [5]https://cdn.arstechnica.net/wp-content/uploads/2017/03/rawlsopinion. pdf [6]https://cdn.arstechnica.net/wp-content/uploads/2016/04/comply.pdf >Judge won't release man jailed 2 years for refusing to decrypt drives, suspect to remain jailed pending 5th Amendment appeal to Supreme Court. [7]https://arstechnica.com/tech-policy/2017/05/jail-looms-large-for-sus pects-ordered-to-reveal-forgotten-passwords/ >Is I forget a valid defense when court orders demand a smartphone password? The answer seems to be yes and no. But one suspect on Tuesday gets 180 days jail. This has probably been discussed before, many times, my current thought is that devices which depend on passwords should pick up an additional hard-to-guess combination, through your local Wifi. Separate your device from this stream for "too long", and your usual passwords will cease to work. At that point, you'll have to enter a code: Fanciful example: Get a scientific calculator. Enter a 10 digit number you'll remember: Example: 1234567890. Press a function, say SQRT. Then press another, say Log(10), then press Sin(x). (or any other series of unary operations, and of whatever quantity and order.) The resulting 10-digit code is what you have to add, in addition to your usual code, to return that device to proper functioning. Or, the last two 10-digit codes. These numbers are at least conceivably memorizable, but in practice few would attempt to memorize them. If you are put into a position where they demand to get the code, the lawyer says, "The device is regularly fed by wireless means, keeping it unlocked and ready for presentation of a password. After days in authorities' hands, the device has "decided" that it is no longer "safe", and has locked itself. The use of his usual password will not unlock the device. My client, on a regular basis, does not rely on his memory to return the device to functioning, he needs other means which are not available to him now, and will not be employed while he is in custody." Jim Bell References 1. https://arstechnica.com/tech-policy/2017/09/judge-wont-release-man-jailed-2-years-for-refusing-to-decrypt-drives/ 2. https://arstechnica.com/tech-policy/2017/03/man-jailed-indefinitely-for-refusing-to-decrypt-hard-drives-loses-appeal/ 3. https://arstechnica.com/wp-content/uploads/2017/09/rawlsstaysinprisonruling.pdf 4. https://arstechnica.com/wp-content/uploads/2017/05/rawlsrehearingpetition.pdf 5. https://cdn.arstechnica.net/wp-content/uploads/2017/03/rawlsopinion.pdf 6. https://cdn.arstechnica.net/wp-content/uploads/2016/04/comply.pdf 7. https://arstechnica.com/tech-policy/2017/05/jail-looms-large-for-suspects-ordered-to-reveal-forgotten-passwords/