this post was submitted on 03 Jul 2023
217 points (100.0% liked)
Technology
23 readers
2 users here now
This magazine is dedicated to discussions on the latest developments, trends, and innovations in the world of technology. Whether you are a tech enthusiast, a developer, or simply curious about the latest gadgets and software, this is the place for you. Here you can share your knowledge, ask questions, and engage in discussions on topics such as artificial intelligence, robotics, cloud computing, cybersecurity, and more. From the impact of technology on society to the ethical considerations of new technologies, this category covers a wide range of topics related to technology. Join the conversation and let's explore the ever-evolving world of technology together!
founded 2 years ago
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
If we extend this thought experiment to a physical key, then that argument falls apart. A physical key is 'real or physical evidence', while a password (and apparently combinations?) ends up being considered 'testimonial', despite both serving the same function. While I may not be required to provide testimony against myself, I can be compelled to provide real of physical evidence. If, for instance, I have committed tax fraud, and my accountant has already told the IRS as much, but I have the only copies of the tax documents encrypted, I can be compelled to decrypt them, because the 'testimonial' value of the password is negligible since the gov't already knows that I have the fraudulent documents. But if they can't already demonstrate that they know what--roughly--the real evidence that's encrypted is, then no password for cops.
This seems inconsistent to me, since a password and a physical key serve the same function.