We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Crypto and Privacy Village - Giving Cops the Finger

00:00

Formal Metadata

Title
Crypto and Privacy Village - Giving Cops the Finger
Subtitle
Compelled Device Decryption and the Fifth Amendment
Title of Series
Number of Parts
335
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
You can unlock your smartphone with a passcode, your finger, even your face. When the cops demand you decrypt your phone or other device for them, can you successfully invoke your Fifth Amendment right against self-incrimination? Well, it depends. This talk quickly walks through the when, where, why, and how of compelled decryption and the Fifth Amendment under current case law. It ends with some practical takeaways, including "don't talk to the cops" and "stay out of Florida." BIO Riana Pfefferkorn is the Associate Director of Surveillance and Cybersecurity at the Stanford Center for Internet and Society. Her work focuses on investigating and analyzing the U.S. government's policy and practices for forcing decryption and/or influencing crypto-related design of online platforms and services, devices, and products, both via technical means and through the courts and legislatures.
CryptographyInformation privacyEncryption
Different (Kate Ryan album)
Category of beingForcePersonal digital assistantProcess (computing)
EncryptionComputer configurationPoint cloudBackupGoogol
SmartphoneDefault (computer science)Decision theoryPersonal digital assistantEncryptionPassword
PasswordRule of inferenceCAN busException handling
Existence
Content (media)Context awarenessEncryption
InformationIndian Remote Sensing
Sample (statistics)Fingerprint
Control flowProcess (computing)
PasswordEncryptionMathematical analysisComputer fileRight angleInformation
PasswordMathematical analysisException handling
Digital electronicsState of matter
FingerprintPasswordRule of inferenceUniform convergenceSingle-precision floating-point formatPredictabilityConsistencyData model
Convex hullBit
PasswordLoginPattern recognitionMultiplication signComputer configurationAsynchronous Transfer ModeAndroid (robot)
EncryptionRule of inference
Encryption
Mathematical analysisSample (statistics)Rule of inferenceCAN busPasswordException handlingCategory of beingForcePersonal digital assistantProcess (computing)CryptographyInformation privacyEncryption