Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


View this topic in a long page with up to 500 replies per page Create new topic
1 | 2 
Glurp
9226 posts

Uber Geek
+1 received by user: 4277

Subscriber

  Reply # 1661929 1-Nov-2016 11:20
Send private message

I forget my passwords all the time. Hard to see how they can criminalise that.

 

 





I reject your reality and substitute my own. - Adam Savage
 


4773 posts

Uber Geek
+1 received by user: 2254

Trusted
Subscriber

  Reply # 1661939 1-Nov-2016 11:27
Send private message

Rikkitic:

 

I forget my passwords all the time. Hard to see how they can criminalise that.

 

 

 

 

 

 

Same way they criminalise not paying taxes you didn't know you owed or complying with any random law you weren't aware of: they just do. Because otherwise you'd just claim to not know/have forgotten everything.





iPad Pro 11" + iPhone SE + 2degrees 4tw!

 

These comments are my own and do not represent the opinions of 2degrees.


 
 
 
 


933 posts

Ultimate Geek
+1 received by user: 367

Subscriber

  Reply # 1662031 1-Nov-2016 13:43
One person supports this post
Send private message

I have the same issue with this now as I did in the other epic thread on the subject last year, namely:

 

People's entire lives have been digitalized and being 'forced' to hand over your device password to someone at a border is tantamount to handing them house keys and allowing them to search it from top to bottom and nose through whatever documents, items or effects they may find - relevant or otherwise.

 

Regardless of what they may suspect you of (and regardless of whether you are actually guilty of it!) surrendering access to a potentially vast trove of personal data - most of which is likely way beyond the jurisdiction and remit of a customs officer anyway - is fundamentally unacceptable and I would hazard, potentially unenforceable if legally challenged.

 

What about the controls in place to govern what they can and cannot look at or copy? How is this policed? What if a naive individual has used the same credentials for other cloud or remote services and an investigating officer uses those to gain access to systems and information beyond the local device?

 

Finally and as others have mentioned, anyone with nefarious intentions who is even remotely technically savvy would never put themselves in a position where this kind of investigative process would produce a single shred of useful or incriminating information.

 

 

 

'tis nonsense.





.

1 | 2 
View this topic in a long page with up to 500 replies per page Create new topic



Twitter »

Follow us to receive Twitter updates when new discussions are posted in our forums:



Follow us to receive Twitter updates when news items and blogs are posted in our frontpage:



Follow us to receive Twitter updates when tech item prices are listed in our price comparison site:



Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.


Geekzone Live »

Our community of supporters help make Geekzone possible. Click the button below to join them.

Support Geezone on PressPatron



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.

Alternatively, you can receive a daily email with Geekzone updates.