Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


View this topic in a long page with up to 500 replies per page Create new topic
1 | 2 
Rikkitic
Awrrr
19065 posts

Uber Geek
+1 received by user: 16305

Lifetime subscriber

  #1661929 1-Nov-2016 11:20
Send private message

I forget my passwords all the time. Hard to see how they can criminalise that.

 

 





Plesse igmore amd axxept applogies in adbance fir anu typos

 


 




SaltyNZ
8865 posts

Uber Geek
+1 received by user: 9545

Trusted
2degrees
Lifetime subscriber

  #1661939 1-Nov-2016 11:27
Send private message

Rikkitic:

 

I forget my passwords all the time. Hard to see how they can criminalise that.

 

 

 

 

 

 

Same way they criminalise not paying taxes you didn't know you owed or complying with any random law you weren't aware of: they just do. Because otherwise you'd just claim to not know/have forgotten everything.





iPad Pro 11" + iPhone 15 Pro Max + 2degrees 4tw!

 

These comments are my own and do not represent the opinions of 2degrees.


Item
1739 posts

Uber Geek
+1 received by user: 726

Subscriber

  #1662031 1-Nov-2016 13:43
Send private message

I have the same issue with this now as I did in the other epic thread on the subject last year, namely:

 

People's entire lives have been digitalized and being 'forced' to hand over your device password to someone at a border is tantamount to handing them house keys and allowing them to search it from top to bottom and nose through whatever documents, items or effects they may find - relevant or otherwise.

 

Regardless of what they may suspect you of (and regardless of whether you are actually guilty of it!) surrendering access to a potentially vast trove of personal data - most of which is likely way beyond the jurisdiction and remit of a customs officer anyway - is fundamentally unacceptable and I would hazard, potentially unenforceable if legally challenged.

 

What about the controls in place to govern what they can and cannot look at or copy? How is this policed? What if a naive individual has used the same credentials for other cloud or remote services and an investigating officer uses those to gain access to systems and information beyond the local device?

 

Finally and as others have mentioned, anyone with nefarious intentions who is even remotely technically savvy would never put themselves in a position where this kind of investigative process would produce a single shred of useful or incriminating information.

 

 

 

'tis nonsense.





.

1 | 2 
View this topic in a long page with up to 500 replies per page Create new topic








Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.