http://arstechnica.com/tech-policy/n...-passwords.ars
So here's a new question... say you employed steganography, gave them the password, and they decrypted a seemingly benign filesystem.
If they asked you if there were additional filesystems at deeper steganographic layers, could you plead the fifth?
So here's a new question... say you employed steganography, gave them the password, and they decrypted a seemingly benign filesystem.
If they asked you if there were additional filesystems at deeper steganographic layers, could you plead the fifth?

Comment