There are two distinct questions. Are vpn providers *legally* required to keep logs? Do vpn providers keep logs even absent a legal requirement?...
No, it's not a distinction without a difference. Preponderance of evidence or more likely than not does not require 'proof' in the scientific or...
More likely than not is a term of art used to state that the evidence for X is more likely than the evidence for Y i.e. 51 to 49. It's just...
Not quite. The 11th Circuit considered Fricosu but found it distinguishable:...
Consider the broader principle rather than the constitutional right. Yes the Fifth Amendment is American, but the same principle that you can't...
Under the foregone conclusion test, location and custody is also a requirement which must be proven apart from existence. Mere speculation that...
Let me quote the original poster: The Truecrypt documentation which you cite seeks to distinguish between file based containers and full disk...
It's a daft analogy, because if I can prove (1) That my program exists; (2) That it performs the action that I claim it does -- namely using an...
Sorry, what I meant was that you could write a database application using the same headerless random datafile for storing innocent stuff in...
Sorry, but the Truecrypt documentation is not an exclusive authority for plausible reasons for possessing random data. There are several reasons...
I have been unable to find any marketing material by Bittorrent asserting that Bleep is NSA proof. Please post any primary source if you have...
What I find most concerning is that the suspect was already a convicted sex offender. No doubt that he should not enjoy the freedom to walk the...
But a cloud service can only compare file hashes, if it scans and retains this information in the first place. In other words, in order to...
Most likely no human spotted the images, more likely the image was scanned automatically by Google's child abuse filter. This has gone on for...
Sorry to say it, but Japan's copyright law has little in common with the DMCA. - Japan imposes criminal penalties which are harsher than any IP...
It's not really the encryption algorithm having an expiration. You can't protect stale data by expiring the encryption key. Anyone claiming that...
Another case from the UK - a conviction under RIPA S.49: of note is that the state could not prove the suspect guilty of sending the messages but...
Proxy servers drive probe to dead end Interesting story about how proxy servers in multiple jurisdictions frustrate enforcement of India's...
Victory for Federal Express Corp upholding immunity under § 230. with implications for proxy servers The case is Miller v. Federal Express Corp....
Sorry, but let me chime in. When a vpn provider states it blocks p2p I don't think it literally means blocking of all peer to peer trafick. Such...
Yes, as I also pointed out providing false information to an agent of the federal government is a crime, and the FBI loves this statute because it...
More plausible deniability strategies for fun and profit: (1) Create two or more user accounts on the computer hosting the outer encrypted...
One additional reason for never divulging any information to law enforcement about one's setup, is that admitting to possession and the ability to...
Not divulging information is important, but equally important is knowing how to interact with law enforcement. Section 1001 of Title 18 provides:...
This thread is not about helping criminals but about helping people not to be compelled to incriminate themselves. Compelled self incrimination...
Separate names with a comma.