Secret Services Cracks Encrypted Evidence
Found on Slashdot on Monday, 28 March 2005
The Washington Post offers this writeup about how the U.S. Secret Service uses a Distributed Network Attack program to crack encryption on computers and drives seized as evidence. How can brute force still succeed with 256-bit encryption, you ask? Customized password dictionaries from the seized computer's email files and browser cache: People still use non-random passwords.
Oh, and on a side note: I was planning to link directly to the Washington Post, but getting bombed with cookies and a forced registration doesn't win my sympathies. So this link goes to Slashdot instead.