The promo for the Abit IC7-MAX 3 has this rather interesting claim:
For MAX3, the ABIT Engineers listened to users who were asking for information security. SecureIDE connects to your IDE hard disk and has a special decoder; without a special key, your hard disk cannot be opened by anyone. Thus hackers and would be information thieves cannot access your hard disk, even if they remove it from your PC. Protect your privacy and keep anyone from snooping into your information. Lock down your hard disk, not with a password, but with encryption. A password can be cracked by software in a few hours. ABIT’s SecureIDE will keep government supercomputers busy for weeks and will keep the RIAA away from your Kazaa files.
I’m afraid this is another leaky condom, and here’s why:
1) Locks don’t work when you leave the front door open. This device will encrypt your hard drive. Fine. All that means is that your computer (whether through a dedicated chip or a CPU) is going to be doing a whole lot of decrypting to do anything, including communications with the outside world. If you use a P2P network, share a drive and your system is set up to decrypt the information, this does absolutely nothing to stop an RIAA and Company scan.
You don’t let the RIAA in by having unencrypted data, you let them in by allowing sharing of your hard drive. If you don’t want RIAA looking at you, don’t share your hard drive.
I suppose it may be possible one way or the other to toss up encrypted files, but then what good does the results do any other P2Per? How the hell are they going to know what that file is?
Use public key/private key encryption? Just how are you going to distribute a private key over a P2P network? How could you know one or more of the recipients isn’t a member of RIAA and Company?
Sure, it’s possible to have a network of close-knit people who know and can vouch for each other, and that could well be quite secure. Until the first spy shows up. Then you’re all dead.
I’m not going to say that a tightly-knit small group wouldn’t be very likely to escape notice.
I will say that you couldn’t possibly keep spies out for any length of time in a mainstream public network where you’d have to distribute private keys like confetti.
here. To quote in part:
“In a criminal case, the suspect or defendant has the right to remain silent during questioning by police and prosecuting attorneys. In a criminal case, the defendant may choose to refuse to be a witness, and the jury may infer nothing from the defendant’s choice not to testify.
“However, in a civil case, the defendant must be available and cooperative for depositions and testimony as a witness in the trial. In fact, the defendant in a civil case in Federal court must voluntarily provide his/her opponent with a copy of documents “in the possession, custody, or control of the party that are relevant to disputed facts alleged with particularity in the pleadings” [Federal Rule of Civil Procedure 26(a)(1)(B)] . . . .
In other words, the defendant in a civil case must help his/her opponent collect evidence that will defeat the defendant. And, at trial, if a party invokes their fifth amendment privilege against self-incrimination, then the judge will instruct the jury that they may make an adverse inference against the party who refused to testify.”
In short, if you get asked for unencrypted records, and you refuse, at the very least, the judge will tell the jury to hold that against you (or do so him- or herself). If you’re not so lucky, you’ll be faced with a contempt of court charge, which would get you some jail time.
So RIAA and Company on the whole would probably like you to encrypt your files and think you’re safe. It actually sets you up to at least make you look bad in court, and maybe get you some jail time.
Encryption may be of some help in criminal trials. But RIAA and Company aren’t pursuing criminal cases. They’re pursuing civil cases, and the rules are quite different there. You don’t have the protections you likely think you have.