top | item 24254701

(no title)

coleifer | 5 years ago

What are the use-cases, and when would such a policy have led to a drastically different outcome (in the case of a crime being committed, industrial espionage, or what-have-you)?

If I have a laptop encrypted with luks or whatever, then what? What are the consequences of non-compliance?

discuss

order

Shared404|5 years ago

Not sure why this got killed. I would like to have the answers to these questions myself.