For example, I have a Linux PDA. It has regular UNIX operating system security
features. It would probably be more secure if it was running something else. Yet, it
is nice that it runs a tty behind the PDA.
The root account has an unset password. I have the utilities to write to the boot
loader of the device, maybe the boot PROM. I connect to it with the serial port
terminal, I think it is a good PDA. Plus, I can write the software that I want to have
on it.
I think these computers are great, and they're mine, because I paid cash for them.
Ross
Ross A. Finlayson wrote:
> The PDA might contain the citizen's life-saving medical device. Any interference
> with personal electronics that threatens the health of the citizen is not allowed.
>
> Almost every single phone has a simple password of at least one letter or number.
> If you have reason to believe that you would care to use it, then you don't have to
> give it to anybody without a subpoena.
>
> Ross
>
> Michael M. Butler wrote:
>
> > Bear in mind that courts have so far said that it's OK for cops to read
> > your address book and the contents of your cellphone speed dial
> > directory during an ordinary search (not sure if that's search incident
> > to arrest, or the detainment "pat down"--I would hope it's the former,
> > since the pat down is supposed to be an officer safety issue. Well, hope
> > is too strong a word, but you get what I mean.).
> >
> > I don't know of any specific cases yet regarding PDAs, but the writing's
> > on the wall. Encrypt encrypt OK. And have off body backing store.
> >
> > GBurch1@aol.com wrote:
> > > Now, how would such a presumption impact police behavior? One, it would make
> > > them very careful not to interfere with a citizen's PDA, if she had one.
> > > Two, it would encourage people who believe that they might be subject to
> > > improper police behavior to get and maintain PDAs. Three, it would encourage
> > > the police to develop and maintain the best possible recording equipment,
> > > with the best possible security against tampering - by the police or anyone
> > > else. Finally, it would create on the part of the government a keen interest
> > > in the development and implementation of secure, tamper-proof data protocols
> > > for EVERYONE, police and citizen alike.
> > >
> > > Criticisms?
> > >
> > > Greg Burch <GBurch1@aol.com>----<gburch@lockeliddell.com>
> > > Attorney ::: Vice President, Extropy Institute ::: Wilderness Guide
> > > http://users.aol.com/gburch1 -or- http://members.aol.com/gburch1
> > > ICQ # 61112550
> > > "We never stop investigating. We are never satisfied that we know
> > > enough to get by. Every question we answer leads on to another
> > > question. This has become the greatest survival trick of our species."
> > > -- Desmond Morris
>
> --
> Ross Andrew Finlayson
> Finlayson Consulting
> Ross at Tiki-Lounge: http://www.tiki-lounge.com/~raf/
> Confucious says, "My name is Confucious."
-- Ross Andrew Finlayson Finlayson Consulting Ross at Tiki-Lounge: http://www.tiki-lounge.com/~raf/ Confucious says, "My name is Confucious."
This archive was generated by hypermail 2b30 : Mon May 28 2001 - 09:56:35 MDT