<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Decent Project</title>
    <link>https://decentproject.org/</link>
    <description>*Privacy. Autonomy. Civil Liberties.*</description>
    <pubDate>Sat, 18 Apr 2026 22:30:31 +0000</pubDate>
    <image>
      <url>https://i.snap.as/eEu6bhjy.ico</url>
      <title>Decent Project</title>
      <link>https://decentproject.org/</link>
    </image>
    <item>
      <title>It&#39;s been 30 years since Barlow&#39;s Declaration of Cyber Independence -- does it still matter?</title>
      <link>https://decentproject.org/its-been-30-years-since-barlows-declaration-of-cyber-independence-does-it?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[  Quick Look&#xA;  • Barlow penned his bold and controversial take on the future of the Internet 30 years ago.&#xA;  • Many of Barlow&#39;s predictions about the capabilities of the Internet to remain free have not panned out and unforseen threats have cropped up.&#xA;  • But, it&#39;s hard not to feel his central thesis can still be achieved--though perhaps, only if you chose it.&#xA;&#xA;Today marks 30 years since John Perry Barlow--co-founder of the Electronic Frontier Foundation--opened his laptop at the 1996 Economic World Forum in Davos and a href=&#34;https://www.eff.org/cyberspace-independence&#34; target=&#34;blank&#34;penned an unforgiving declaration of independence for the Internet/a.&#xA;&#xA;Now, three decades later, as the Internet has come to dominate our lives and is in a crucial period of transition, it&#39;s a good time to reflect on Barlow&#39;s early vision of the Internet and how it might guide the Internet&#39;s future.&#xA;&#xA;There are, no doubt, many parts of his declaration that simply haven&#39;t come true, but I can&#39;t help thinking that the spirit of Barlow&#39;s message can be achieved--at least for those who might be willing to seize it.&#xA;&#xA;A Declaration of the Independence of Cyberspace by John Perry Barlow, February 8, 1996&#xA;A Declaration of the Independence of Cyberspace by John Perry Barlow, February 8, 1996&#xA;!--more--&#xA;Barlow&#39;s Declaration&#xA;&#xA;There are a lot of ways to describe Barlow&#39;s a href=&#34;https://www.eff.org/cyberspace-independence&#34; target=&#34;blank&#34;iA Declaration of the Independence of Cyberspace/i/a.&#xA;&#xA;Lofty, inspiring, and courageous might come to mind. But so might pompous, blow-hard, specious and grandiloquent.&#xA;&#xA;When Barlow wrote his declaration, the Internet was a very different place. Most homes, if they had computers at all, put them in &#34;computer rooms.&#34; The idea that every individual would have their own computer--let alone multiple--connected to the Internet at all times wasn&#39;t yet a thing. Total Internet users were a href=&#34;https://www.visualcapitalist.com/visualized-the-growth-of-global-internet-users-1990-2025/&#34; target=&#34;blank&#34;counted in the millions, rather than billions/a.&#xA;&#xA;Google had a href=&#34;https://about.google/company-info/our-story/&#34; target=&#34;blank&#34;not yet been founded/a, and social media, a href=&#34;https://bitcoin.org/en/bitcoin-paper&#34; target=&#34;blank&#34;cryptocurrency/a, and a href=&#34;https://www.forbes.com/sites/bernardmarr/2023/05/19/a-short-history-of-chatgpt-how-we-got-to-where-we-are-today/&#34; target=&#34;blank&#34;generative AI/a were many years away.&#xA;&#xA;Yet, Barlow made a href=&#34;https://www.eff.org/cyberspace-independence&#34; target=&#34;blank&#34;bold declarations/a about the capabilities of cyberspace to flourish, and governments&#39; inability to contain it:&#xA;&#xA;  &#34;You have no moral right to rule us nor do you possess any methods of enforcement we have true reason to fear.&#34;&#xA;&#xA;He claims that cyberspace exists without borders and outside jurisdictions:&#xA;&#xA;  &#34;Our identities may be distributed across many of your jurisdictions. The only law that all our constituent cultures would generally recognize is the Golden Rule.&#34;&#xA;&#xA;While in spirit, some of these declarations may be true. I think most would disagree with Barlow&#39;s claim that governments do not possess &#34;any&#34; methods of enforcing their laws on the Internet, and that because users are distributed around the globe that jurisdictions are rendered meaningless.&#xA;&#xA;Governments around the world have spent the last three decades working to reign in the Internet and enforce laws on its users. In China, the country&#39;s a href=&#34;https://www.britannica.com/topic/Great-Firewall&#34; target=&#34;blank&#34;Great Firewall/a heavily regulates the country&#39;s domestic Internet. Iran recently a href=&#34;https://blog.cloudflare.com/iran-protests-internet-shutdown/&#34; target=&#34;blank&#34;disconnected its country from the world&#39;s Internet/a amid widespread protests.&#xA;&#xA;And in the West, the United States and Europe have been on foolhardy campaigns to institute a href=&#34;https://apnews.com/article/internet-age-verification-supreme-court-def346d7bf299566a3687d8c4f224fec&#34; target=&#34;blank&#34;age verification laws/a, a href=&#34;https://www.cnet.com/tech/services-and-software/as-lawmakers-take-aim-at-vpns-the-privacy-of-millions-could-be-jeopardized/&#34; target=&#34;blank&#34;crackdown on VPNs/a, and a href=&#34;https://www.eff.org/deeplinks/2025/12/after-years-controversy-eus-chat-control-nears-its-final-hurdle-what-know&#34; target=&#34;blank&#34;backdoor end-to-end encryption/a on popular messaging services. &#xA;&#xA;The United States has incredible influence to enforce its criminal laws concerning computer crimes well beyond its geographic borders.&#xA;&#xA;Alexandre Cazes of notorious AlphaBay fame a href=&#34;https://www.wired.com/story/alphabay-series-part-5-takedown/&#34; target=&#34;blank&#34;was arrested in Thailand/a, while Kim Dotcom of Megaupload a href=&#34;https://www.cbsnews.com/news/kim-dotcom-us-extradition-megaupload-charges-appeal-denied/&#34; target=&#34;blank&#34;was arrested in New Zealand/a--both on U.S. warrants. Julian Assange spent seven years in the Ecuadorian Embassy in London to avoid arrest by the U.S. and other western countries, and Edward Snowden fled to Russia in 2013 to avoid prosecution.&#xA;&#xA;Additionally, Barlow&#39;s declaration did not predict the considation of the Internet and how that has impacted online freedom.&#xA;&#xA;Over the past 30 years we have seen the giants of the Internet rise and take hold: Google, Meta, Apple, Microsoft, X/Twitter, and Amazon.&#xA;&#xA;They operate as proxy governments online, enforcing terms of service and privacy policies that limit expression and pry into every aspect of our lives.&#xA;&#xA;They have disrupted industries in the real world and online, baited our society and culture with &#34;free&#34; services, and sunk their tentacles into our communications, our jobs, our banking, our health, our entertainment, and even our frontdoors and living rooms.&#xA;&#xA;Digital town squares and convenience have given way to hive-minds and dependence.&#xA;&#xA;But for those who want it...&#xA;&#xA;In re-reading a href=&#34;https://www.eff.org/cyberspace-independence&#34; target=&#34;blank&#34;Barlow&#39;s declaration/a today, it&#39;s hard not to question whether there remains the kind of freedom online that Barlow describes.&#xA;&#xA;There are threats to Internet freedom on all sides, as society moves into this post-modern era we find ourselves.&#xA;&#xA;Yet, I can&#39;t help but agree with Barlow&#39;s claim that the Internet is &#34;an act of nature and it grows itself through our collective actions.&#34; &#xA;&#xA;In Iran, as the government shut down access to the Internet, people a href=&#34;https://www.npr.org/2026/01/15/nx-s1-5678567/iran-internet-blackout-starlink&#34; target=&#34;blank&#34;started setting up Starlink connections/a to reach the global Internet; people in China have used VPNs and international SIM cards to circumvent the country&#39;s firewall for years; and age restriction laws in the United States are a href=&#34;https://cybernews.com/best-vpn/vpn-for-age-verification/&#34; target=&#34;blank&#34;easily avoided with a VPN/a or a href=&#34;https://www.torproject.org/&#34; target=&#34;blank&#34;TOR browser/a.&#xA;&#xA;The more restrictions that governments attempt, the more they push people toward alternatives. &#xA;&#xA;The same goes for corporations. &#xA;&#xA;Some have sought refuge from Microsoft&#39;s unwanted and invasive AI features a href=&#34;https://www.zdnet.com/article/linux-has-over-6-of-the-desktop-market-yes-you-read-that-right-heres-how/&#34; target=&#34;blank&#34;by moving to Linux/a. Others have ditched Google for a href=&#34;https://proton.me/mail&#34; target=&#34;blank&#34;Proton/a or a href=&#34;https://mail.tutanota.com/&#34; target=&#34;blank&#34;Tuta/a. Others still, have left behind centralized social media for the a href=&#34;https://jointhefediverse.net/learn/?lang=en-us&#34; target=&#34;blank&#34;Fediverse/a.&#xA;Linux desktop usage topped 5% globally in 2025&#xA;Linux desktop usage topped 5% globally in 2025&#xA;&#xA;An unheeded plea&#xA;&#xA;We have to ask whether Barlow&#39;s declaration is really a declaration, or is it more of a plea? &#xA;&#xA;The a href=&#34;https://www.eff.org/cyberspace-independence&#34; target=&#34;blank&#34;second sentence of his declaration/a is a request: &#34;I ask you of the past to leave us alone.&#34;&#xA;&#xA;Unfortunately, I think it&#39;s safe to say this plea has not--and will not--be respected. Governments are not going to step away from the Internet and corporations are not going stop maximizing their control and revenue.&#xA;&#xA;Yet, for those who are willing to break free from governments and the centralized control of corporations online, there are still ways to make the best of Barlow&#39;s vision a reality:&#xA;&#xA;  &#34;We are creating a world where anyone, anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence or conformity.&#34;&#xA;&#xA;~ Torman&#xA;psmallVerify this post: a href=&#34;https://github.com/decentproject/Signatures/blob/main/thirtyyearssincebarlowsdeclaration.md&#34; target=&#34;blank&#34;Source/a | a href=&#34;https://github.com/decentproject/Signatures/blob/main/thirtyyearssincebarlowsdeclaration.md.asc&#34; target=&#34;blank&#34;Signature/a | a href=&#34;https://github.com/decentproject/Signatures/blob/main/torman-pgp-key.asc&#34; target=&#34;blank&#34;PGP Key/a/small/p&#xA;&#xA;#privacy #Internet #policy #InternetFreedom&#xA;&#xA;---&#xA;&#xA;If you enjoyed reading this or found it informative, please consider subscribing in order to receive posts directly to your inbox:&#xA;!--emailsub--&#xA;&#xA;Also feel free to leave a comment here:  a href=&#34;https://remark.as/p/decentproject.org/its-been-30-years-since-barlows-declaration-of-cyber-independence-does-it&#34;Discuss.../a&#xA;&#xA;]]&gt;</description>
      <content:encoded><![CDATA[<blockquote><p><strong>Quick Look</strong>
• Barlow penned his bold and controversial take on the future of the Internet 30 years ago.
• Many of Barlow&#39;s predictions about the capabilities of the Internet to remain free have not panned out and unforseen threats have cropped up.
• But, it&#39;s hard not to feel his central thesis can still be achieved—though perhaps, only if you chose it.</p></blockquote>

<p>Today marks 30 years since John Perry Barlow—co-founder of the Electronic Frontier Foundation—opened his laptop at the 1996 Economic World Forum in Davos and <a href="https://www.eff.org/cyberspace-independence" target="_blank" rel="nofollow noopener">penned an unforgiving declaration of independence for the Internet</a>.</p>

<p>Now, three decades later, as the Internet has come to dominate our lives and is in a crucial period of transition, it&#39;s a good time to reflect on Barlow&#39;s early vision of the Internet and how it might guide the Internet&#39;s future.</p>

<p>There are, no doubt, many parts of his declaration that simply haven&#39;t come true, but I can&#39;t help thinking that the spirit of Barlow&#39;s message can be achieved—<em>at least for those who might be willing to seize it</em>.</p>

<p><img src="https://i.snap.as/JKtRI4OZ.png" alt="A Declaration of the Independence of Cyberspace by John Perry Barlow, February 8, 1996"/>
<em>A Declaration of the Independence of Cyberspace by John Perry Barlow, February 8, 1996</em>
</p>

<h3 id="barlow-s-declaration" id="barlow-s-declaration">Barlow&#39;s Declaration</h3>

<p>There are a lot of ways to describe Barlow&#39;s <a href="https://www.eff.org/cyberspace-independence" target="_blank" rel="nofollow noopener"><i>A Declaration of the Independence of Cyberspace</i></a>.</p>

<p>Lofty, inspiring, and courageous might come to mind. But so might pompous, blow-hard, specious and grandiloquent.</p>

<p>When Barlow wrote his declaration, the Internet was a very different place. Most homes, if they had computers at all, put them in “computer rooms.” The idea that every individual would have their own computer—let alone multiple—connected to the Internet at all times wasn&#39;t yet a thing. Total Internet users were <a href="https://www.visualcapitalist.com/visualized-the-growth-of-global-internet-users-1990-2025/" target="_blank" rel="nofollow noopener">counted in the millions, rather than billions</a>.</p>

<p>Google had <a href="https://about.google/company-info/our-story/" target="_blank" rel="nofollow noopener">not yet been founded</a>, and social media, <a href="https://bitcoin.org/en/bitcoin-paper" target="_blank" rel="nofollow noopener">cryptocurrency</a>, and <a href="https://www.forbes.com/sites/bernardmarr/2023/05/19/a-short-history-of-chatgpt-how-we-got-to-where-we-are-today/" target="_blank" rel="nofollow noopener">generative AI</a> were many years away.</p>

<p>Yet, Barlow made <a href="https://www.eff.org/cyberspace-independence" target="_blank" rel="nofollow noopener">bold declarations</a> about the capabilities of cyberspace to flourish, and governments&#39; inability to contain it:</p>

<blockquote><p>“You have no moral right to rule us nor do you possess any methods of enforcement we have true reason to fear.”</p></blockquote>

<p>He claims that cyberspace exists without borders and outside jurisdictions:</p>

<blockquote><p>“Our identities may be distributed across many of your jurisdictions. The only law that all our constituent cultures would generally recognize is the Golden Rule.”</p></blockquote>

<p>While in spirit, some of these declarations may be true. I think most would disagree with Barlow&#39;s claim that governments do not possess “any” methods of enforcing their laws on the Internet, and that because users are distributed around the globe that jurisdictions are rendered meaningless.</p>

<p>Governments around the world have spent the last three decades working to reign in the Internet and enforce laws on its users. In China, the country&#39;s <a href="https://www.britannica.com/topic/Great-Firewall" target="_blank" rel="nofollow noopener">Great Firewall</a> heavily regulates the country&#39;s domestic Internet. Iran recently <a href="https://blog.cloudflare.com/iran-protests-internet-shutdown/" target="_blank" rel="nofollow noopener">disconnected its country from the world&#39;s Internet</a> amid widespread protests.</p>

<p>And in the West, the United States and Europe have been on foolhardy campaigns to institute <a href="https://apnews.com/article/internet-age-verification-supreme-court-def346d7bf299566a3687d8c4f224fec" target="_blank" rel="nofollow noopener">age verification laws</a>, <a href="https://www.cnet.com/tech/services-and-software/as-lawmakers-take-aim-at-vpns-the-privacy-of-millions-could-be-jeopardized/" target="_blank" rel="nofollow noopener">crackdown on VPNs</a>, and <a href="https://www.eff.org/deeplinks/2025/12/after-years-controversy-eus-chat-control-nears-its-final-hurdle-what-know" target="_blank" rel="nofollow noopener">backdoor end-to-end encryption</a> on popular messaging services.</p>

<p>The United States has incredible influence to enforce its criminal laws concerning computer crimes well beyond its geographic borders.</p>

<p>Alexandre Cazes of notorious AlphaBay fame <a href="https://www.wired.com/story/alphabay-series-part-5-takedown/" target="_blank" rel="nofollow noopener">was arrested in Thailand</a>, while Kim Dotcom of Megaupload <a href="https://www.cbsnews.com/news/kim-dotcom-us-extradition-megaupload-charges-appeal-denied/" target="_blank" rel="nofollow noopener">was arrested in New Zealand</a>—both on U.S. warrants. Julian Assange spent seven years in the Ecuadorian Embassy in London to avoid arrest by the U.S. and other western countries, and Edward Snowden fled to Russia in 2013 to avoid prosecution.</p>

<p>Additionally, Barlow&#39;s declaration did not predict the considation of the Internet and how that has impacted online freedom.</p>

<p>Over the past 30 years we have seen the giants of the Internet rise and take hold: Google, Meta, Apple, Microsoft, X/Twitter, and Amazon.</p>

<p>They operate as proxy governments online, enforcing terms of service and privacy policies that limit expression and pry into every aspect of our lives.</p>

<p>They have disrupted industries in the real world and online, baited our society and culture with “free” services, and sunk their tentacles into our communications, our jobs, our banking, our health, our entertainment, and even our frontdoors and living rooms.</p>

<p>Digital town squares and convenience have given way to hive-minds and dependence.</p>

<h3 id="but-for-those-who-want-it" id="but-for-those-who-want-it">But for those who want it...</h3>

<p>In re-reading <a href="https://www.eff.org/cyberspace-independence" target="_blank" rel="nofollow noopener">Barlow&#39;s declaration</a> today, it&#39;s hard not to question whether there remains the kind of freedom online that Barlow describes.</p>

<p>There are threats to Internet freedom on all sides, as society moves into this post-modern era we find ourselves.</p>

<p>Yet, I can&#39;t help but agree with Barlow&#39;s claim that the Internet is “an act of nature and it grows itself through our collective actions.”</p>

<p>In Iran, as the government shut down access to the Internet, people <a href="https://www.npr.org/2026/01/15/nx-s1-5678567/iran-internet-blackout-starlink" target="_blank" rel="nofollow noopener">started setting up Starlink connections</a> to reach the global Internet; people in China have used VPNs and international SIM cards to circumvent the country&#39;s firewall for years; and age restriction laws in the United States are <a href="https://cybernews.com/best-vpn/vpn-for-age-verification/" target="_blank" rel="nofollow noopener">easily avoided with a VPN</a> or <a href="https://www.torproject.org/" target="_blank" rel="nofollow noopener">TOR browser</a>.</p>

<p>The more restrictions that governments attempt, the more they push people toward alternatives.</p>

<p>The same goes for corporations.</p>

<p>Some have sought refuge from Microsoft&#39;s unwanted and invasive AI features <a href="https://www.zdnet.com/article/linux-has-over-6-of-the-desktop-market-yes-you-read-that-right-heres-how/" target="_blank" rel="nofollow noopener">by moving to Linux</a>. Others have ditched Google for <a href="https://proton.me/mail" target="_blank" rel="nofollow noopener">Proton</a> or <a href="https://mail.tutanota.com/" target="_blank" rel="nofollow noopener">Tuta</a>. Others still, have left behind centralized social media for the <a href="https://jointhefediverse.net/learn/?lang=en-us" target="_blank" rel="nofollow noopener">Fediverse</a>.
<img src="https://i.snap.as/zEWNT5nF.png" alt="Linux desktop usage topped 5% globally in 2025"/>
<em>Linux desktop usage topped 5% globally in 2025</em></p>

<h3 id="an-unheeded-plea" id="an-unheeded-plea">An unheeded plea</h3>

<p>We have to ask whether Barlow&#39;s declaration is really a declaration, or is it more of a plea?</p>

<p>The <a href="https://www.eff.org/cyberspace-independence" target="_blank" rel="nofollow noopener">second sentence of his declaration</a> is a request: <em>“I ask you of the past to leave us alone.”</em></p>

<p>Unfortunately, I think it&#39;s safe to say this plea has not—and will not—be respected. Governments are not going to step away from the Internet and corporations are not going stop maximizing their control and revenue.</p>

<p>Yet, for those who are willing to break free from governments and the centralized control of corporations online, there are still ways to make the best of Barlow&#39;s vision a reality:</p>

<blockquote><p>“We are creating a world where anyone, anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence or conformity.”</p></blockquote>

<p>~ Torman
<p><small>Verify this post: <a href="https://github.com/decentproject/Signatures/blob/main/thirty_years_since_barlows_declaration.md" target="_blank" rel="nofollow noopener">Source</a> | <a href="https://github.com/decentproject/Signatures/blob/main/thirty_years_since_barlows_declaration.md.asc" target="_blank" rel="nofollow noopener">Signature</a> | <a href="https://github.com/decentproject/Signatures/blob/main/torman-pgp-key.asc" target="_blank" rel="nofollow noopener">PGP Key</a></small></p></p>

<p><a href="https://decentproject.org/tag:privacy" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">privacy</span></a> <a href="https://decentproject.org/tag:Internet" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">Internet</span></a> <a href="https://decentproject.org/tag:policy" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">policy</span></a> <a href="https://decentproject.org/tag:InternetFreedom" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">InternetFreedom</span></a></p>

<hr/>

<p>If you enjoyed reading this or found it informative, please consider subscribing in order to receive posts directly to your inbox:
</p>

<p>Also feel free to leave a comment here:  <a href="https://remark.as/p/decentproject.org/its-been-30-years-since-barlows-declaration-of-cyber-independence-does-it" rel="nofollow">Discuss...</a></p>
]]></content:encoded>
      <guid>https://decentproject.org/its-been-30-years-since-barlows-declaration-of-cyber-independence-does-it</guid>
      <pubDate>Sun, 08 Feb 2026 15:08:28 +0000</pubDate>
    </item>
    <item>
      <title>An FBI raid on a reporter’s home shows the problem with biometrics</title>
      <link>https://decentproject.org/an-fbi-raid-on-a-reporters-home-shows-the-problem-with-biometrics?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[  Quick Look  &#xA;  • The FBI raid on Washington Post reporter’s home shows uncertainty about biometrics under the Fifth Amendment.  &#xA;  • Hannah Natanson was compelled to unlock a MacBook with her fingerprint.  &#xA;  • Until the law is clarified, use PINs/passwords instead of biometrics.&#xA;&#xA;Recently, the a href=&#34;https://www.theguardian.com/us-news/2026/jan/14/fbi-raid-washington-post-hannah-natanson&#34; target=&#34;blank&#34;FBI served a search warrant on the home of Washington Post reporter Hannah Natanson/a.&#xA;&#xA;It&#39;s rightfully being a href=&#34;https://firstamendment.mtsu.edu/post/press-freedom-advocates-worry-that-raid-on-washington-post-journalists-home-will-chill-reporting/&#34; target=&#34;blank&#34;decried as yet another disturbing attack/a by the Trump Administration on America&#39;s tradition of free and independent press--a tradition that was dealt yet another blow this week when a href=&#34;https://www.npr.org/2026/01/30/nx-s1-5693756/don-lemon-arrest-cnn-minneapolis&#34; target=&#34;blank&#34;the Administration arrested four Black journalists in Minnesota/a, one of whom was former CNN anchor Don Lemon.&#xA;&#xA;While much ink has been spilled about the potential chilling effect the raid on Natanson&#39;s home may have, some key details of the search are now coming to light.&#xA;&#xA;Authorities seized several devices from Natanson&#39;s home&#xA;&#xA;Authorities seized several devices from Natanson&#39;s home during the January 14th raid&#xA;  figcaption style=&#34;font-style:italic; color:#555;&#34;Authorities seized several devices from Natanson&#39;s home during the January 14th raid/figcaption&#xA;In court filings, a href=&#34;https://storage.courtlistener.com/recap/gov.uscourts.vaed.588772/gov.uscourts.vaed.588772.35.01.pdf&#34; target=&#34;blank&#34;the federal government has now detailed/a the devices seized from Natanson&#39;s home, which included two laptops, a cell phone, an audio recorder, a hard drive, and a smartwatch.&#xA;!--more--&#xA;While the seizures raise a number of concerns, perhaps overlooked is that Natanson was compelled to unlock one of her MacBook computers using her fingerprint.&#xA;&#xA;Authorities compelled Natanson to unlock a Macbook computer with her fingerprint.&#xA;figcaption style=&#34;font-style:italic; color:#555;&#34;Authorities compelled Natanson to unlock a Macbook computer with her fingerprint/figcaption&#xA;It&#39;s a remarkable exchange--and one that demonstrates the risks associated with using biometrics instead of PIN numbers or passwords.&#xA;&#xA;Authorities compelled Natanson to unlock her device&#xA;&#xA;The warrant used by authorities to search Natanson&#39;s home explicitly stated that agents could compel her to unlock her devices using biometrics, such as a fingerprint or face scan, but they could not compel her to reveal any passwords.&#xA;&#xA;Screenshot of the relevant section of the FBI warrant used to raid the home of Washington Post journalist Hannah Natanson (original image from The Intercept)&#xA;  figcaption style=&#34;font-style:italic; color:#555;&#34;Section of the warrant used to raid Natanson&#39;s home (via The Intercept)/figcaption&#xA;During the search, the government states that Natanson told agents she does not use biometrics and has only one computer and one phone.&#xA;&#xA;Yet, as the search continued, authorities eventually discovered a second computer inside a red backpack in her kitchen.&#xA;&#xA;When agents opened the computer, the lockscreen prompted them to enter a password or use TouchID. The agents then insisted--perhaps against the orders of the search warrant shown above--that she attempt to unlock the device.&#xA;&#xA;The government states that Natanson put her index finger on the scanner, which then unlocked it.&#xA;&#xA;Can you be compelled to unlock your device with biometrics?&#xA;&#xA;This is the exact issue the Decent Project wrote about a little more than two weeks ago.&#xA;&#xA;In our article entitled a href=&#34;https://decentproject.org/should-you-use-biometrics-on-your-phone&#34; target=&#34;blank&#34;iShould you use biometrics on your phone?/i/a, we explored the murky legal landscape over whether law enforcement can compel someone to unlock their device using their fingerprint or face.&#xA;&#xA;Currently, courts are split on the issue. It comes down to whether a court sees the use of biometrics as &#34;testimonial&#34; evidence.&#xA;&#xA;Testimonial evidence is generally anything that requires you to divulge the contents of your mind, ii.e./i things you know, have seen, or have heard. This kind of evidence has a long tradition of being protected by the a href=&#34;https://www.law.cornell.edu/constitution/fifthamendment&#34; target=&#34;blank&#34;Fifth Amendment&#39;s privilege against self-incrimination/a, meaning you cannot be compelled to reveal it.&#xA;&#xA;However, some courts do not think that biometrics are &#34;testimonial&#34; in nature. Instead, they argue a biometric unlock doesn&#39;t reveal anything about the content of an individual&#39;s thinking or knowledge. &#xA;&#xA;Map of the various federal judicial circuits&#xA;&#xA;For example, in 2024, the 9th Circuit (in purple above) said in a href=&#34;https://caselaw.findlaw.com/court/us-9th-circuit/116062162.html&#34; target=&#34;blank&#34;iUnited States v. Payne/i/a that biometrics are not afforded the same protections as passwords or PIN numbers:&#xA;&#xA;  &#34;While providing law enforcement officers with a combination to a safe or passcode to a phone would require an individual to divulge the &#39;contents of his own mind,&#39; turning over a key to a safe or a thumb to unlock a phone requires no such mental process.&#34;&#xA;&#xA;We at the Decent Project bistrongly/i/b disagree with this view, and we think Natanson&#39;s case is a great example as to why.&#xA;&#xA;What Natanson&#39;s fingerprint actually revealed&#xA;&#xA;When Natanson unlocked the MacBook in her kitchen, it revealed several things about her and her relationship to that device.&#xA;&#xA;First, it demonstrated that Natanson knew how to biometrically unlock the device. &#xA;&#xA;This, in our opinion, stands in direct contrast to the 9th Circuit&#39;s view that unlocking a device with your finger &#34;requires no ... mental process.&#34;&#xA;&#xA;The government&#39;s filing isn&#39;t particularly clear on the exact exchange, but when agents &#34;told her to try&#34; to unlock the device and she did so with her index finger, it raises the question: how did she know which finger to use?&#xA;&#xA;Second, her fingerprint demonstrated her control over the computer. &#xA;&#xA;Unlocking a device with your fingerprint is a pretty clear indication that you are the owner of that device, or at least in control of it. If this device is not a shared computer, then it effectively demonstrates that Natanson is responsible for the content found on the device.&#xA;&#xA;It&#39;s important to note that Natanson is not a defendant in this case, nor is she a target of the investigation--but in any other context, this kind of evidence could be damning.&#xA;&#xA;Instead, imagine if authorities had found the computer in Natanson&#39;s home and it did not have TouchID. Since Natanson cannot be compelled to reveal a PIN or password, what would authorities have to demonstrate that the device is hers?&#xA;&#xA;They could say the device was in her kitchen and that it was found in her backpack, but that&#39;s about it. &#xA;&#xA;Takeaway&#xA;&#xA;Not all courts agree with the 9th Circuit when it comes to biometrics. As discussed in our a href=&#34;https://decentproject.org/should-you-use-biometrics-on-your-phone&#34; target=&#34;blank&#34;earlier article/a, the D.C. Circuit Court of Appeals ruled last year that biometrics can be afforded the same protections as other testimonial evidence.&#xA;&#xA;While that&#39;s good news, this issue is new and the law is still developing. As such, unless and until there is legal clarity, the Decent Project continues to recommend that individuals do not use biometrics on their devices.&#xA;&#xA;~ Torman&#xA;psmallVerify this post: a href=&#34;https://github.com/decentproject/Signatures/blob/main/anfbiraidonareportershomeshowstheproblemwithbiometrics.md&#34; target=&#34;blank&#34;Source/a | a href=&#34;https://github.com/decentproject/Signatures/blob/main/anfbiraidonareportershomeshowstheproblemwithbiometrics.md.asc&#34; target=&#34;blank&#34;Signature/a | a href=&#34;https://github.com/decentproject/Signatures/blob/main/torman-pgp-key.asc&#34; target=&#34;_blank&#34;PGP Key/a/small/p&#xA;&#xA;#privacy #security #OPSEC #FifthAmendment&#xA;&#xA;---&#xA;&#xA;If you enjoyed reading this or found it informative, please consider subscribing in order to receive posts directly to your inbox: &#xA;!--emailsub--&#xA;&#xA;Also feel free to leave a comment here:  a href=&#34;https://remark.as/p/decentproject.org/an-fbi-raid-on-a-reporters-home-shows-the-problem-with-biometrics&#34;Discuss.../a]]&gt;</description>
      <content:encoded><![CDATA[<blockquote><p><strong>Quick Look</strong><br/>
• The FBI raid on Washington Post reporter’s home shows uncertainty about biometrics under the Fifth Amendment.<br/>
• Hannah Natanson was compelled to unlock a MacBook with her fingerprint.<br/>
• Until the law is clarified, use PINs/passwords instead of biometrics.</p></blockquote>

<p>Recently, the <a href="https://www.theguardian.com/us-news/2026/jan/14/fbi-raid-washington-post-hannah-natanson" target="_blank" rel="nofollow noopener">FBI served a search warrant on the home of Washington Post reporter Hannah Natanson</a>.</p>

<p>It&#39;s rightfully being <a href="https://firstamendment.mtsu.edu/post/press-freedom-advocates-worry-that-raid-on-washington-post-journalists-home-will-chill-reporting/" target="_blank" rel="nofollow noopener">decried as yet another disturbing attack</a> by the Trump Administration on America&#39;s tradition of free and independent press—a tradition that was dealt yet another blow this week when <a href="https://www.npr.org/2026/01/30/nx-s1-5693756/don-lemon-arrest-cnn-minneapolis" target="_blank" rel="nofollow noopener">the Administration arrested four Black journalists in Minnesota</a>, one of whom was former CNN anchor Don Lemon.</p>

<p>While much ink has been spilled about the potential chilling effect the raid on Natanson&#39;s home may have, some key details of the search are now coming to light.</p>

<h3 id="authorities-seized-several-devices-from-natanson-s-home" id="authorities-seized-several-devices-from-natanson-s-home">Authorities seized several devices from Natanson&#39;s home</h3>

<p><img src="https://i.snap.as/2hatO2Ry.png" alt="Authorities seized several devices from Natanson&#39;s home during the January 14th raid"/>
  <figcaption style="font-style:italic; color:#555;">Authorities seized several devices from Natanson&#39;s home during the January 14th raid</figcaption>
In court filings, <a href="https://storage.courtlistener.com/recap/gov.uscourts.vaed.588772/gov.uscourts.vaed.588772.35.0_1.pdf" target="_blank" rel="nofollow noopener">the federal government has now detailed</a> the devices seized from Natanson&#39;s home, which included two laptops, a cell phone, an audio recorder, a hard drive, and a smartwatch.

While the seizures raise a number of concerns, perhaps overlooked is that Natanson was compelled to unlock one of her MacBook computers using her fingerprint.</p>

<p><img src="https://i.snap.as/6GQEBcWq.png" alt="Authorities compelled Natanson to unlock a Macbook computer with her fingerprint."/>
<figcaption style="font-style:italic; color:#555;">Authorities compelled Natanson to unlock a Macbook computer with her fingerprint</figcaption>
It&#39;s a remarkable exchange—and one that demonstrates the risks associated with using biometrics instead of PIN numbers or passwords.</p>

<h3 id="authorities-compelled-natanson-to-unlock-her-device" id="authorities-compelled-natanson-to-unlock-her-device">Authorities compelled Natanson to unlock her device</h3>

<p>The warrant used by authorities to search Natanson&#39;s home explicitly stated that agents could compel her to unlock her devices using biometrics, such as a fingerprint or face scan, but they could not compel her to reveal any passwords.</p>

<p><img src="https://i.snap.as/pYmslu97.png" alt="Screenshot of the relevant section of the FBI warrant used to raid the home of Washington Post journalist Hannah Natanson (original image from The Intercept)"/>
  <figcaption style="font-style:italic; color:#555;">Section of the warrant used to raid Natanson&#39;s home (via The Intercept)</figcaption>
During the search, the government states that Natanson told agents she does not use biometrics and has only one computer and one phone.</p>

<p>Yet, as the search continued, authorities eventually discovered a second computer inside a red backpack in her kitchen.</p>

<p>When agents opened the computer, the lockscreen prompted them to enter a password or use TouchID. The agents then insisted—perhaps against the orders of the search warrant shown above—that she attempt to unlock the device.</p>

<p>The government states that Natanson put her index finger on the scanner, which then unlocked it.</p>

<h3 id="can-you-be-compelled-to-unlock-your-device-with-biometrics" id="can-you-be-compelled-to-unlock-your-device-with-biometrics">Can you be compelled to unlock your device with biometrics?</h3>

<p>This is the exact issue the Decent Project wrote about a little more than two weeks ago.</p>

<p>In our article entitled <a href="https://decentproject.org/should-you-use-biometrics-on-your-phone" target="_blank" rel="nofollow noopener"><i>Should you use biometrics on your phone?</i></a>, we explored the murky legal landscape over whether law enforcement can compel someone to unlock their device using their fingerprint or face.</p>

<p>Currently, courts are split on the issue. It comes down to whether a court sees the use of biometrics as “testimonial” evidence.</p>

<p>Testimonial evidence is generally anything that requires you to divulge the contents of your mind, <i>i.e.</i> things you know, have seen, or have heard. This kind of evidence has a long tradition of being protected by the <a href="https://www.law.cornell.edu/constitution/fifth_amendment" target="_blank" rel="nofollow noopener">Fifth Amendment&#39;s privilege against self-incrimination</a>, meaning you cannot be compelled to reveal it.</p>

<p>However, some courts do not think that biometrics are “testimonial” in nature. Instead, they argue a biometric unlock doesn&#39;t reveal anything about the content of an individual&#39;s thinking or knowledge.</p>

<p><img src="https://i.snap.as/YIGafnao.jpg" alt="Map of the various federal judicial circuits"/></p>

<p>For example, in 2024, the 9th Circuit (in purple above) said in <a href="https://caselaw.findlaw.com/court/us-9th-circuit/116062162.html" target="_blank" rel="nofollow noopener"><i>United States v. Payne</i></a> that biometrics are <em>not</em> afforded the same protections as passwords or PIN numbers:</p>

<blockquote><p>“While providing law enforcement officers with a combination to a safe or passcode to a phone would require an individual to divulge the &#39;contents of his own mind,&#39; turning over a key to a safe or a thumb to unlock a phone requires no such mental process.”</p></blockquote>

<p>We at the Decent Project <b><i>strongly</i></b> disagree with this view, and we think Natanson&#39;s case is a great example as to why.</p>

<h3 id="what-natanson-s-fingerprint-actually-revealed" id="what-natanson-s-fingerprint-actually-revealed">What Natanson&#39;s fingerprint actually revealed</h3>

<p>When Natanson unlocked the MacBook in her kitchen, it revealed several things about her and her relationship to that device.</p>

<p>First, it demonstrated that Natanson knew <em>how</em> to biometrically unlock the device.</p>

<p>This, in our opinion, stands in direct contrast to the 9th Circuit&#39;s view that unlocking a device with your finger “requires no ... mental process.”</p>

<p>The government&#39;s filing isn&#39;t particularly clear on the exact exchange, but when agents “told her to try” to unlock the device and she did so with her index finger, it raises the question: <em>how did she know which finger to use?</em></p>

<p>Second, her fingerprint demonstrated her control over the computer.</p>

<p>Unlocking a device with your fingerprint is a pretty clear indication that you are the owner of that device, or at least in control of it. If this device is not a shared computer, then it effectively demonstrates that Natanson is responsible for the content found on the device.</p>

<p>It&#39;s important to note that Natanson is not a defendant in this case, nor is she a target of the investigation—but in any other context, this kind of evidence could be damning.</p>

<p>Instead, imagine if authorities had found the computer in Natanson&#39;s home and it did not have TouchID. Since Natanson cannot be compelled to reveal a PIN or password, what would authorities have to demonstrate that the device is hers?</p>

<p>They could say the device was in her kitchen and that it was found in her backpack, but that&#39;s about it.</p>

<h3 id="takeaway" id="takeaway">Takeaway</h3>

<p>Not all courts agree with the 9th Circuit when it comes to biometrics. As discussed in our <a href="https://decentproject.org/should-you-use-biometrics-on-your-phone" target="_blank" rel="nofollow noopener">earlier article</a>, the D.C. Circuit Court of Appeals ruled last year that biometrics can be afforded the same protections as other testimonial evidence.</p>

<p>While that&#39;s good news, this issue is new and the law is still developing. As such, unless and until there is legal clarity, the Decent Project continues to recommend that individuals do <em>not</em> use biometrics on their devices.</p>

<p>~ Torman
<p><small>Verify this post: <a href="https://github.com/decentproject/Signatures/blob/main/an_fbi_raid_on_a_reporters_home_shows_the_problem_with_biometrics.md" target="_blank" rel="nofollow noopener">Source</a> | <a href="https://github.com/decentproject/Signatures/blob/main/an_fbi_raid_on_a_reporters_home_shows_the_problem_with_biometrics.md.asc" target="_blank" rel="nofollow noopener">Signature</a> | <a href="https://github.com/decentproject/Signatures/blob/main/torman-pgp-key.asc" target="_blank" rel="nofollow noopener">PGP Key</a></small></p></p>

<p><a href="https://decentproject.org/tag:privacy" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">privacy</span></a> <a href="https://decentproject.org/tag:security" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">security</span></a> <a href="https://decentproject.org/tag:OPSEC" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">OPSEC</span></a> <a href="https://decentproject.org/tag:FifthAmendment" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">FifthAmendment</span></a></p>

<hr/>

<p>If you enjoyed reading this or found it informative, please consider subscribing in order to receive posts directly to your inbox:
</p>

<p>Also feel free to leave a comment here:  <a href="https://remark.as/p/decentproject.org/an-fbi-raid-on-a-reporters-home-shows-the-problem-with-biometrics" rel="nofollow">Discuss...</a></p>
]]></content:encoded>
      <guid>https://decentproject.org/an-fbi-raid-on-a-reporters-home-shows-the-problem-with-biometrics</guid>
      <pubDate>Sat, 31 Jan 2026 22:02:55 +0000</pubDate>
    </item>
    <item>
      <title>When encryption is not enough</title>
      <link>https://decentproject.org/when-encryption-is-not-enough?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[&#xA;&#xA;There is a saying in cryptocurrency: &#34;not your keys; not your coins.&#34;&#xA;&#xA;In essence, if you don&#39;t control the keys to the wallet containing the cryptocurrency--usually a series of random words generated at the time that the wallet is created--then you don&#39;t really own the money inside it.&#xA;&#xA;It&#39;s the difference between having your money in a bank that actually possesses your cash and lets you access it, or in an impenetrable safe where only you know the combination. If you possess the cash and the safe, you truly own the money.&#xA;&#xA;The same can be said for encryption.&#xA;!--more--&#xA;Whether you realize it or not, it&#39;s likely that many of your devices enable encryption by default. For example, iPhones are encrypted by default and so are most modern Windows machines.&#xA;&#xA;Sounds good, right?&#xA;&#xA;But it presents the same problem as with crypto: who holds the keys? &#xA;&#xA;When your Windows computer is encrypted, it&#39;s using Microsoft&#39;s BitLocker. The data can be accessed only once you type in your password or PIN, or authenticate with biometrics. However, Microsoft also ensures that a recovery key is created and backed up to your Microsoft account.&#xA;&#xA;It&#39;s a convenient solution and provides an avenue of recovery should you ever forget your password or PIN. But it also means that Microsoft has access to that recovery key at any time. &#xA;&#xA;This was evidenced recently when Microsoft a href=&#34;https://techcrunch.com/2026/01/23/microsoft-gave-fbi-a-set-of-bitlocker-encryption-keys-to-unlock-suspects-laptops-reports/&#34; target=&#34;blank&#34;gave the FBI the recovery keys to unlock hard drives belonging to suspects in a fraud case/a.&#xA;&#xA;Notably, Microsoft complies with these kinds of requests from law enforcement multiple times each year:&#xA;&#xA;  Microsoft told Forbes that the company sometimes provides BitLocker recovery keys to authorities, having received an average of 20 such requests per year.&#xA;&#xA;The story isn&#39;t much different at Apple, though there are some notable improvements. The company&#39;s iCloud services are encrypted by default, but similar to Microsoft, the decryption keys are sent to Apple&#39;s servers, giving the company access if needed.&#xA;&#xA;The good news is that Apple has set aside 14 categories that it says it cannot access no matter what, as the keys are only stored on your devices. These categories include your messages, health, passwords, and maps.&#xA;&#xA;Owning your data is a form of digital autonomy&#xA;&#xA;Some might say Microsoft sharing a user&#39;s recovery key with law enforcement is not a problem. Generally speaking, the Decent Project agrees. &#xA;&#xA;The Decent Project believes that law enforcement has a job to do and there are laws within which they must operate. When law enforcement has identified a suspect and obtains a lawful warrant to access account information from a company, we do not argue that the company is under an obligation to comply.&#xA;&#xA;Instead, the Decent Project advocates for individuals to minimize their own risks by reducing their attack surface. If Microsoft or Apple do not have access to decryption keys, then there&#39;s virtually nothing they can turn over.&#xA;&#xA;To be clear, government officials seeking information via a lawful warrant is the least of our concerns. Instead, we recognize that what is available to the &#34;good guys&#34; is also available to the &#34;bad guys.&#34;&#xA;&#xA;Any decryption key stored by Microsoft or Apple runs the risk of being exploited by rogue employees, hackers, or government officials who are not operating with the bounds of the law.&#xA;&#xA;Are you comfortable them seeing all your photos? Your digital journals? Your notes? Your health records?&#xA;&#xA;The best defense is an offense in which individuals retain control of their data--and most importantly--the keys to it.&#xA;&#xA;Recommendations&#xA;&#xA;bTurn on encryption wherever possible/b&#xA;&#xA;Whether it&#39;s your computer or phone, if there are options to encrypt your device your should always do so.&#xA;&#xA;Encrypting your device ensures better security and privacy, but does comes with additionally responsibility.&#xA;&#xA;When encrypting your devices, you should look for options that allow you to control the recovery/decryption keys. With BitLocker, for example, this means declining any options to store the recovery key in your Microsoft account.&#xA;&#xA;Keys should be securely stored and this can be done by using a reputable password manager--another basic privacy and security tool discussed below.&#xA;&#xA;bTurn on Apple&#39;s Advanced Data Protection/b&#xA;&#xA;For Apple users, it is a simple procedure that can be done by following this a href=&#34;https://support.apple.com/en-us/108756&#34; target=&#34;blank&#34;guide/a.&#xA;&#xA;There are two ways you can ensure recovery, one is by designating a trusted contact who would be able to use their Apple device to unlock your account, or by storing the recovery key yourself.&#xA;&#xA;You&#39;ll have to decide which method is best for you, but again, storing your own recovery key is the safest method--just be sure to store it in a manner that ensures it will not get lost, stolen, or compromised.&#xA;&#xA;bUse a password manager/b&#xA;&#xA;It is 2026. If you are not yet, it is time to start using a password manager.&#xA;&#xA;There are a number of free or nearly free options out there that will greatly enhance your privacy and security.&#xA;&#xA;Password managers almost always include password generators to ensure unique and strong passwords for each account. Your credentials can be autofilled so you virtually never have to type in your passwords or copy/paste.&#xA;&#xA;A reputable password manager is an essential tool in an idividual&#39;s privacy and security toolkit. Please check out our a href=&#34;https://decentproject.org/resources&#34;Resources/a page where you can find recommendations. (As of the time of this writing, we are still working to put this together but it should be there for those reading this the future).&#xA;&#xA;Many providers also allow you to securely store more than just passwords. You can store passphrases, decryption keys, or files. This makes it extremely easy to take advantage of encryption while not relying on providers like Microsoft and Apple to store your decryption keys.&#xA;&#xA;~ Torman&#xA;psmallVerify this post: a href=&#34;https://github.com/decentproject/Signatures/blob/main/whenencryptionisnotenough.md&#34; target=&#34;blank&#34;Source/a | a href=&#34;https://github.com/decentproject/Signatures/blob/main/whenencryptionisnotenough.md.asc&#34; target=&#34;blank&#34;Signature/a | a href=&#34;https://github.com/decentproject/Signatures/blob/main/torman-pgp-key.asc&#34; target=&#34;blank&#34;PGP Key/a/small/p&#xA;&#xA;#privacy #security #bigtech #encryption&#xA;&#xA;---&#xA;&#xA;If you enjoyed reading this or found it informative, please consider subscribing in order to recieve posts directly to your inbox:&#xA;!--emailsub--&#xA;&#xA;Also feel free to leave a comment here:_  a href=&#34;https://remark.as/p/decentproject.org/when-encryption-is-not-enough&#34;Discuss.../a&#xA;&#xA;]]&gt;</description>
      <content:encoded><![CDATA[<p><img src="https://i.snap.as/qvXYktxK.jpeg" alt=""/></p>

<p>There is a saying in cryptocurrency: “not your keys; not your coins.”</p>

<p>In essence, if you don&#39;t control the keys to the wallet containing the cryptocurrency—usually a series of random words generated at the time that the wallet is created—then you don&#39;t <em>really</em> own the money inside it.</p>

<p>It&#39;s the difference between having your money in a bank that actually possesses your cash and lets you access it, or in an impenetrable safe where only you know the combination. If you possess the cash and the safe, you truly <em>own</em> the money.</p>

<p>The same can be said for encryption.

Whether you realize it or not, it&#39;s likely that many of your devices enable encryption by default. For example, iPhones are encrypted by default and so are most modern Windows machines.</p>

<p>Sounds good, right?</p>

<p>But it presents the same problem as with crypto: who holds the keys?</p>

<p>When your Windows computer is encrypted, it&#39;s using Microsoft&#39;s BitLocker. The data can be accessed only once you type in your password or PIN, or authenticate with biometrics. However, Microsoft also ensures that a recovery key is created and backed up to your Microsoft account.</p>

<p>It&#39;s a convenient solution and provides an avenue of recovery should you ever forget your password or PIN. But it also means that Microsoft has access to that recovery key at any time.</p>

<p>This was evidenced recently when Microsoft <a href="https://techcrunch.com/2026/01/23/microsoft-gave-fbi-a-set-of-bitlocker-encryption-keys-to-unlock-suspects-laptops-reports/" target="blank" rel="nofollow">gave the FBI the recovery keys to unlock hard drives belonging to suspects in a fraud case</a>.</p>

<p>Notably, Microsoft complies with these kinds of requests from law enforcement multiple times each year:</p>

<blockquote><p>Microsoft told Forbes that the company sometimes provides BitLocker recovery keys to authorities, having received an average of 20 such requests per year.</p></blockquote>

<p>The story isn&#39;t much different at Apple, though there are some notable improvements. The company&#39;s iCloud services are encrypted by default, but similar to Microsoft, the decryption keys are sent to Apple&#39;s servers, giving the company access if needed.</p>

<p><img src="https://i.snap.as/v7vBpIei.png" alt=""/></p>

<p>The good news is that Apple has set aside 14 categories that it says it cannot access no matter what, as the keys are only stored on your devices. These categories include your messages, health, passwords, and maps.</p>

<h3 id="owning-your-data-is-a-form-of-digital-autonomy" id="owning-your-data-is-a-form-of-digital-autonomy">Owning your data is a form of digital autonomy</h3>

<p>Some might say Microsoft sharing a user&#39;s recovery key with law enforcement is not a problem. Generally speaking, the Decent Project agrees.</p>

<p>The Decent Project believes that law enforcement has a job to do and there are laws within which they must operate. When law enforcement has identified a suspect and obtains a lawful warrant to access account information from a company, we do not argue that the company is under an obligation to comply.</p>

<p>Instead, the Decent Project advocates for individuals to minimize their own risks by reducing their attack surface. If Microsoft or Apple do not have access to decryption keys, then there&#39;s virtually nothing they can turn over.</p>

<p>To be clear, government officials seeking information via a lawful warrant is the least of our concerns. Instead, we recognize that what is available to the “good guys” is also available to the “bad guys.”</p>

<p>Any decryption key stored by Microsoft or Apple runs the risk of being exploited by rogue employees, hackers, or government officials who are <em>not</em> operating with the bounds of the law.</p>

<p>Are you comfortable them seeing all your photos? Your digital journals? Your notes? Your health records?</p>

<p>The best defense is an offense in which individuals retain control of their data—and most importantly—the keys to it.</p>

<h3 id="recommendations" id="recommendations">Recommendations</h3>

<p><b>Turn on encryption wherever possible</b></p>

<p>Whether it&#39;s your computer or phone, if there are options to encrypt your device your should always do so.</p>

<p>Encrypting your device ensures better security and privacy, but does comes with additionally responsibility.</p>

<p>When encrypting your devices, you should look for options that allow you to control the recovery/decryption keys. With BitLocker, for example, this means declining any options to store the recovery key in your Microsoft account.</p>

<p>Keys should be securely stored and this can be done by using a reputable password manager—another basic privacy and security tool discussed below.</p>

<p><b>Turn on Apple&#39;s Advanced Data Protection</b></p>

<p>For Apple users, it is a simple procedure that can be done by following this <a href="https://support.apple.com/en-us/108756" target="blank" rel="nofollow">guide</a>.</p>

<p>There are two ways you can ensure recovery, one is by designating a trusted contact who would be able to use their Apple device to unlock your account, or by storing the recovery key yourself.</p>

<p>You&#39;ll have to decide which method is best for you, but again, storing your own recovery key is the safest method—just be sure to store it in a manner that ensures it will not get lost, stolen, or compromised.</p>

<p><b>Use a password manager</b></p>

<p>It is 2026. If you are not yet, it is time to start using a password manager.</p>

<p>There are a number of free or nearly free options out there that will greatly enhance your privacy and security.</p>

<p>Password managers almost always include password generators to ensure unique and strong passwords for each account. Your credentials can be autofilled so you virtually never have to type in your passwords or copy/paste.</p>

<p>A reputable password manager is an essential tool in an idividual&#39;s privacy and security toolkit. Please check out our <a href="https://decentproject.org/resources" rel="nofollow">Resources</a> page where you can find recommendations. (As of the time of this writing, we are still working to put this together but it should be there for those reading this the future).</p>

<p>Many providers also allow you to securely store more than just passwords. You can store passphrases, decryption keys, or files. This makes it extremely easy to take advantage of encryption while not relying on providers like Microsoft and Apple to store your decryption keys.</p>

<p>~ Torman
<p><small>Verify this post: <a href="https://github.com/decentproject/Signatures/blob/main/when_encryption_is_not_enough.md" target="_blank" rel="nofollow noopener">Source</a> | <a href="https://github.com/decentproject/Signatures/blob/main/when_encryption_is_not_enough.md.asc" target="_blank" rel="nofollow noopener">Signature</a> | <a href="https://github.com/decentproject/Signatures/blob/main/torman-pgp-key.asc" target="_blank" rel="nofollow noopener">PGP Key</a></small></p></p>

<p><a href="https://decentproject.org/tag:privacy" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">privacy</span></a> <a href="https://decentproject.org/tag:security" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">security</span></a> <a href="https://decentproject.org/tag:bigtech" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">bigtech</span></a> <a href="https://decentproject.org/tag:encryption" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">encryption</span></a></p>

<hr/>

<p><em>If you enjoyed reading this or found it informative, please consider subscribing in order to recieve posts directly to your inbox:</em>
</p>

<p><em>Also feel free to leave a comment here:</em>  <a href="https://remark.as/p/decentproject.org/when-encryption-is-not-enough" rel="nofollow">Discuss...</a></p>
]]></content:encoded>
      <guid>https://decentproject.org/when-encryption-is-not-enough</guid>
      <pubDate>Sat, 24 Jan 2026 20:14:11 +0000</pubDate>
    </item>
    <item>
      <title>Should you use biometrics on your phone?</title>
      <link>https://decentproject.org/should-you-use-biometrics-on-your-phone?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[&#xA;&#xA;There are a lot of positives to using biometrics on your devices. It&#39;s hard to deny their convenience and in some ways, avoiding passwords can be a good thing since they can be forgotten or stolen.&#xA;&#xA;But the law doesn&#39;t necessarily treat your fingerprint the same as a PIN code or password when it comes to unlocking your device. This means you could be compelled to unlock your phone or computer depending on which unlock method you use.&#xA;!--more--&#xA;Testimonial vs. non-testimonial evidence&#xA;&#xA;Whether the government can compel you to unlock your device hinges on whether a court considers your biometric data to be &#34;testimonial&#34; or not.&#xA;&#xA;Testimonial evidence is anything that reveals the contents of your mind, i.e., things you&#39;ve seen, heard, or know.sup1/sup&#xA;&#xA;Importantly, testimonial evidence falls under the Fifth Amendment&#39;s protections against self-incrimination. In other words, you cannot be compelled to provide testimonial evidence that may incriminate you.&#xA;&#xA;However, courts distinguish testimonial evidence from non-testimonial evidence, which doesn&#39;t call on a person to reveal the &#34;contents of [their] own mind.&#34;sup2/sup For example, compelled physical actions are not usually considered testimonial.sup3./sup This is why you can be compelled to provide fingerprints during booking, or a bloodtest as part of an investigation.&#xA;&#xA;Courts have illustrated the distinction between testimonial and non-testimonial by comparing an individual who is compelled to produce keys to a lockbox (non-testimonial) against an individual who is compelled to produce a combination to a safe (testimonial).sup4/sup One is simply handing over a key while the other requires you to divulge something you know.&#xA;&#xA;This disctinction is important because when it comes to your devices courts typically agree that PINs and passcodes are testimonial, while some courts have found that biometrics are non-testimonial.&#xA;&#xA;That might make the difference as to whether you can be compelled to unlock your device.&#xA;&#xA;Circuit Split&#xA;&#xA;Currently, there are different schools of thought on this issue.&#xA;&#xA;Just last year, in United States v. Brownsup5/sup the D.C. Circuit Court of Appeals found that compelling an individual to unlock their phone with biometrics was testimonial. The court found the act of opening a phone with biometrics--while physical--is testimonial because it &#34;directly announces the owner&#39;s access to and control over the phone, as well as his mental knowledge of how to unlock the device.&#34;sup6/sup&#xA;&#xA;It&#39;s an interesting take on the testimonial vs. non-testimonial issue. &#xA;&#xA;It illustrates the distinction between physical acts that communicate something and those that don&#39;t. Submitting to a fingerprint panel at the police station doesn&#39;t reveal anything incriminatory. It&#39;s only once those fingerprints are anaylzed that they may incriminate. Whereas, a fingerprint that unlocks a phone essentially authenticates you as its owner. &#xA;&#xA;However, in 2024, the 9th Circuit Court of Appeals in United States v. Paynesup7/sup found the opposite. It ruled that a fingerprint unlock of a phone is akin to handing over the keys to a safe, rather than divulging its combination.sup8/sup&#xA;&#xA;The court rejected the idea that biometrics are a substitute for PINs or passcodes and should therefore enjoy the same protections.sup9/sup It also rejected the idea that a biometric unlock is testimonial because it confirms ownership and knowledge of the device&#39;s contents. The court said the access is not incriminating by itself, but only provides access to potential source of incriminating information.sup10/sup&#xA;&#xA;Should you use biometrics?&#xA;&#xA;Each person has to assess their own threat model. But given the variances in the law and the lack of direct precedent in many circuits, it would seem that the safest approach is to use a PIN or passcode to unlock your device.&#xA;&#xA;Even if you find the Brown case pursuasive or think it would apply, there have already been court decisions that distinguish its finding. &#xA;&#xA;Noteably, P. Diddy cited Brown, among other cases, in his criminal case in New York in order to prevent compelled production of a cell phone. The District Court ruled in favor of the government, in part, because there was no question as to whether the phone was his.sup11/sup&#xA;&#xA;Essentially, Brown suggests that the testimonial aspect of unlocking the phone is that it communicates control and ownership. But if the government can show that you own and control the device in other ways, then compelling a biometric unlock is not really implicating your Fifth Amendment rights.sup12./sup&#xA;&#xA;Recommendations&#xA;&#xA;The Decent Project recommends you avoid using biometrics on your devices. There is little debate over whether divulging a PIN constitutes testimonial evidence.sup13/sup&#xA;&#xA;We recognizes, though, that typing in a six-digit PIN (yes, please make your PINs at least six digits) every time you want to unlock your phone can be annoying. Given this, you may consider PIN-locking important apps, such as your e-mail, messengers, and password managers.&#xA;&#xA;We also recommend using unique PINs for each of these apps rather than one generic PIN.&#xA;&#xA;Additionally, if you are traveling across an international border, such as returning to the U.S. from a vacation overseas, consider disabling your biometrics temporarily. This way, if you are stopped your device cannot be unlocked simply with a face scan or fingerprint.&#xA;&#xA;~ Torman&#xA;psmallVerify this post: a href=&#34;https://github.com/decentproject/Signatures/blob/main/shouldIusebiometrics.md&#34; target=&#34;blank&#34;Source/a | a href=&#34;https://github.com/decentproject/Signatures/blob/main/shouldIusebiometrics.md.asc&#34; target=&#34;blank&#34;Signature/a | a href=&#34;https://github.com/decentproject/Signatures/blob/main/torman-pgp-key.asc&#34; target=&#34;blank&#34;PGP Key/a/small/p&#xA;&#xA;#privacy #security #opsec #FifthAmendment &#xA;&#xA;---&#xA;&#xA;Subscribe &amp; Comment&#xA;&#xA;If you found this post informative, please subscribe by entering your email below. You&#39;ll receive the latest posts from the Decent Project to you inbox.&#xA;!--emailsub--&#xA;&#xA;Do you use biometrics on your phone or devices? Do you think there should be an exception for device biometrics in the testimonial/non-testimonial paradigm? Let us know your thoughts in the comments below!&#xA;a href=&#34;https://remark.as/p/decentproject.org/should-you-use-biometrics-on-your-phone&#34;Discuss.../a&#xA;&#xA;--- &#xA;&#xA;Footnotes&#xA;sup1./sup &#34;The touchstone of whether an act of production is testimonial is whether the government compels the individual to use &#39;the contents of his own mind&#39; to explicitly or implicitly communicate some statement of fact.&#34; United States v. Doe (In re Grand Jury Subpoena Duces Tecum), 670 F.3d 1335, 1345 (11th Cir. 2012).&#xA;&#xA;sup2./sup &#34;[F]orcing the custodian to testify orally as to the whereabouts of nonproduced records requires him to disclose the contents of his own mind. He might be compelled to convict himself out of his own mouth. That is contrary to the spirit and letter of the Fifth Amendment.&#34; Curcio v. United States, 354 U.S. 118, 128 (1957).&#xA;&#xA;sup3./sup &#34;[T]he Fifth Amendment privilege is not triggered where the Government merely compels some physical act, i.e. where the individual is not called upon to make use of the contents of his or her mind.&#34; In re Grand Jury Subpoena, 670 F.3d at 1345.&#xA;&#xA;sup4./sup &#34;He may in some cases be forced to surrender a key to a strongbox containing incriminating documents, but I do not believe he can be compelled to reveal the combination to his wall safe -- by word or deed.&#34; Doe v. United States, 487 U.S. 201, 219, 108 S. Ct. 2341, 2352 (1988) (Justice Stevens dissent).&#xA;&#xA;sup5./sup  United States v. Brown, 125 F.4th 1186 (D.C. Cir. 2025).&#xA;&#xA;sup6./sup &#34;Though placing a thumb on a phone may seem akin to submitting to fingerprinting or providing a handwriting exemplar, the act, as performed here, is much closer to responding to a lie detector test or complying with a command to say a password. When Schwartz was ordered to open the cellphone, his act of unlocking the phone represented the thoughts &#34;I know how to open the phone,&#34; &#34;I have control over and access to this phone,&#34; and &#34;the print of this specific finger is the password to this phone.&#34; If Schwartz had instead been compelled to disclose whether he could open the phone, and made to say yes or to verbally disclose the password, those answers unquestionably would be testimonial communications. The compelled opening of the cellphone that occurred here is no different.&#34; United States v. Brown, 125 F.4th 1186, 1202-03 (D.C. Cir. 2025).&#xA;&#xA;sup7./sup United States v. Payne, 99 F.4th 495 (9th Cir. 2024).&#xA;&#xA;sup8./sup &#34;While providing law enforcement officers with a combination to a safe or passcode to a phone would require an individual to divulge the &#34;contents of his own mind,&#34; turning over a key to a safe or a thumb to unlock a phone requires no such mental process.&#34; Payne, 99 at 511.&#xA;&#xA;sup9./sup &#34;[T]he Supreme Court has framed the question around whether a particular action requires a defendant to divulge the contents of his mind, not whether two actions yield the same result.&#34; Payne, 99 at 511.&#xA;&#xA;sup10./sup &#34;The officers were left to identify any incriminating evidence through their own investigation.&#34; Payne, 99 at 511.&#xA;&#xA;sup11./sup  United States v. Combs, No. 24-CR-542 (AS), 2025 LX 289072 (S.D.N.Y. Apr. 18, 2025).&#xA;&#xA;sup12./sup But when &#34;&#39;[t]he existence and location of the papers are a foregone conclusion and the [defendant] adds little or nothing to the sum total of the Government&#39;s information by conceding that he in fact has the papers,&#39; production does not run afoul of the Fifth Amendment.&#34; Combs, LX 289072 at 2 (quoting Fisher v. United States, 425 U.S. 391, 410-11, 96 S. Ct. 1569, 48 L. Ed. 2d 39 (1976)); &#34;Second, under the &#39;foregone  [1346]  conclusion&#39; doctrine, an act of production is not testimonial—even if the act conveys a fact regarding the existence or location, possession, or authenticity of the subpoenaed materials—if the Government can show with &#39;reasonable particularity&#39; that, at the time it sought to compel the act of production, it already knew of the materials, thereby making any testimonial aspect a &#39;foregone conclusion.&#39;&#34; In re Grand Jury Subpoena, 670 F.3d at 1345-46.&#xA;&#xA;sup13./sup &#34;[P]roviding law enforcement officers with a combination to a safe or passcode to a phone would require an individual to divulge the &#34;contents of his own mind.&#34; Payne, 99 at 511; &#34;Requiring Doe to use a decryption password is most certainly more akin to requiring the production of a combination because both demand the use of the contents of the mind ...  Hence, we conclude that what the Government seeks to compel in this case, the decryption and production of the contents of the hard drives, is testimonial in character.&#34; In re Grand Jury Subpoena, 670 F.3d at 1346.&#xA;&#xA;---&#xA;&#xA;Disclaimer: I am not a lawyer, and I am not your lawyer. This post is meant to be informative and not to be taken as legal advice. If you are facing a legal issue you should always consult with a licensed attorney who can render legal advice that is specific to your needs. ]]&gt;</description>
      <content:encoded><![CDATA[<p><img src="https://i.snap.as/X1tXUy9U.jpg" alt=""/></p>

<p>There are a lot of positives to using biometrics on your devices. It&#39;s hard to deny their convenience and in some ways, <em>avoiding</em> passwords can be a good thing since they can be forgotten or stolen.</p>

<p>But the law doesn&#39;t necessarily treat your fingerprint the same as a PIN code or password when it comes to unlocking your device. This means you could be compelled to unlock your phone or computer depending on which unlock method you use.
</p>

<h2 id="testimonial-vs-non-testimonial-evidence" id="testimonial-vs-non-testimonial-evidence">Testimonial vs. non-testimonial evidence</h2>

<p>Whether the government can compel you to unlock your device hinges on whether a court considers your biometric data to be “testimonial” or not.</p>

<p>Testimonial evidence is anything that reveals the contents of your mind, <em>i.e., things you&#39;ve seen, heard, or know</em>.<sup>1</sup></p>

<p>Importantly, testimonial evidence falls under the Fifth Amendment&#39;s protections against self-incrimination. In other words, you cannot be compelled to provide testimonial evidence that may incriminate you.</p>

<p>However, courts distinguish testimonial evidence from <em>non-testimonial</em> evidence, which doesn&#39;t call on a person to reveal the “contents of [their] own mind.”<sup>2</sup> For example, compelled physical actions are not usually considered testimonial.<sup>3.</sup> This is why you can be compelled to provide fingerprints during booking, or a bloodtest as part of an investigation.</p>

<p>Courts have illustrated the distinction between testimonial and non-testimonial by comparing an individual who is compelled to produce keys to a lockbox (non-testimonial) against an individual who is compelled to produce a combination to a safe (testimonial).<sup>4</sup> One is simply handing over a key while the other requires you to divulge something you know.</p>

<p>This disctinction is important because when it comes to your devices courts typically agree that PINs and passcodes are testimonial, while some courts have found that biometrics are non-testimonial.</p>

<p>That might make the difference as to whether you can be compelled to unlock your device.</p>

<h2 id="circuit-split" id="circuit-split">Circuit Split</h2>

<p>Currently, there are different schools of thought on this issue.</p>

<p>Just last year, in <em>United States v. Brown</em><sup>5</sup> the D.C. Circuit Court of Appeals found that compelling an individual to unlock their phone with biometrics <em>was</em> testimonial. The court found the act of opening a phone with biometrics—while physical—<em>is</em> testimonial because it “directly announces the owner&#39;s access to and control over the phone, as well as his mental knowledge of how to unlock the device.”<sup>6</sup></p>

<p>It&#39;s an interesting take on the testimonial vs. non-testimonial issue.</p>

<p>It illustrates the distinction between physical acts that communicate something and those that don&#39;t. Submitting to a fingerprint panel at the police station doesn&#39;t reveal anything incriminatory. It&#39;s only once those fingerprints are anaylzed that they may incriminate. Whereas, a fingerprint that unlocks a phone essentially authenticates you as its owner.</p>

<p>However, in 2024, the 9th Circuit Court of Appeals in <em>United States v. Payne</em><sup>7</sup> found the opposite. It ruled that a fingerprint unlock of a phone is akin to handing over the keys to a safe, rather than divulging its combination.<sup>8</sup></p>

<p>The court rejected the idea that biometrics are a substitute for PINs or passcodes and should therefore enjoy the same protections.<sup>9</sup> It also rejected the idea that a biometric unlock is testimonial because it confirms ownership and knowledge of the device&#39;s contents. The court said the access is not incriminating by itself, but only provides access to potential source of incriminating information.<sup>10</sup></p>

<h2 id="should-you-use-biometrics" id="should-you-use-biometrics">Should you use biometrics?</h2>

<p>Each person has to assess their own threat model. But given the variances in the law and the lack of direct precedent in many circuits, it would seem that the safest approach is to use a PIN or passcode to unlock your device.</p>

<p>Even if you find the <em>Brown</em> case pursuasive or think it would apply, there have already been court decisions that distinguish its finding.</p>

<p>Noteably, P. Diddy cited <em>Brown</em>, among other cases, in his criminal case in New York in order to prevent compelled production of a cell phone. The District Court ruled in favor of the government, in part, because there was no question as to whether the phone was his.<sup>11</sup></p>

<p>Essentially, <em>Brown</em> suggests that the testimonial aspect of unlocking the phone is that it communicates control and ownership. But if the government can show that you own and control the device in other ways, then compelling a biometric unlock is not really implicating your Fifth Amendment rights.<sup>12.</sup></p>

<h3 id="recommendations" id="recommendations">Recommendations</h3>

<p>The Decent Project recommends you avoid using biometrics on your devices. There is little debate over whether divulging a PIN constitutes testimonial evidence.<sup>13</sup></p>

<p>We recognizes, though, that typing in a six-digit PIN (yes, please make your PINs at least six digits) every time you want to unlock your phone can be annoying. Given this, you may consider PIN-locking important apps, such as your e-mail, messengers, and password managers.</p>

<p>We also recommend using unique PINs for each of these apps rather than one generic PIN.</p>

<p>Additionally, if you are traveling across an international border, such as returning to the U.S. from a vacation overseas, consider disabling your biometrics temporarily. This way, if you are stopped your device cannot be unlocked simply with a face scan or fingerprint.</p>

<p>~ Torman
<p><small>Verify this post: <a href="https://github.com/decentproject/Signatures/blob/main/should_I_use_biometrics.md" target="_blank" rel="nofollow noopener">Source</a> | <a href="https://github.com/decentproject/Signatures/blob/main/should_I_use_biometrics.md.asc" target="_blank" rel="nofollow noopener">Signature</a> | <a href="https://github.com/decentproject/Signatures/blob/main/torman-pgp-key.asc" target="_blank" rel="nofollow noopener">PGP Key</a></small></p></p>

<p><a href="https://decentproject.org/tag:privacy" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">privacy</span></a> <a href="https://decentproject.org/tag:security" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">security</span></a> <a href="https://decentproject.org/tag:opsec" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">opsec</span></a> <a href="https://decentproject.org/tag:FifthAmendment" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">FifthAmendment</span></a></p>

<hr/>

<h4 id="subscribe-comment" id="subscribe-comment">Subscribe &amp; Comment</h4>

<p>If you found this post informative, please subscribe by entering your email below. You&#39;ll receive the latest posts from the Decent Project to you inbox.
</p>

<p>Do you use biometrics on your phone or devices? Do you think there should be an exception for device biometrics in the testimonial/non-testimonial paradigm? <em>Let us know your thoughts in the comments below!</em>
<a href="https://remark.as/p/decentproject.org/should-you-use-biometrics-on-your-phone" rel="nofollow">Discuss...</a></p>

<hr/>

<h3 id="footnotes" id="footnotes">Footnotes</h3>

<p><sup>1.</sup> “The touchstone of whether an act of production is testimonial is whether the government compels the individual to use &#39;the contents of his own mind&#39; to explicitly or implicitly communicate some statement of fact.” <em>United States v. Doe (In re Grand Jury Subpoena Duces Tecum)</em>, 670 F.3d 1335, 1345 (11th Cir. 2012).</p>

<p><sup>2.</sup> “[F]orcing the custodian to testify orally as to the whereabouts of nonproduced records requires him to disclose the contents of his own mind. He might be compelled to convict himself out of his own mouth. That is contrary to the spirit and letter of the Fifth Amendment.” <em>Curcio v. United States</em>, 354 U.S. 118, 128 (1957).</p>

<p><sup>3.</sup> “[T]he Fifth Amendment privilege is not triggered where the Government merely compels some physical act, i.e. where the individual is not called upon to make use of the contents of his or her mind.” _In re Grand Jury Subpoena, 670 F.3d at 1345.</p>

<p><sup>4.</sup> “He may in some cases be forced to surrender a key to a strongbox containing incriminating documents, but I do not believe he can be compelled to reveal the combination to his wall safe — by word or deed.” <em>Doe v. United States</em>, 487 U.S. 201, 219, 108 S. Ct. 2341, 2352 (1988) (Justice Stevens dissent).</p>

<p><sup>5.</sup>  <em>United States v. Brown</em>, 125 F.4th 1186 (D.C. Cir. 2025).</p>

<p><sup>6.</sup> “Though placing a thumb on a phone may seem akin to submitting to fingerprinting or providing a handwriting exemplar, the act, as performed here, is much closer to responding to a lie detector test or complying with a command to say a password. When Schwartz was ordered to open the cellphone, his act of unlocking the phone represented the thoughts “I know how to open the phone,” “I have control over and access to this phone,” and “the print of this specific finger is the password to this phone.” If Schwartz had instead been compelled to disclose whether he could open the phone, and made to say yes or to verbally disclose the password, those answers unquestionably would be testimonial communications. The compelled opening of the cellphone that occurred here is no different.” <em>United States v. Brown</em>, 125 F.4th 1186, 1202-03 (D.C. Cir. 2025).</p>

<p><sup>7.</sup> <em>United States v. Payne</em>, 99 F.4th 495 (9th Cir. 2024).</p>

<p><sup>8.</sup> “While providing law enforcement officers with a combination to a safe or passcode to a phone would require an individual to divulge the “contents of his own mind,” turning over a key to a safe or a thumb to unlock a phone requires no such mental process.” <em>Payne</em>, 99 at 511.</p>

<p><sup>9.</sup> “[T]he Supreme Court has framed the question around whether a particular action requires a defendant to divulge the contents of his mind, not whether two actions yield the same result.” <em>Payne</em>, 99 at 511.</p>

<p><sup>10.</sup> “The officers were left to identify any incriminating evidence through their own investigation.” <em>Payne</em>, 99 at 511.</p>

<p><sup>11.</sup>  <em>United States v. Combs</em>, No. 24-CR-542 (AS), 2025 LX 289072 (S.D.N.Y. Apr. 18, 2025).</p>

<p><sup>12.</sup> But when “&#39;[t]he existence and location of the papers are a foregone conclusion and the [defendant] adds little or nothing to the sum total of the Government&#39;s information by conceding that he in fact has the papers,&#39; production does not run afoul of the Fifth Amendment.” <em>Combs</em>, LX 289072 at <em>2 (quoting <em>Fisher v. United States</em>, 425 U.S. 391, 410-11, 96 S. Ct. 1569, 48 L. Ed. 2d 39 (1976)); “Second, under the &#39;foregone  [</em>1346]  conclusion&#39; doctrine, an act of production is not testimonial—even if the act conveys a fact regarding the existence or location, possession, or authenticity of the subpoenaed materials—if the Government can show with &#39;reasonable particularity&#39; that, at the time it sought to compel the act of production, it already knew of the materials, thereby making any testimonial aspect a &#39;foregone conclusion.&#39;” <em>In re Grand Jury Subpoena</em>, 670 F.3d at 1345-46.</p>

<p><sup>13.</sup> “[P]roviding law enforcement officers with a combination to a safe or passcode to a phone would require an individual to divulge the “contents of his own mind.” <em>Payne</em>, 99 at 511; “Requiring Doe to use a decryption password is most certainly more akin to requiring the production of a combination because both demand the use of the contents of the mind ...  Hence, we conclude that what the Government seeks to compel in this case, the decryption and production of the contents of the hard drives, is testimonial in character.” <em>In re Grand Jury Subpoena</em>, 670 F.3d at 1346.</p>

<hr/>

<p><em>Disclaimer: I am not a lawyer, and I am not your lawyer. This post is meant to be informative and not to be taken as legal advice. If you are facing a legal issue you should always consult with a licensed attorney who can render legal advice that is specific to your needs.</em></p>
]]></content:encoded>
      <guid>https://decentproject.org/should-you-use-biometrics-on-your-phone</guid>
      <pubDate>Thu, 15 Jan 2026 19:40:25 +0000</pubDate>
    </item>
    <item>
      <title>Privacy for individuals, not ICE</title>
      <link>https://decentproject.org/privacy-for-individuals-not-ice?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[&#xA;&#xA;They show up in U.S. neighborhoods around the country dressed like a paramilitary organization--tactical vests, camouflage, and assault rifles--a href=&#34;https://www.brookings.edu/articles/racial-profiling-by-ice-will-have-a-marked-impact-on-latino-communities/&#34; target=&#34;blankopenly profiling minorities/a, a href=&#34;https://apnews.com/article/immigration-protest-arrests-detention-ice-8993bfd5d54b870521ec5b44fc42cd71&#34; target=&#34;blank&#34;illegally detaining and arresting U.S. citizens/a, and a href=&#34;https://www.npr.org/2025/11/08/nx-s1-5585691/ice-facial-recognition-immigration-tracking-spyware&#34; target=&#34;blank&#34;scanning the faces/a of anyone who might criticize or confront them.&#xA;&#xA;And perhaps worst of all, they show up wearing masks or balaclavas, concealing their identity, and refusing to identify themselves when asked.  &#xA;!--more--&#xA;Since the start of the second Trump Administration--and particularly since the ramp up in operations in Minnesota--there has been a steady stream of disturbing videos showing ICE agents operating more like a shadowy guerilla snatch-and-grab organization rather than a federal immigration enforcement agency required to operate within the bounds of the constitution and laws.&#xA;&#xA;In response, ICE efforts have been met with protests and disruptions. There have also been efforts to track their movements online and unmask ICE agents.&#xA;&#xA;Now, in what is the largest leak of its kind, a href=&#34;https://icelist.is/ target=&#34;blank&#34;Ice List/a has put out a list a href=&#34;https://www.rawstory.com/ice-agents-data-leak/&#34; target=&#34;blank&#34;revealing the identities of some 4,500 ICE and Border Patrol employees/a.&#xA;&#xA;The leak comes just days after the a href=&#34;https://www.nytimes.com/2026/01/10/us/rennee-good-ice-shooting-minnesota.html&#34; target=&#34;blank&#34;ICE shooting of Renee Good in Minneapolis/a by a masked ICE agent, later a href=&#34;https://www.wbur.org/news/2026/01/09/johnathan-ross-ice-killing-renee-good-minneapolis-background&#34; target=&#34;blank&#34;identified as Jonathan Ross/a.&#xA;&#xA;Predictably, the Trump Administration a href=&#34;https://www.advocate.com/politics/trump-blames-renee-good&#34; target=&#34;blank&#34;has been quick to blame Good and others/a for any complaints against ICE&#39;s operations while ramping up its enforcement actions.&#xA;&#xA;While the Decent Project advocates for privacy rights, it believes those rights belong to the people. Civil liberties belong to the people. &#xA;&#xA;Federal agents should not be roaming American streets in masks and arresting people without cause or in violation of their rights.&#xA;&#xA;Federal agents should not enjoy anonymity when they violate the rights of immigrants and U.S. citizens.&#xA;&#xA;Law enforcement agencies should operate with a presumption of transparency and identification--save for some narrow and well justified exceptions. This is how a href=&#34;https://www.hrw.org/news/2025/12/18/us-masked-federal-agents-undermine-rule-of-law&#34; target=&#34;blank&#34;law enforcement builds trust and credibility/a with the people they police.&#xA;&#xA;Further, accountability demands, at minimum, the ability to identify offenders.&#xA;&#xA;The Trump Administration will no doubt argue this leak threatens the safety of ICE agents. It will probably try to get the site shut down and the data removed.&#xA;&#xA;We&#39;d argue, however, that the best way to protect federal agents is for leaders to ensure they follow the law and respect the rights of their fellow citizens.&#xA;&#xA;~ Torman&#xA;psmallVerify this post: a href=&#34;https://github.com/decentproject/Signatures/blob/main/privacyforindividualsnotice.md&#34; target=&#34;blank&#34;Source/a | a href=&#34;https://github.com/decentproject/Signatures/blob/main/privacyforindividualsnotice.md.asc&#34; target=&#34;blank&#34;Signature/a | a href=&#34;https://github.com/decentproject/Signatures/blob/main/torman-pgp-key.asc&#34; target=&#34;_blank&#34;PGP Key/a/small/p&#xA;&#xA;#ICE #ReneeGood #privacyrights #doxxing&#xA;&#xA;Subscribe and comment&#xA;&#xA;If you found this post interesting or informative, please considering subscribing to the Decent Project by entering your email below!&#xA;!--emailsub--&#xA;&#xA;And if you have thoughts you would like to share, reach Torman on Mastodon @torman@privacysafe.social or post a comment in our discussion here: a href=&#34;https://remark.as/p/decentproject.org/privacy-for-individuals-not-ice&#34;Discuss.../a&#xA;&#xA;Thank you for reading!&#xA;&#xA;]]&gt;</description>
      <content:encoded><![CDATA[<p><img src="https://i.snap.as/4kzLqhb0.png" alt=""/></p>

<p>They show up in U.S. neighborhoods around the country dressed like a paramilitary organization—tactical vests, camouflage, and assault rifles—<a href="https://www.brookings.edu/articles/racial-profiling-by-ice-will-have-a-marked-impact-on-latino-communities/" target="blank&gt;openly profiling minorities&lt;/a&gt;, &lt;a href=" target="blank" rel="nofollow">illegally detaining and arresting U.S. citizens</a>, and <a href="https://www.npr.org/2025/11/08/nx-s1-5585691/ice-facial-recognition-immigration-tracking-spyware" target="blank" rel="nofollow">scanning the faces</a> of anyone who might criticize or confront them.</p>

<p>And perhaps worst of all, they show up wearing masks or balaclavas, concealing their identity, and refusing to identify themselves when asked.<br/>

Since the start of the second Trump Administration—and particularly since the ramp up in operations in Minnesota—there has been a steady stream of disturbing videos showing ICE agents operating more like a shadowy guerilla snatch-and-grab organization rather than a federal immigration enforcement agency required to operate within the bounds of the constitution and laws.</p>

<p>In response, ICE efforts have been met with protests and disruptions. There have also been efforts to track their movements online and unmask ICE agents.</p>

<p>Now, in what is the largest leak of its kind, Ice List has put out a list <a href="https://www.rawstory.com/ice-agents-data-leak/" target="blank" rel="nofollow">revealing the identities of some 4,500 ICE and Border Patrol employees</a>.</p>

<p>The leak comes just days after the <a href="https://www.nytimes.com/2026/01/10/us/rennee-good-ice-shooting-minnesota.html" target="blank" rel="nofollow">ICE shooting of Renee Good in Minneapolis</a> by a masked ICE agent, later <a href="https://www.wbur.org/news/2026/01/09/johnathan-ross-ice-killing-renee-good-minneapolis-background" target="blank" rel="nofollow">identified as Jonathan Ross</a>.</p>

<p>Predictably, the Trump Administration <a href="https://www.advocate.com/politics/trump-blames-renee-good" target="blank" rel="nofollow">has been quick to blame Good and others</a> for any complaints against ICE&#39;s operations while ramping up its enforcement actions.</p>

<p>While the Decent Project advocates for privacy rights, it believes those rights belong to the people. Civil liberties belong to the people.</p>

<p>Federal agents should not be roaming American streets in masks and arresting people without cause or in violation of their rights.</p>

<p>Federal agents should not enjoy anonymity when they violate the rights of immigrants and U.S. citizens.</p>

<p>Law enforcement agencies should operate with a presumption of transparency and identification—save for some narrow and well justified exceptions. This is how <a href="https://www.hrw.org/news/2025/12/18/us-masked-federal-agents-undermine-rule-of-law" target="blank" rel="nofollow">law enforcement builds trust and credibility</a> with the people they police.</p>

<p>Further, accountability demands, at minimum, the ability to identify offenders.</p>

<p>The Trump Administration will no doubt argue this leak threatens the safety of ICE agents. It will probably try to get the site shut down and the data removed.</p>

<p>We&#39;d argue, however, that the best way to protect federal agents is for leaders to ensure they follow the law and respect the rights of their fellow citizens.</p>

<p>~ Torman
<p><small>Verify this post: <a href="https://github.com/decentproject/Signatures/blob/main/privacy_for_individuals_not_ice.md" target="_blank" rel="nofollow noopener">Source</a> | <a href="https://github.com/decentproject/Signatures/blob/main/privacy_for_individuals_not_ice.md.asc" target="_blank" rel="nofollow noopener">Signature</a> | <a href="https://github.com/decentproject/Signatures/blob/main/torman-pgp-key.asc" target="_blank" rel="nofollow noopener">PGP Key</a></small></p></p>

<p><a href="https://decentproject.org/tag:ICE" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">ICE</span></a> <a href="https://decentproject.org/tag:ReneeGood" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">ReneeGood</span></a> <a href="https://decentproject.org/tag:privacyrights" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">privacyrights</span></a> <a href="https://decentproject.org/tag:doxxing" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">doxxing</span></a></p>

<h3 id="subscribe-and-comment" id="subscribe-and-comment">Subscribe and comment</h3>

<p>If you found this post interesting or informative, please considering subscribing to the Decent Project by entering your email below!
</p>

<p>And if you have thoughts you would like to share, reach Torman on Mastodon <a href="/@/torman@privacysafe.social" class="u-url mention" rel="nofollow">@<span>torman@privacysafe.social</span></a> or post a comment in our discussion here: <a href="https://remark.as/p/decentproject.org/privacy-for-individuals-not-ice" rel="nofollow">Discuss...</a></p>

<p>Thank you for reading!</p>
]]></content:encoded>
      <guid>https://decentproject.org/privacy-for-individuals-not-ice</guid>
      <pubDate>Wed, 14 Jan 2026 17:49:24 +0000</pubDate>
    </item>
  </channel>
</rss>