<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>FifthAmendment &amp;mdash; Decent Project</title>
    <link>https://decentproject.org/tag:FifthAmendment</link>
    <description>*Privacy. Autonomy. Civil Liberties.*</description>
    <pubDate>Sun, 19 Apr 2026 00:30:39 +0000</pubDate>
    <image>
      <url>https://i.snap.as/eEu6bhjy.ico</url>
      <title>FifthAmendment &amp;mdash; Decent Project</title>
      <link>https://decentproject.org/tag:FifthAmendment</link>
    </image>
    <item>
      <title>An FBI raid on a reporter’s home shows the problem with biometrics</title>
      <link>https://decentproject.org/an-fbi-raid-on-a-reporters-home-shows-the-problem-with-biometrics?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[  Quick Look  &#xA;  • The FBI raid on Washington Post reporter’s home shows uncertainty about biometrics under the Fifth Amendment.  &#xA;  • Hannah Natanson was compelled to unlock a MacBook with her fingerprint.  &#xA;  • Until the law is clarified, use PINs/passwords instead of biometrics.&#xA;&#xA;Recently, the a href=&#34;https://www.theguardian.com/us-news/2026/jan/14/fbi-raid-washington-post-hannah-natanson&#34; target=&#34;blank&#34;FBI served a search warrant on the home of Washington Post reporter Hannah Natanson/a.&#xA;&#xA;It&#39;s rightfully being a href=&#34;https://firstamendment.mtsu.edu/post/press-freedom-advocates-worry-that-raid-on-washington-post-journalists-home-will-chill-reporting/&#34; target=&#34;blank&#34;decried as yet another disturbing attack/a by the Trump Administration on America&#39;s tradition of free and independent press--a tradition that was dealt yet another blow this week when a href=&#34;https://www.npr.org/2026/01/30/nx-s1-5693756/don-lemon-arrest-cnn-minneapolis&#34; target=&#34;blank&#34;the Administration arrested four Black journalists in Minnesota/a, one of whom was former CNN anchor Don Lemon.&#xA;&#xA;While much ink has been spilled about the potential chilling effect the raid on Natanson&#39;s home may have, some key details of the search are now coming to light.&#xA;&#xA;Authorities seized several devices from Natanson&#39;s home&#xA;&#xA;Authorities seized several devices from Natanson&#39;s home during the January 14th raid&#xA;  figcaption style=&#34;font-style:italic; color:#555;&#34;Authorities seized several devices from Natanson&#39;s home during the January 14th raid/figcaption&#xA;In court filings, a href=&#34;https://storage.courtlistener.com/recap/gov.uscourts.vaed.588772/gov.uscourts.vaed.588772.35.01.pdf&#34; target=&#34;blank&#34;the federal government has now detailed/a the devices seized from Natanson&#39;s home, which included two laptops, a cell phone, an audio recorder, a hard drive, and a smartwatch.&#xA;!--more--&#xA;While the seizures raise a number of concerns, perhaps overlooked is that Natanson was compelled to unlock one of her MacBook computers using her fingerprint.&#xA;&#xA;Authorities compelled Natanson to unlock a Macbook computer with her fingerprint.&#xA;figcaption style=&#34;font-style:italic; color:#555;&#34;Authorities compelled Natanson to unlock a Macbook computer with her fingerprint/figcaption&#xA;It&#39;s a remarkable exchange--and one that demonstrates the risks associated with using biometrics instead of PIN numbers or passwords.&#xA;&#xA;Authorities compelled Natanson to unlock her device&#xA;&#xA;The warrant used by authorities to search Natanson&#39;s home explicitly stated that agents could compel her to unlock her devices using biometrics, such as a fingerprint or face scan, but they could not compel her to reveal any passwords.&#xA;&#xA;Screenshot of the relevant section of the FBI warrant used to raid the home of Washington Post journalist Hannah Natanson (original image from The Intercept)&#xA;  figcaption style=&#34;font-style:italic; color:#555;&#34;Section of the warrant used to raid Natanson&#39;s home (via The Intercept)/figcaption&#xA;During the search, the government states that Natanson told agents she does not use biometrics and has only one computer and one phone.&#xA;&#xA;Yet, as the search continued, authorities eventually discovered a second computer inside a red backpack in her kitchen.&#xA;&#xA;When agents opened the computer, the lockscreen prompted them to enter a password or use TouchID. The agents then insisted--perhaps against the orders of the search warrant shown above--that she attempt to unlock the device.&#xA;&#xA;The government states that Natanson put her index finger on the scanner, which then unlocked it.&#xA;&#xA;Can you be compelled to unlock your device with biometrics?&#xA;&#xA;This is the exact issue the Decent Project wrote about a little more than two weeks ago.&#xA;&#xA;In our article entitled a href=&#34;https://decentproject.org/should-you-use-biometrics-on-your-phone&#34; target=&#34;blank&#34;iShould you use biometrics on your phone?/i/a, we explored the murky legal landscape over whether law enforcement can compel someone to unlock their device using their fingerprint or face.&#xA;&#xA;Currently, courts are split on the issue. It comes down to whether a court sees the use of biometrics as &#34;testimonial&#34; evidence.&#xA;&#xA;Testimonial evidence is generally anything that requires you to divulge the contents of your mind, ii.e./i things you know, have seen, or have heard. This kind of evidence has a long tradition of being protected by the a href=&#34;https://www.law.cornell.edu/constitution/fifthamendment&#34; target=&#34;blank&#34;Fifth Amendment&#39;s privilege against self-incrimination/a, meaning you cannot be compelled to reveal it.&#xA;&#xA;However, some courts do not think that biometrics are &#34;testimonial&#34; in nature. Instead, they argue a biometric unlock doesn&#39;t reveal anything about the content of an individual&#39;s thinking or knowledge. &#xA;&#xA;Map of the various federal judicial circuits&#xA;&#xA;For example, in 2024, the 9th Circuit (in purple above) said in a href=&#34;https://caselaw.findlaw.com/court/us-9th-circuit/116062162.html&#34; target=&#34;blank&#34;iUnited States v. Payne/i/a that biometrics are not afforded the same protections as passwords or PIN numbers:&#xA;&#xA;  &#34;While providing law enforcement officers with a combination to a safe or passcode to a phone would require an individual to divulge the &#39;contents of his own mind,&#39; turning over a key to a safe or a thumb to unlock a phone requires no such mental process.&#34;&#xA;&#xA;We at the Decent Project bistrongly/i/b disagree with this view, and we think Natanson&#39;s case is a great example as to why.&#xA;&#xA;What Natanson&#39;s fingerprint actually revealed&#xA;&#xA;When Natanson unlocked the MacBook in her kitchen, it revealed several things about her and her relationship to that device.&#xA;&#xA;First, it demonstrated that Natanson knew how to biometrically unlock the device. &#xA;&#xA;This, in our opinion, stands in direct contrast to the 9th Circuit&#39;s view that unlocking a device with your finger &#34;requires no ... mental process.&#34;&#xA;&#xA;The government&#39;s filing isn&#39;t particularly clear on the exact exchange, but when agents &#34;told her to try&#34; to unlock the device and she did so with her index finger, it raises the question: how did she know which finger to use?&#xA;&#xA;Second, her fingerprint demonstrated her control over the computer. &#xA;&#xA;Unlocking a device with your fingerprint is a pretty clear indication that you are the owner of that device, or at least in control of it. If this device is not a shared computer, then it effectively demonstrates that Natanson is responsible for the content found on the device.&#xA;&#xA;It&#39;s important to note that Natanson is not a defendant in this case, nor is she a target of the investigation--but in any other context, this kind of evidence could be damning.&#xA;&#xA;Instead, imagine if authorities had found the computer in Natanson&#39;s home and it did not have TouchID. Since Natanson cannot be compelled to reveal a PIN or password, what would authorities have to demonstrate that the device is hers?&#xA;&#xA;They could say the device was in her kitchen and that it was found in her backpack, but that&#39;s about it. &#xA;&#xA;Takeaway&#xA;&#xA;Not all courts agree with the 9th Circuit when it comes to biometrics. As discussed in our a href=&#34;https://decentproject.org/should-you-use-biometrics-on-your-phone&#34; target=&#34;blank&#34;earlier article/a, the D.C. Circuit Court of Appeals ruled last year that biometrics can be afforded the same protections as other testimonial evidence.&#xA;&#xA;While that&#39;s good news, this issue is new and the law is still developing. As such, unless and until there is legal clarity, the Decent Project continues to recommend that individuals do not use biometrics on their devices.&#xA;&#xA;~ Torman&#xA;psmallVerify this post: a href=&#34;https://github.com/decentproject/Signatures/blob/main/anfbiraidonareportershomeshowstheproblemwithbiometrics.md&#34; target=&#34;blank&#34;Source/a | a href=&#34;https://github.com/decentproject/Signatures/blob/main/anfbiraidonareportershomeshowstheproblemwithbiometrics.md.asc&#34; target=&#34;blank&#34;Signature/a | a href=&#34;https://github.com/decentproject/Signatures/blob/main/torman-pgp-key.asc&#34; target=&#34;_blank&#34;PGP Key/a/small/p&#xA;&#xA;#privacy #security #OPSEC #FifthAmendment&#xA;&#xA;---&#xA;&#xA;If you enjoyed reading this or found it informative, please consider subscribing in order to receive posts directly to your inbox: &#xA;!--emailsub--&#xA;&#xA;Also feel free to leave a comment here:  a href=&#34;https://remark.as/p/decentproject.org/an-fbi-raid-on-a-reporters-home-shows-the-problem-with-biometrics&#34;Discuss.../a]]&gt;</description>
      <content:encoded><![CDATA[<blockquote><p><strong>Quick Look</strong><br/>
• The FBI raid on Washington Post reporter’s home shows uncertainty about biometrics under the Fifth Amendment.<br/>
• Hannah Natanson was compelled to unlock a MacBook with her fingerprint.<br/>
• Until the law is clarified, use PINs/passwords instead of biometrics.</p></blockquote>

<p>Recently, the <a href="https://www.theguardian.com/us-news/2026/jan/14/fbi-raid-washington-post-hannah-natanson" target="_blank" rel="nofollow noopener">FBI served a search warrant on the home of Washington Post reporter Hannah Natanson</a>.</p>

<p>It&#39;s rightfully being <a href="https://firstamendment.mtsu.edu/post/press-freedom-advocates-worry-that-raid-on-washington-post-journalists-home-will-chill-reporting/" target="_blank" rel="nofollow noopener">decried as yet another disturbing attack</a> by the Trump Administration on America&#39;s tradition of free and independent press—a tradition that was dealt yet another blow this week when <a href="https://www.npr.org/2026/01/30/nx-s1-5693756/don-lemon-arrest-cnn-minneapolis" target="_blank" rel="nofollow noopener">the Administration arrested four Black journalists in Minnesota</a>, one of whom was former CNN anchor Don Lemon.</p>

<p>While much ink has been spilled about the potential chilling effect the raid on Natanson&#39;s home may have, some key details of the search are now coming to light.</p>

<h3 id="authorities-seized-several-devices-from-natanson-s-home" id="authorities-seized-several-devices-from-natanson-s-home">Authorities seized several devices from Natanson&#39;s home</h3>

<p><img src="https://i.snap.as/2hatO2Ry.png" alt="Authorities seized several devices from Natanson&#39;s home during the January 14th raid"/>
  <figcaption style="font-style:italic; color:#555;">Authorities seized several devices from Natanson&#39;s home during the January 14th raid</figcaption>
In court filings, <a href="https://storage.courtlistener.com/recap/gov.uscourts.vaed.588772/gov.uscourts.vaed.588772.35.0_1.pdf" target="_blank" rel="nofollow noopener">the federal government has now detailed</a> the devices seized from Natanson&#39;s home, which included two laptops, a cell phone, an audio recorder, a hard drive, and a smartwatch.

While the seizures raise a number of concerns, perhaps overlooked is that Natanson was compelled to unlock one of her MacBook computers using her fingerprint.</p>

<p><img src="https://i.snap.as/6GQEBcWq.png" alt="Authorities compelled Natanson to unlock a Macbook computer with her fingerprint."/>
<figcaption style="font-style:italic; color:#555;">Authorities compelled Natanson to unlock a Macbook computer with her fingerprint</figcaption>
It&#39;s a remarkable exchange—and one that demonstrates the risks associated with using biometrics instead of PIN numbers or passwords.</p>

<h3 id="authorities-compelled-natanson-to-unlock-her-device" id="authorities-compelled-natanson-to-unlock-her-device">Authorities compelled Natanson to unlock her device</h3>

<p>The warrant used by authorities to search Natanson&#39;s home explicitly stated that agents could compel her to unlock her devices using biometrics, such as a fingerprint or face scan, but they could not compel her to reveal any passwords.</p>

<p><img src="https://i.snap.as/pYmslu97.png" alt="Screenshot of the relevant section of the FBI warrant used to raid the home of Washington Post journalist Hannah Natanson (original image from The Intercept)"/>
  <figcaption style="font-style:italic; color:#555;">Section of the warrant used to raid Natanson&#39;s home (via The Intercept)</figcaption>
During the search, the government states that Natanson told agents she does not use biometrics and has only one computer and one phone.</p>

<p>Yet, as the search continued, authorities eventually discovered a second computer inside a red backpack in her kitchen.</p>

<p>When agents opened the computer, the lockscreen prompted them to enter a password or use TouchID. The agents then insisted—perhaps against the orders of the search warrant shown above—that she attempt to unlock the device.</p>

<p>The government states that Natanson put her index finger on the scanner, which then unlocked it.</p>

<h3 id="can-you-be-compelled-to-unlock-your-device-with-biometrics" id="can-you-be-compelled-to-unlock-your-device-with-biometrics">Can you be compelled to unlock your device with biometrics?</h3>

<p>This is the exact issue the Decent Project wrote about a little more than two weeks ago.</p>

<p>In our article entitled <a href="https://decentproject.org/should-you-use-biometrics-on-your-phone" target="_blank" rel="nofollow noopener"><i>Should you use biometrics on your phone?</i></a>, we explored the murky legal landscape over whether law enforcement can compel someone to unlock their device using their fingerprint or face.</p>

<p>Currently, courts are split on the issue. It comes down to whether a court sees the use of biometrics as “testimonial” evidence.</p>

<p>Testimonial evidence is generally anything that requires you to divulge the contents of your mind, <i>i.e.</i> things you know, have seen, or have heard. This kind of evidence has a long tradition of being protected by the <a href="https://www.law.cornell.edu/constitution/fifth_amendment" target="_blank" rel="nofollow noopener">Fifth Amendment&#39;s privilege against self-incrimination</a>, meaning you cannot be compelled to reveal it.</p>

<p>However, some courts do not think that biometrics are “testimonial” in nature. Instead, they argue a biometric unlock doesn&#39;t reveal anything about the content of an individual&#39;s thinking or knowledge.</p>

<p><img src="https://i.snap.as/YIGafnao.jpg" alt="Map of the various federal judicial circuits"/></p>

<p>For example, in 2024, the 9th Circuit (in purple above) said in <a href="https://caselaw.findlaw.com/court/us-9th-circuit/116062162.html" target="_blank" rel="nofollow noopener"><i>United States v. Payne</i></a> that biometrics are <em>not</em> afforded the same protections as passwords or PIN numbers:</p>

<blockquote><p>“While providing law enforcement officers with a combination to a safe or passcode to a phone would require an individual to divulge the &#39;contents of his own mind,&#39; turning over a key to a safe or a thumb to unlock a phone requires no such mental process.”</p></blockquote>

<p>We at the Decent Project <b><i>strongly</i></b> disagree with this view, and we think Natanson&#39;s case is a great example as to why.</p>

<h3 id="what-natanson-s-fingerprint-actually-revealed" id="what-natanson-s-fingerprint-actually-revealed">What Natanson&#39;s fingerprint actually revealed</h3>

<p>When Natanson unlocked the MacBook in her kitchen, it revealed several things about her and her relationship to that device.</p>

<p>First, it demonstrated that Natanson knew <em>how</em> to biometrically unlock the device.</p>

<p>This, in our opinion, stands in direct contrast to the 9th Circuit&#39;s view that unlocking a device with your finger “requires no ... mental process.”</p>

<p>The government&#39;s filing isn&#39;t particularly clear on the exact exchange, but when agents “told her to try” to unlock the device and she did so with her index finger, it raises the question: <em>how did she know which finger to use?</em></p>

<p>Second, her fingerprint demonstrated her control over the computer.</p>

<p>Unlocking a device with your fingerprint is a pretty clear indication that you are the owner of that device, or at least in control of it. If this device is not a shared computer, then it effectively demonstrates that Natanson is responsible for the content found on the device.</p>

<p>It&#39;s important to note that Natanson is not a defendant in this case, nor is she a target of the investigation—but in any other context, this kind of evidence could be damning.</p>

<p>Instead, imagine if authorities had found the computer in Natanson&#39;s home and it did not have TouchID. Since Natanson cannot be compelled to reveal a PIN or password, what would authorities have to demonstrate that the device is hers?</p>

<p>They could say the device was in her kitchen and that it was found in her backpack, but that&#39;s about it.</p>

<h3 id="takeaway" id="takeaway">Takeaway</h3>

<p>Not all courts agree with the 9th Circuit when it comes to biometrics. As discussed in our <a href="https://decentproject.org/should-you-use-biometrics-on-your-phone" target="_blank" rel="nofollow noopener">earlier article</a>, the D.C. Circuit Court of Appeals ruled last year that biometrics can be afforded the same protections as other testimonial evidence.</p>

<p>While that&#39;s good news, this issue is new and the law is still developing. As such, unless and until there is legal clarity, the Decent Project continues to recommend that individuals do <em>not</em> use biometrics on their devices.</p>

<p>~ Torman
<p><small>Verify this post: <a href="https://github.com/decentproject/Signatures/blob/main/an_fbi_raid_on_a_reporters_home_shows_the_problem_with_biometrics.md" target="_blank" rel="nofollow noopener">Source</a> | <a href="https://github.com/decentproject/Signatures/blob/main/an_fbi_raid_on_a_reporters_home_shows_the_problem_with_biometrics.md.asc" target="_blank" rel="nofollow noopener">Signature</a> | <a href="https://github.com/decentproject/Signatures/blob/main/torman-pgp-key.asc" target="_blank" rel="nofollow noopener">PGP Key</a></small></p></p>

<p><a href="https://decentproject.org/tag:privacy" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">privacy</span></a> <a href="https://decentproject.org/tag:security" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">security</span></a> <a href="https://decentproject.org/tag:OPSEC" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">OPSEC</span></a> <a href="https://decentproject.org/tag:FifthAmendment" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">FifthAmendment</span></a></p>

<hr/>

<p>If you enjoyed reading this or found it informative, please consider subscribing in order to receive posts directly to your inbox:
</p>

<p>Also feel free to leave a comment here:  <a href="https://remark.as/p/decentproject.org/an-fbi-raid-on-a-reporters-home-shows-the-problem-with-biometrics" rel="nofollow">Discuss...</a></p>
]]></content:encoded>
      <guid>https://decentproject.org/an-fbi-raid-on-a-reporters-home-shows-the-problem-with-biometrics</guid>
      <pubDate>Sat, 31 Jan 2026 22:02:55 +0000</pubDate>
    </item>
    <item>
      <title>Should you use biometrics on your phone?</title>
      <link>https://decentproject.org/should-you-use-biometrics-on-your-phone?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[&#xA;&#xA;There are a lot of positives to using biometrics on your devices. It&#39;s hard to deny their convenience and in some ways, avoiding passwords can be a good thing since they can be forgotten or stolen.&#xA;&#xA;But the law doesn&#39;t necessarily treat your fingerprint the same as a PIN code or password when it comes to unlocking your device. This means you could be compelled to unlock your phone or computer depending on which unlock method you use.&#xA;!--more--&#xA;Testimonial vs. non-testimonial evidence&#xA;&#xA;Whether the government can compel you to unlock your device hinges on whether a court considers your biometric data to be &#34;testimonial&#34; or not.&#xA;&#xA;Testimonial evidence is anything that reveals the contents of your mind, i.e., things you&#39;ve seen, heard, or know.sup1/sup&#xA;&#xA;Importantly, testimonial evidence falls under the Fifth Amendment&#39;s protections against self-incrimination. In other words, you cannot be compelled to provide testimonial evidence that may incriminate you.&#xA;&#xA;However, courts distinguish testimonial evidence from non-testimonial evidence, which doesn&#39;t call on a person to reveal the &#34;contents of [their] own mind.&#34;sup2/sup For example, compelled physical actions are not usually considered testimonial.sup3./sup This is why you can be compelled to provide fingerprints during booking, or a bloodtest as part of an investigation.&#xA;&#xA;Courts have illustrated the distinction between testimonial and non-testimonial by comparing an individual who is compelled to produce keys to a lockbox (non-testimonial) against an individual who is compelled to produce a combination to a safe (testimonial).sup4/sup One is simply handing over a key while the other requires you to divulge something you know.&#xA;&#xA;This disctinction is important because when it comes to your devices courts typically agree that PINs and passcodes are testimonial, while some courts have found that biometrics are non-testimonial.&#xA;&#xA;That might make the difference as to whether you can be compelled to unlock your device.&#xA;&#xA;Circuit Split&#xA;&#xA;Currently, there are different schools of thought on this issue.&#xA;&#xA;Just last year, in United States v. Brownsup5/sup the D.C. Circuit Court of Appeals found that compelling an individual to unlock their phone with biometrics was testimonial. The court found the act of opening a phone with biometrics--while physical--is testimonial because it &#34;directly announces the owner&#39;s access to and control over the phone, as well as his mental knowledge of how to unlock the device.&#34;sup6/sup&#xA;&#xA;It&#39;s an interesting take on the testimonial vs. non-testimonial issue. &#xA;&#xA;It illustrates the distinction between physical acts that communicate something and those that don&#39;t. Submitting to a fingerprint panel at the police station doesn&#39;t reveal anything incriminatory. It&#39;s only once those fingerprints are anaylzed that they may incriminate. Whereas, a fingerprint that unlocks a phone essentially authenticates you as its owner. &#xA;&#xA;However, in 2024, the 9th Circuit Court of Appeals in United States v. Paynesup7/sup found the opposite. It ruled that a fingerprint unlock of a phone is akin to handing over the keys to a safe, rather than divulging its combination.sup8/sup&#xA;&#xA;The court rejected the idea that biometrics are a substitute for PINs or passcodes and should therefore enjoy the same protections.sup9/sup It also rejected the idea that a biometric unlock is testimonial because it confirms ownership and knowledge of the device&#39;s contents. The court said the access is not incriminating by itself, but only provides access to potential source of incriminating information.sup10/sup&#xA;&#xA;Should you use biometrics?&#xA;&#xA;Each person has to assess their own threat model. But given the variances in the law and the lack of direct precedent in many circuits, it would seem that the safest approach is to use a PIN or passcode to unlock your device.&#xA;&#xA;Even if you find the Brown case pursuasive or think it would apply, there have already been court decisions that distinguish its finding. &#xA;&#xA;Noteably, P. Diddy cited Brown, among other cases, in his criminal case in New York in order to prevent compelled production of a cell phone. The District Court ruled in favor of the government, in part, because there was no question as to whether the phone was his.sup11/sup&#xA;&#xA;Essentially, Brown suggests that the testimonial aspect of unlocking the phone is that it communicates control and ownership. But if the government can show that you own and control the device in other ways, then compelling a biometric unlock is not really implicating your Fifth Amendment rights.sup12./sup&#xA;&#xA;Recommendations&#xA;&#xA;The Decent Project recommends you avoid using biometrics on your devices. There is little debate over whether divulging a PIN constitutes testimonial evidence.sup13/sup&#xA;&#xA;We recognizes, though, that typing in a six-digit PIN (yes, please make your PINs at least six digits) every time you want to unlock your phone can be annoying. Given this, you may consider PIN-locking important apps, such as your e-mail, messengers, and password managers.&#xA;&#xA;We also recommend using unique PINs for each of these apps rather than one generic PIN.&#xA;&#xA;Additionally, if you are traveling across an international border, such as returning to the U.S. from a vacation overseas, consider disabling your biometrics temporarily. This way, if you are stopped your device cannot be unlocked simply with a face scan or fingerprint.&#xA;&#xA;~ Torman&#xA;psmallVerify this post: a href=&#34;https://github.com/decentproject/Signatures/blob/main/shouldIusebiometrics.md&#34; target=&#34;blank&#34;Source/a | a href=&#34;https://github.com/decentproject/Signatures/blob/main/shouldIusebiometrics.md.asc&#34; target=&#34;blank&#34;Signature/a | a href=&#34;https://github.com/decentproject/Signatures/blob/main/torman-pgp-key.asc&#34; target=&#34;blank&#34;PGP Key/a/small/p&#xA;&#xA;#privacy #security #opsec #FifthAmendment &#xA;&#xA;---&#xA;&#xA;Subscribe &amp; Comment&#xA;&#xA;If you found this post informative, please subscribe by entering your email below. You&#39;ll receive the latest posts from the Decent Project to you inbox.&#xA;!--emailsub--&#xA;&#xA;Do you use biometrics on your phone or devices? Do you think there should be an exception for device biometrics in the testimonial/non-testimonial paradigm? Let us know your thoughts in the comments below!&#xA;a href=&#34;https://remark.as/p/decentproject.org/should-you-use-biometrics-on-your-phone&#34;Discuss.../a&#xA;&#xA;--- &#xA;&#xA;Footnotes&#xA;sup1./sup &#34;The touchstone of whether an act of production is testimonial is whether the government compels the individual to use &#39;the contents of his own mind&#39; to explicitly or implicitly communicate some statement of fact.&#34; United States v. Doe (In re Grand Jury Subpoena Duces Tecum), 670 F.3d 1335, 1345 (11th Cir. 2012).&#xA;&#xA;sup2./sup &#34;[F]orcing the custodian to testify orally as to the whereabouts of nonproduced records requires him to disclose the contents of his own mind. He might be compelled to convict himself out of his own mouth. That is contrary to the spirit and letter of the Fifth Amendment.&#34; Curcio v. United States, 354 U.S. 118, 128 (1957).&#xA;&#xA;sup3./sup &#34;[T]he Fifth Amendment privilege is not triggered where the Government merely compels some physical act, i.e. where the individual is not called upon to make use of the contents of his or her mind.&#34; In re Grand Jury Subpoena, 670 F.3d at 1345.&#xA;&#xA;sup4./sup &#34;He may in some cases be forced to surrender a key to a strongbox containing incriminating documents, but I do not believe he can be compelled to reveal the combination to his wall safe -- by word or deed.&#34; Doe v. United States, 487 U.S. 201, 219, 108 S. Ct. 2341, 2352 (1988) (Justice Stevens dissent).&#xA;&#xA;sup5./sup  United States v. Brown, 125 F.4th 1186 (D.C. Cir. 2025).&#xA;&#xA;sup6./sup &#34;Though placing a thumb on a phone may seem akin to submitting to fingerprinting or providing a handwriting exemplar, the act, as performed here, is much closer to responding to a lie detector test or complying with a command to say a password. When Schwartz was ordered to open the cellphone, his act of unlocking the phone represented the thoughts &#34;I know how to open the phone,&#34; &#34;I have control over and access to this phone,&#34; and &#34;the print of this specific finger is the password to this phone.&#34; If Schwartz had instead been compelled to disclose whether he could open the phone, and made to say yes or to verbally disclose the password, those answers unquestionably would be testimonial communications. The compelled opening of the cellphone that occurred here is no different.&#34; United States v. Brown, 125 F.4th 1186, 1202-03 (D.C. Cir. 2025).&#xA;&#xA;sup7./sup United States v. Payne, 99 F.4th 495 (9th Cir. 2024).&#xA;&#xA;sup8./sup &#34;While providing law enforcement officers with a combination to a safe or passcode to a phone would require an individual to divulge the &#34;contents of his own mind,&#34; turning over a key to a safe or a thumb to unlock a phone requires no such mental process.&#34; Payne, 99 at 511.&#xA;&#xA;sup9./sup &#34;[T]he Supreme Court has framed the question around whether a particular action requires a defendant to divulge the contents of his mind, not whether two actions yield the same result.&#34; Payne, 99 at 511.&#xA;&#xA;sup10./sup &#34;The officers were left to identify any incriminating evidence through their own investigation.&#34; Payne, 99 at 511.&#xA;&#xA;sup11./sup  United States v. Combs, No. 24-CR-542 (AS), 2025 LX 289072 (S.D.N.Y. Apr. 18, 2025).&#xA;&#xA;sup12./sup But when &#34;&#39;[t]he existence and location of the papers are a foregone conclusion and the [defendant] adds little or nothing to the sum total of the Government&#39;s information by conceding that he in fact has the papers,&#39; production does not run afoul of the Fifth Amendment.&#34; Combs, LX 289072 at 2 (quoting Fisher v. United States, 425 U.S. 391, 410-11, 96 S. Ct. 1569, 48 L. Ed. 2d 39 (1976)); &#34;Second, under the &#39;foregone  [1346]  conclusion&#39; doctrine, an act of production is not testimonial—even if the act conveys a fact regarding the existence or location, possession, or authenticity of the subpoenaed materials—if the Government can show with &#39;reasonable particularity&#39; that, at the time it sought to compel the act of production, it already knew of the materials, thereby making any testimonial aspect a &#39;foregone conclusion.&#39;&#34; In re Grand Jury Subpoena, 670 F.3d at 1345-46.&#xA;&#xA;sup13./sup &#34;[P]roviding law enforcement officers with a combination to a safe or passcode to a phone would require an individual to divulge the &#34;contents of his own mind.&#34; Payne, 99 at 511; &#34;Requiring Doe to use a decryption password is most certainly more akin to requiring the production of a combination because both demand the use of the contents of the mind ...  Hence, we conclude that what the Government seeks to compel in this case, the decryption and production of the contents of the hard drives, is testimonial in character.&#34; In re Grand Jury Subpoena, 670 F.3d at 1346.&#xA;&#xA;---&#xA;&#xA;Disclaimer: I am not a lawyer, and I am not your lawyer. This post is meant to be informative and not to be taken as legal advice. If you are facing a legal issue you should always consult with a licensed attorney who can render legal advice that is specific to your needs. ]]&gt;</description>
      <content:encoded><![CDATA[<p><img src="https://i.snap.as/X1tXUy9U.jpg" alt=""/></p>

<p>There are a lot of positives to using biometrics on your devices. It&#39;s hard to deny their convenience and in some ways, <em>avoiding</em> passwords can be a good thing since they can be forgotten or stolen.</p>

<p>But the law doesn&#39;t necessarily treat your fingerprint the same as a PIN code or password when it comes to unlocking your device. This means you could be compelled to unlock your phone or computer depending on which unlock method you use.
</p>

<h2 id="testimonial-vs-non-testimonial-evidence" id="testimonial-vs-non-testimonial-evidence">Testimonial vs. non-testimonial evidence</h2>

<p>Whether the government can compel you to unlock your device hinges on whether a court considers your biometric data to be “testimonial” or not.</p>

<p>Testimonial evidence is anything that reveals the contents of your mind, <em>i.e., things you&#39;ve seen, heard, or know</em>.<sup>1</sup></p>

<p>Importantly, testimonial evidence falls under the Fifth Amendment&#39;s protections against self-incrimination. In other words, you cannot be compelled to provide testimonial evidence that may incriminate you.</p>

<p>However, courts distinguish testimonial evidence from <em>non-testimonial</em> evidence, which doesn&#39;t call on a person to reveal the “contents of [their] own mind.”<sup>2</sup> For example, compelled physical actions are not usually considered testimonial.<sup>3.</sup> This is why you can be compelled to provide fingerprints during booking, or a bloodtest as part of an investigation.</p>

<p>Courts have illustrated the distinction between testimonial and non-testimonial by comparing an individual who is compelled to produce keys to a lockbox (non-testimonial) against an individual who is compelled to produce a combination to a safe (testimonial).<sup>4</sup> One is simply handing over a key while the other requires you to divulge something you know.</p>

<p>This disctinction is important because when it comes to your devices courts typically agree that PINs and passcodes are testimonial, while some courts have found that biometrics are non-testimonial.</p>

<p>That might make the difference as to whether you can be compelled to unlock your device.</p>

<h2 id="circuit-split" id="circuit-split">Circuit Split</h2>

<p>Currently, there are different schools of thought on this issue.</p>

<p>Just last year, in <em>United States v. Brown</em><sup>5</sup> the D.C. Circuit Court of Appeals found that compelling an individual to unlock their phone with biometrics <em>was</em> testimonial. The court found the act of opening a phone with biometrics—while physical—<em>is</em> testimonial because it “directly announces the owner&#39;s access to and control over the phone, as well as his mental knowledge of how to unlock the device.”<sup>6</sup></p>

<p>It&#39;s an interesting take on the testimonial vs. non-testimonial issue.</p>

<p>It illustrates the distinction between physical acts that communicate something and those that don&#39;t. Submitting to a fingerprint panel at the police station doesn&#39;t reveal anything incriminatory. It&#39;s only once those fingerprints are anaylzed that they may incriminate. Whereas, a fingerprint that unlocks a phone essentially authenticates you as its owner.</p>

<p>However, in 2024, the 9th Circuit Court of Appeals in <em>United States v. Payne</em><sup>7</sup> found the opposite. It ruled that a fingerprint unlock of a phone is akin to handing over the keys to a safe, rather than divulging its combination.<sup>8</sup></p>

<p>The court rejected the idea that biometrics are a substitute for PINs or passcodes and should therefore enjoy the same protections.<sup>9</sup> It also rejected the idea that a biometric unlock is testimonial because it confirms ownership and knowledge of the device&#39;s contents. The court said the access is not incriminating by itself, but only provides access to potential source of incriminating information.<sup>10</sup></p>

<h2 id="should-you-use-biometrics" id="should-you-use-biometrics">Should you use biometrics?</h2>

<p>Each person has to assess their own threat model. But given the variances in the law and the lack of direct precedent in many circuits, it would seem that the safest approach is to use a PIN or passcode to unlock your device.</p>

<p>Even if you find the <em>Brown</em> case pursuasive or think it would apply, there have already been court decisions that distinguish its finding.</p>

<p>Noteably, P. Diddy cited <em>Brown</em>, among other cases, in his criminal case in New York in order to prevent compelled production of a cell phone. The District Court ruled in favor of the government, in part, because there was no question as to whether the phone was his.<sup>11</sup></p>

<p>Essentially, <em>Brown</em> suggests that the testimonial aspect of unlocking the phone is that it communicates control and ownership. But if the government can show that you own and control the device in other ways, then compelling a biometric unlock is not really implicating your Fifth Amendment rights.<sup>12.</sup></p>

<h3 id="recommendations" id="recommendations">Recommendations</h3>

<p>The Decent Project recommends you avoid using biometrics on your devices. There is little debate over whether divulging a PIN constitutes testimonial evidence.<sup>13</sup></p>

<p>We recognizes, though, that typing in a six-digit PIN (yes, please make your PINs at least six digits) every time you want to unlock your phone can be annoying. Given this, you may consider PIN-locking important apps, such as your e-mail, messengers, and password managers.</p>

<p>We also recommend using unique PINs for each of these apps rather than one generic PIN.</p>

<p>Additionally, if you are traveling across an international border, such as returning to the U.S. from a vacation overseas, consider disabling your biometrics temporarily. This way, if you are stopped your device cannot be unlocked simply with a face scan or fingerprint.</p>

<p>~ Torman
<p><small>Verify this post: <a href="https://github.com/decentproject/Signatures/blob/main/should_I_use_biometrics.md" target="_blank" rel="nofollow noopener">Source</a> | <a href="https://github.com/decentproject/Signatures/blob/main/should_I_use_biometrics.md.asc" target="_blank" rel="nofollow noopener">Signature</a> | <a href="https://github.com/decentproject/Signatures/blob/main/torman-pgp-key.asc" target="_blank" rel="nofollow noopener">PGP Key</a></small></p></p>

<p><a href="https://decentproject.org/tag:privacy" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">privacy</span></a> <a href="https://decentproject.org/tag:security" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">security</span></a> <a href="https://decentproject.org/tag:opsec" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">opsec</span></a> <a href="https://decentproject.org/tag:FifthAmendment" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">FifthAmendment</span></a></p>

<hr/>

<h4 id="subscribe-comment" id="subscribe-comment">Subscribe &amp; Comment</h4>

<p>If you found this post informative, please subscribe by entering your email below. You&#39;ll receive the latest posts from the Decent Project to you inbox.
</p>

<p>Do you use biometrics on your phone or devices? Do you think there should be an exception for device biometrics in the testimonial/non-testimonial paradigm? <em>Let us know your thoughts in the comments below!</em>
<a href="https://remark.as/p/decentproject.org/should-you-use-biometrics-on-your-phone" rel="nofollow">Discuss...</a></p>

<hr/>

<h3 id="footnotes" id="footnotes">Footnotes</h3>

<p><sup>1.</sup> “The touchstone of whether an act of production is testimonial is whether the government compels the individual to use &#39;the contents of his own mind&#39; to explicitly or implicitly communicate some statement of fact.” <em>United States v. Doe (In re Grand Jury Subpoena Duces Tecum)</em>, 670 F.3d 1335, 1345 (11th Cir. 2012).</p>

<p><sup>2.</sup> “[F]orcing the custodian to testify orally as to the whereabouts of nonproduced records requires him to disclose the contents of his own mind. He might be compelled to convict himself out of his own mouth. That is contrary to the spirit and letter of the Fifth Amendment.” <em>Curcio v. United States</em>, 354 U.S. 118, 128 (1957).</p>

<p><sup>3.</sup> “[T]he Fifth Amendment privilege is not triggered where the Government merely compels some physical act, i.e. where the individual is not called upon to make use of the contents of his or her mind.” _In re Grand Jury Subpoena, 670 F.3d at 1345.</p>

<p><sup>4.</sup> “He may in some cases be forced to surrender a key to a strongbox containing incriminating documents, but I do not believe he can be compelled to reveal the combination to his wall safe — by word or deed.” <em>Doe v. United States</em>, 487 U.S. 201, 219, 108 S. Ct. 2341, 2352 (1988) (Justice Stevens dissent).</p>

<p><sup>5.</sup>  <em>United States v. Brown</em>, 125 F.4th 1186 (D.C. Cir. 2025).</p>

<p><sup>6.</sup> “Though placing a thumb on a phone may seem akin to submitting to fingerprinting or providing a handwriting exemplar, the act, as performed here, is much closer to responding to a lie detector test or complying with a command to say a password. When Schwartz was ordered to open the cellphone, his act of unlocking the phone represented the thoughts “I know how to open the phone,” “I have control over and access to this phone,” and “the print of this specific finger is the password to this phone.” If Schwartz had instead been compelled to disclose whether he could open the phone, and made to say yes or to verbally disclose the password, those answers unquestionably would be testimonial communications. The compelled opening of the cellphone that occurred here is no different.” <em>United States v. Brown</em>, 125 F.4th 1186, 1202-03 (D.C. Cir. 2025).</p>

<p><sup>7.</sup> <em>United States v. Payne</em>, 99 F.4th 495 (9th Cir. 2024).</p>

<p><sup>8.</sup> “While providing law enforcement officers with a combination to a safe or passcode to a phone would require an individual to divulge the “contents of his own mind,” turning over a key to a safe or a thumb to unlock a phone requires no such mental process.” <em>Payne</em>, 99 at 511.</p>

<p><sup>9.</sup> “[T]he Supreme Court has framed the question around whether a particular action requires a defendant to divulge the contents of his mind, not whether two actions yield the same result.” <em>Payne</em>, 99 at 511.</p>

<p><sup>10.</sup> “The officers were left to identify any incriminating evidence through their own investigation.” <em>Payne</em>, 99 at 511.</p>

<p><sup>11.</sup>  <em>United States v. Combs</em>, No. 24-CR-542 (AS), 2025 LX 289072 (S.D.N.Y. Apr. 18, 2025).</p>

<p><sup>12.</sup> But when “&#39;[t]he existence and location of the papers are a foregone conclusion and the [defendant] adds little or nothing to the sum total of the Government&#39;s information by conceding that he in fact has the papers,&#39; production does not run afoul of the Fifth Amendment.” <em>Combs</em>, LX 289072 at <em>2 (quoting <em>Fisher v. United States</em>, 425 U.S. 391, 410-11, 96 S. Ct. 1569, 48 L. Ed. 2d 39 (1976)); “Second, under the &#39;foregone  [</em>1346]  conclusion&#39; doctrine, an act of production is not testimonial—even if the act conveys a fact regarding the existence or location, possession, or authenticity of the subpoenaed materials—if the Government can show with &#39;reasonable particularity&#39; that, at the time it sought to compel the act of production, it already knew of the materials, thereby making any testimonial aspect a &#39;foregone conclusion.&#39;” <em>In re Grand Jury Subpoena</em>, 670 F.3d at 1345-46.</p>

<p><sup>13.</sup> “[P]roviding law enforcement officers with a combination to a safe or passcode to a phone would require an individual to divulge the “contents of his own mind.” <em>Payne</em>, 99 at 511; “Requiring Doe to use a decryption password is most certainly more akin to requiring the production of a combination because both demand the use of the contents of the mind ...  Hence, we conclude that what the Government seeks to compel in this case, the decryption and production of the contents of the hard drives, is testimonial in character.” <em>In re Grand Jury Subpoena</em>, 670 F.3d at 1346.</p>

<hr/>

<p><em>Disclaimer: I am not a lawyer, and I am not your lawyer. This post is meant to be informative and not to be taken as legal advice. If you are facing a legal issue you should always consult with a licensed attorney who can render legal advice that is specific to your needs.</em></p>
]]></content:encoded>
      <guid>https://decentproject.org/should-you-use-biometrics-on-your-phone</guid>
      <pubDate>Thu, 15 Jan 2026 19:40:25 +0000</pubDate>
    </item>
  </channel>
</rss>