<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>security &amp;mdash; Decent Project</title>
    <link>https://decentproject.org/tag:security</link>
    <description>*Privacy. Autonomy. Civil Liberties.*</description>
    <pubDate>Sun, 19 Apr 2026 00:38:20 +0000</pubDate>
    <image>
      <url>https://i.snap.as/eEu6bhjy.ico</url>
      <title>security &amp;mdash; Decent Project</title>
      <link>https://decentproject.org/tag:security</link>
    </image>
    <item>
      <title>An FBI raid on a reporter’s home shows the problem with biometrics</title>
      <link>https://decentproject.org/an-fbi-raid-on-a-reporters-home-shows-the-problem-with-biometrics?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[  Quick Look  &#xA;  • The FBI raid on Washington Post reporter’s home shows uncertainty about biometrics under the Fifth Amendment.  &#xA;  • Hannah Natanson was compelled to unlock a MacBook with her fingerprint.  &#xA;  • Until the law is clarified, use PINs/passwords instead of biometrics.&#xA;&#xA;Recently, the a href=&#34;https://www.theguardian.com/us-news/2026/jan/14/fbi-raid-washington-post-hannah-natanson&#34; target=&#34;blank&#34;FBI served a search warrant on the home of Washington Post reporter Hannah Natanson/a.&#xA;&#xA;It&#39;s rightfully being a href=&#34;https://firstamendment.mtsu.edu/post/press-freedom-advocates-worry-that-raid-on-washington-post-journalists-home-will-chill-reporting/&#34; target=&#34;blank&#34;decried as yet another disturbing attack/a by the Trump Administration on America&#39;s tradition of free and independent press--a tradition that was dealt yet another blow this week when a href=&#34;https://www.npr.org/2026/01/30/nx-s1-5693756/don-lemon-arrest-cnn-minneapolis&#34; target=&#34;blank&#34;the Administration arrested four Black journalists in Minnesota/a, one of whom was former CNN anchor Don Lemon.&#xA;&#xA;While much ink has been spilled about the potential chilling effect the raid on Natanson&#39;s home may have, some key details of the search are now coming to light.&#xA;&#xA;Authorities seized several devices from Natanson&#39;s home&#xA;&#xA;Authorities seized several devices from Natanson&#39;s home during the January 14th raid&#xA;  figcaption style=&#34;font-style:italic; color:#555;&#34;Authorities seized several devices from Natanson&#39;s home during the January 14th raid/figcaption&#xA;In court filings, a href=&#34;https://storage.courtlistener.com/recap/gov.uscourts.vaed.588772/gov.uscourts.vaed.588772.35.01.pdf&#34; target=&#34;blank&#34;the federal government has now detailed/a the devices seized from Natanson&#39;s home, which included two laptops, a cell phone, an audio recorder, a hard drive, and a smartwatch.&#xA;!--more--&#xA;While the seizures raise a number of concerns, perhaps overlooked is that Natanson was compelled to unlock one of her MacBook computers using her fingerprint.&#xA;&#xA;Authorities compelled Natanson to unlock a Macbook computer with her fingerprint.&#xA;figcaption style=&#34;font-style:italic; color:#555;&#34;Authorities compelled Natanson to unlock a Macbook computer with her fingerprint/figcaption&#xA;It&#39;s a remarkable exchange--and one that demonstrates the risks associated with using biometrics instead of PIN numbers or passwords.&#xA;&#xA;Authorities compelled Natanson to unlock her device&#xA;&#xA;The warrant used by authorities to search Natanson&#39;s home explicitly stated that agents could compel her to unlock her devices using biometrics, such as a fingerprint or face scan, but they could not compel her to reveal any passwords.&#xA;&#xA;Screenshot of the relevant section of the FBI warrant used to raid the home of Washington Post journalist Hannah Natanson (original image from The Intercept)&#xA;  figcaption style=&#34;font-style:italic; color:#555;&#34;Section of the warrant used to raid Natanson&#39;s home (via The Intercept)/figcaption&#xA;During the search, the government states that Natanson told agents she does not use biometrics and has only one computer and one phone.&#xA;&#xA;Yet, as the search continued, authorities eventually discovered a second computer inside a red backpack in her kitchen.&#xA;&#xA;When agents opened the computer, the lockscreen prompted them to enter a password or use TouchID. The agents then insisted--perhaps against the orders of the search warrant shown above--that she attempt to unlock the device.&#xA;&#xA;The government states that Natanson put her index finger on the scanner, which then unlocked it.&#xA;&#xA;Can you be compelled to unlock your device with biometrics?&#xA;&#xA;This is the exact issue the Decent Project wrote about a little more than two weeks ago.&#xA;&#xA;In our article entitled a href=&#34;https://decentproject.org/should-you-use-biometrics-on-your-phone&#34; target=&#34;blank&#34;iShould you use biometrics on your phone?/i/a, we explored the murky legal landscape over whether law enforcement can compel someone to unlock their device using their fingerprint or face.&#xA;&#xA;Currently, courts are split on the issue. It comes down to whether a court sees the use of biometrics as &#34;testimonial&#34; evidence.&#xA;&#xA;Testimonial evidence is generally anything that requires you to divulge the contents of your mind, ii.e./i things you know, have seen, or have heard. This kind of evidence has a long tradition of being protected by the a href=&#34;https://www.law.cornell.edu/constitution/fifthamendment&#34; target=&#34;blank&#34;Fifth Amendment&#39;s privilege against self-incrimination/a, meaning you cannot be compelled to reveal it.&#xA;&#xA;However, some courts do not think that biometrics are &#34;testimonial&#34; in nature. Instead, they argue a biometric unlock doesn&#39;t reveal anything about the content of an individual&#39;s thinking or knowledge. &#xA;&#xA;Map of the various federal judicial circuits&#xA;&#xA;For example, in 2024, the 9th Circuit (in purple above) said in a href=&#34;https://caselaw.findlaw.com/court/us-9th-circuit/116062162.html&#34; target=&#34;blank&#34;iUnited States v. Payne/i/a that biometrics are not afforded the same protections as passwords or PIN numbers:&#xA;&#xA;  &#34;While providing law enforcement officers with a combination to a safe or passcode to a phone would require an individual to divulge the &#39;contents of his own mind,&#39; turning over a key to a safe or a thumb to unlock a phone requires no such mental process.&#34;&#xA;&#xA;We at the Decent Project bistrongly/i/b disagree with this view, and we think Natanson&#39;s case is a great example as to why.&#xA;&#xA;What Natanson&#39;s fingerprint actually revealed&#xA;&#xA;When Natanson unlocked the MacBook in her kitchen, it revealed several things about her and her relationship to that device.&#xA;&#xA;First, it demonstrated that Natanson knew how to biometrically unlock the device. &#xA;&#xA;This, in our opinion, stands in direct contrast to the 9th Circuit&#39;s view that unlocking a device with your finger &#34;requires no ... mental process.&#34;&#xA;&#xA;The government&#39;s filing isn&#39;t particularly clear on the exact exchange, but when agents &#34;told her to try&#34; to unlock the device and she did so with her index finger, it raises the question: how did she know which finger to use?&#xA;&#xA;Second, her fingerprint demonstrated her control over the computer. &#xA;&#xA;Unlocking a device with your fingerprint is a pretty clear indication that you are the owner of that device, or at least in control of it. If this device is not a shared computer, then it effectively demonstrates that Natanson is responsible for the content found on the device.&#xA;&#xA;It&#39;s important to note that Natanson is not a defendant in this case, nor is she a target of the investigation--but in any other context, this kind of evidence could be damning.&#xA;&#xA;Instead, imagine if authorities had found the computer in Natanson&#39;s home and it did not have TouchID. Since Natanson cannot be compelled to reveal a PIN or password, what would authorities have to demonstrate that the device is hers?&#xA;&#xA;They could say the device was in her kitchen and that it was found in her backpack, but that&#39;s about it. &#xA;&#xA;Takeaway&#xA;&#xA;Not all courts agree with the 9th Circuit when it comes to biometrics. As discussed in our a href=&#34;https://decentproject.org/should-you-use-biometrics-on-your-phone&#34; target=&#34;blank&#34;earlier article/a, the D.C. Circuit Court of Appeals ruled last year that biometrics can be afforded the same protections as other testimonial evidence.&#xA;&#xA;While that&#39;s good news, this issue is new and the law is still developing. As such, unless and until there is legal clarity, the Decent Project continues to recommend that individuals do not use biometrics on their devices.&#xA;&#xA;~ Torman&#xA;psmallVerify this post: a href=&#34;https://github.com/decentproject/Signatures/blob/main/anfbiraidonareportershomeshowstheproblemwithbiometrics.md&#34; target=&#34;blank&#34;Source/a | a href=&#34;https://github.com/decentproject/Signatures/blob/main/anfbiraidonareportershomeshowstheproblemwithbiometrics.md.asc&#34; target=&#34;blank&#34;Signature/a | a href=&#34;https://github.com/decentproject/Signatures/blob/main/torman-pgp-key.asc&#34; target=&#34;_blank&#34;PGP Key/a/small/p&#xA;&#xA;#privacy #security #OPSEC #FifthAmendment&#xA;&#xA;---&#xA;&#xA;If you enjoyed reading this or found it informative, please consider subscribing in order to receive posts directly to your inbox: &#xA;!--emailsub--&#xA;&#xA;Also feel free to leave a comment here:  a href=&#34;https://remark.as/p/decentproject.org/an-fbi-raid-on-a-reporters-home-shows-the-problem-with-biometrics&#34;Discuss.../a]]&gt;</description>
      <content:encoded><![CDATA[<blockquote><p><strong>Quick Look</strong><br/>
• The FBI raid on Washington Post reporter’s home shows uncertainty about biometrics under the Fifth Amendment.<br/>
• Hannah Natanson was compelled to unlock a MacBook with her fingerprint.<br/>
• Until the law is clarified, use PINs/passwords instead of biometrics.</p></blockquote>

<p>Recently, the <a href="https://www.theguardian.com/us-news/2026/jan/14/fbi-raid-washington-post-hannah-natanson" target="_blank" rel="nofollow noopener">FBI served a search warrant on the home of Washington Post reporter Hannah Natanson</a>.</p>

<p>It&#39;s rightfully being <a href="https://firstamendment.mtsu.edu/post/press-freedom-advocates-worry-that-raid-on-washington-post-journalists-home-will-chill-reporting/" target="_blank" rel="nofollow noopener">decried as yet another disturbing attack</a> by the Trump Administration on America&#39;s tradition of free and independent press—a tradition that was dealt yet another blow this week when <a href="https://www.npr.org/2026/01/30/nx-s1-5693756/don-lemon-arrest-cnn-minneapolis" target="_blank" rel="nofollow noopener">the Administration arrested four Black journalists in Minnesota</a>, one of whom was former CNN anchor Don Lemon.</p>

<p>While much ink has been spilled about the potential chilling effect the raid on Natanson&#39;s home may have, some key details of the search are now coming to light.</p>

<h3 id="authorities-seized-several-devices-from-natanson-s-home" id="authorities-seized-several-devices-from-natanson-s-home">Authorities seized several devices from Natanson&#39;s home</h3>

<p><img src="https://i.snap.as/2hatO2Ry.png" alt="Authorities seized several devices from Natanson&#39;s home during the January 14th raid"/>
  <figcaption style="font-style:italic; color:#555;">Authorities seized several devices from Natanson&#39;s home during the January 14th raid</figcaption>
In court filings, <a href="https://storage.courtlistener.com/recap/gov.uscourts.vaed.588772/gov.uscourts.vaed.588772.35.0_1.pdf" target="_blank" rel="nofollow noopener">the federal government has now detailed</a> the devices seized from Natanson&#39;s home, which included two laptops, a cell phone, an audio recorder, a hard drive, and a smartwatch.

While the seizures raise a number of concerns, perhaps overlooked is that Natanson was compelled to unlock one of her MacBook computers using her fingerprint.</p>

<p><img src="https://i.snap.as/6GQEBcWq.png" alt="Authorities compelled Natanson to unlock a Macbook computer with her fingerprint."/>
<figcaption style="font-style:italic; color:#555;">Authorities compelled Natanson to unlock a Macbook computer with her fingerprint</figcaption>
It&#39;s a remarkable exchange—and one that demonstrates the risks associated with using biometrics instead of PIN numbers or passwords.</p>

<h3 id="authorities-compelled-natanson-to-unlock-her-device" id="authorities-compelled-natanson-to-unlock-her-device">Authorities compelled Natanson to unlock her device</h3>

<p>The warrant used by authorities to search Natanson&#39;s home explicitly stated that agents could compel her to unlock her devices using biometrics, such as a fingerprint or face scan, but they could not compel her to reveal any passwords.</p>

<p><img src="https://i.snap.as/pYmslu97.png" alt="Screenshot of the relevant section of the FBI warrant used to raid the home of Washington Post journalist Hannah Natanson (original image from The Intercept)"/>
  <figcaption style="font-style:italic; color:#555;">Section of the warrant used to raid Natanson&#39;s home (via The Intercept)</figcaption>
During the search, the government states that Natanson told agents she does not use biometrics and has only one computer and one phone.</p>

<p>Yet, as the search continued, authorities eventually discovered a second computer inside a red backpack in her kitchen.</p>

<p>When agents opened the computer, the lockscreen prompted them to enter a password or use TouchID. The agents then insisted—perhaps against the orders of the search warrant shown above—that she attempt to unlock the device.</p>

<p>The government states that Natanson put her index finger on the scanner, which then unlocked it.</p>

<h3 id="can-you-be-compelled-to-unlock-your-device-with-biometrics" id="can-you-be-compelled-to-unlock-your-device-with-biometrics">Can you be compelled to unlock your device with biometrics?</h3>

<p>This is the exact issue the Decent Project wrote about a little more than two weeks ago.</p>

<p>In our article entitled <a href="https://decentproject.org/should-you-use-biometrics-on-your-phone" target="_blank" rel="nofollow noopener"><i>Should you use biometrics on your phone?</i></a>, we explored the murky legal landscape over whether law enforcement can compel someone to unlock their device using their fingerprint or face.</p>

<p>Currently, courts are split on the issue. It comes down to whether a court sees the use of biometrics as “testimonial” evidence.</p>

<p>Testimonial evidence is generally anything that requires you to divulge the contents of your mind, <i>i.e.</i> things you know, have seen, or have heard. This kind of evidence has a long tradition of being protected by the <a href="https://www.law.cornell.edu/constitution/fifth_amendment" target="_blank" rel="nofollow noopener">Fifth Amendment&#39;s privilege against self-incrimination</a>, meaning you cannot be compelled to reveal it.</p>

<p>However, some courts do not think that biometrics are “testimonial” in nature. Instead, they argue a biometric unlock doesn&#39;t reveal anything about the content of an individual&#39;s thinking or knowledge.</p>

<p><img src="https://i.snap.as/YIGafnao.jpg" alt="Map of the various federal judicial circuits"/></p>

<p>For example, in 2024, the 9th Circuit (in purple above) said in <a href="https://caselaw.findlaw.com/court/us-9th-circuit/116062162.html" target="_blank" rel="nofollow noopener"><i>United States v. Payne</i></a> that biometrics are <em>not</em> afforded the same protections as passwords or PIN numbers:</p>

<blockquote><p>“While providing law enforcement officers with a combination to a safe or passcode to a phone would require an individual to divulge the &#39;contents of his own mind,&#39; turning over a key to a safe or a thumb to unlock a phone requires no such mental process.”</p></blockquote>

<p>We at the Decent Project <b><i>strongly</i></b> disagree with this view, and we think Natanson&#39;s case is a great example as to why.</p>

<h3 id="what-natanson-s-fingerprint-actually-revealed" id="what-natanson-s-fingerprint-actually-revealed">What Natanson&#39;s fingerprint actually revealed</h3>

<p>When Natanson unlocked the MacBook in her kitchen, it revealed several things about her and her relationship to that device.</p>

<p>First, it demonstrated that Natanson knew <em>how</em> to biometrically unlock the device.</p>

<p>This, in our opinion, stands in direct contrast to the 9th Circuit&#39;s view that unlocking a device with your finger “requires no ... mental process.”</p>

<p>The government&#39;s filing isn&#39;t particularly clear on the exact exchange, but when agents “told her to try” to unlock the device and she did so with her index finger, it raises the question: <em>how did she know which finger to use?</em></p>

<p>Second, her fingerprint demonstrated her control over the computer.</p>

<p>Unlocking a device with your fingerprint is a pretty clear indication that you are the owner of that device, or at least in control of it. If this device is not a shared computer, then it effectively demonstrates that Natanson is responsible for the content found on the device.</p>

<p>It&#39;s important to note that Natanson is not a defendant in this case, nor is she a target of the investigation—but in any other context, this kind of evidence could be damning.</p>

<p>Instead, imagine if authorities had found the computer in Natanson&#39;s home and it did not have TouchID. Since Natanson cannot be compelled to reveal a PIN or password, what would authorities have to demonstrate that the device is hers?</p>

<p>They could say the device was in her kitchen and that it was found in her backpack, but that&#39;s about it.</p>

<h3 id="takeaway" id="takeaway">Takeaway</h3>

<p>Not all courts agree with the 9th Circuit when it comes to biometrics. As discussed in our <a href="https://decentproject.org/should-you-use-biometrics-on-your-phone" target="_blank" rel="nofollow noopener">earlier article</a>, the D.C. Circuit Court of Appeals ruled last year that biometrics can be afforded the same protections as other testimonial evidence.</p>

<p>While that&#39;s good news, this issue is new and the law is still developing. As such, unless and until there is legal clarity, the Decent Project continues to recommend that individuals do <em>not</em> use biometrics on their devices.</p>

<p>~ Torman
<p><small>Verify this post: <a href="https://github.com/decentproject/Signatures/blob/main/an_fbi_raid_on_a_reporters_home_shows_the_problem_with_biometrics.md" target="_blank" rel="nofollow noopener">Source</a> | <a href="https://github.com/decentproject/Signatures/blob/main/an_fbi_raid_on_a_reporters_home_shows_the_problem_with_biometrics.md.asc" target="_blank" rel="nofollow noopener">Signature</a> | <a href="https://github.com/decentproject/Signatures/blob/main/torman-pgp-key.asc" target="_blank" rel="nofollow noopener">PGP Key</a></small></p></p>

<p><a href="https://decentproject.org/tag:privacy" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">privacy</span></a> <a href="https://decentproject.org/tag:security" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">security</span></a> <a href="https://decentproject.org/tag:OPSEC" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">OPSEC</span></a> <a href="https://decentproject.org/tag:FifthAmendment" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">FifthAmendment</span></a></p>

<hr/>

<p>If you enjoyed reading this or found it informative, please consider subscribing in order to receive posts directly to your inbox:
</p>

<p>Also feel free to leave a comment here:  <a href="https://remark.as/p/decentproject.org/an-fbi-raid-on-a-reporters-home-shows-the-problem-with-biometrics" rel="nofollow">Discuss...</a></p>
]]></content:encoded>
      <guid>https://decentproject.org/an-fbi-raid-on-a-reporters-home-shows-the-problem-with-biometrics</guid>
      <pubDate>Sat, 31 Jan 2026 22:02:55 +0000</pubDate>
    </item>
    <item>
      <title>When encryption is not enough</title>
      <link>https://decentproject.org/when-encryption-is-not-enough?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[&#xA;&#xA;There is a saying in cryptocurrency: &#34;not your keys; not your coins.&#34;&#xA;&#xA;In essence, if you don&#39;t control the keys to the wallet containing the cryptocurrency--usually a series of random words generated at the time that the wallet is created--then you don&#39;t really own the money inside it.&#xA;&#xA;It&#39;s the difference between having your money in a bank that actually possesses your cash and lets you access it, or in an impenetrable safe where only you know the combination. If you possess the cash and the safe, you truly own the money.&#xA;&#xA;The same can be said for encryption.&#xA;!--more--&#xA;Whether you realize it or not, it&#39;s likely that many of your devices enable encryption by default. For example, iPhones are encrypted by default and so are most modern Windows machines.&#xA;&#xA;Sounds good, right?&#xA;&#xA;But it presents the same problem as with crypto: who holds the keys? &#xA;&#xA;When your Windows computer is encrypted, it&#39;s using Microsoft&#39;s BitLocker. The data can be accessed only once you type in your password or PIN, or authenticate with biometrics. However, Microsoft also ensures that a recovery key is created and backed up to your Microsoft account.&#xA;&#xA;It&#39;s a convenient solution and provides an avenue of recovery should you ever forget your password or PIN. But it also means that Microsoft has access to that recovery key at any time. &#xA;&#xA;This was evidenced recently when Microsoft a href=&#34;https://techcrunch.com/2026/01/23/microsoft-gave-fbi-a-set-of-bitlocker-encryption-keys-to-unlock-suspects-laptops-reports/&#34; target=&#34;blank&#34;gave the FBI the recovery keys to unlock hard drives belonging to suspects in a fraud case/a.&#xA;&#xA;Notably, Microsoft complies with these kinds of requests from law enforcement multiple times each year:&#xA;&#xA;  Microsoft told Forbes that the company sometimes provides BitLocker recovery keys to authorities, having received an average of 20 such requests per year.&#xA;&#xA;The story isn&#39;t much different at Apple, though there are some notable improvements. The company&#39;s iCloud services are encrypted by default, but similar to Microsoft, the decryption keys are sent to Apple&#39;s servers, giving the company access if needed.&#xA;&#xA;The good news is that Apple has set aside 14 categories that it says it cannot access no matter what, as the keys are only stored on your devices. These categories include your messages, health, passwords, and maps.&#xA;&#xA;Owning your data is a form of digital autonomy&#xA;&#xA;Some might say Microsoft sharing a user&#39;s recovery key with law enforcement is not a problem. Generally speaking, the Decent Project agrees. &#xA;&#xA;The Decent Project believes that law enforcement has a job to do and there are laws within which they must operate. When law enforcement has identified a suspect and obtains a lawful warrant to access account information from a company, we do not argue that the company is under an obligation to comply.&#xA;&#xA;Instead, the Decent Project advocates for individuals to minimize their own risks by reducing their attack surface. If Microsoft or Apple do not have access to decryption keys, then there&#39;s virtually nothing they can turn over.&#xA;&#xA;To be clear, government officials seeking information via a lawful warrant is the least of our concerns. Instead, we recognize that what is available to the &#34;good guys&#34; is also available to the &#34;bad guys.&#34;&#xA;&#xA;Any decryption key stored by Microsoft or Apple runs the risk of being exploited by rogue employees, hackers, or government officials who are not operating with the bounds of the law.&#xA;&#xA;Are you comfortable them seeing all your photos? Your digital journals? Your notes? Your health records?&#xA;&#xA;The best defense is an offense in which individuals retain control of their data--and most importantly--the keys to it.&#xA;&#xA;Recommendations&#xA;&#xA;bTurn on encryption wherever possible/b&#xA;&#xA;Whether it&#39;s your computer or phone, if there are options to encrypt your device your should always do so.&#xA;&#xA;Encrypting your device ensures better security and privacy, but does comes with additionally responsibility.&#xA;&#xA;When encrypting your devices, you should look for options that allow you to control the recovery/decryption keys. With BitLocker, for example, this means declining any options to store the recovery key in your Microsoft account.&#xA;&#xA;Keys should be securely stored and this can be done by using a reputable password manager--another basic privacy and security tool discussed below.&#xA;&#xA;bTurn on Apple&#39;s Advanced Data Protection/b&#xA;&#xA;For Apple users, it is a simple procedure that can be done by following this a href=&#34;https://support.apple.com/en-us/108756&#34; target=&#34;blank&#34;guide/a.&#xA;&#xA;There are two ways you can ensure recovery, one is by designating a trusted contact who would be able to use their Apple device to unlock your account, or by storing the recovery key yourself.&#xA;&#xA;You&#39;ll have to decide which method is best for you, but again, storing your own recovery key is the safest method--just be sure to store it in a manner that ensures it will not get lost, stolen, or compromised.&#xA;&#xA;bUse a password manager/b&#xA;&#xA;It is 2026. If you are not yet, it is time to start using a password manager.&#xA;&#xA;There are a number of free or nearly free options out there that will greatly enhance your privacy and security.&#xA;&#xA;Password managers almost always include password generators to ensure unique and strong passwords for each account. Your credentials can be autofilled so you virtually never have to type in your passwords or copy/paste.&#xA;&#xA;A reputable password manager is an essential tool in an idividual&#39;s privacy and security toolkit. Please check out our a href=&#34;https://decentproject.org/resources&#34;Resources/a page where you can find recommendations. (As of the time of this writing, we are still working to put this together but it should be there for those reading this the future).&#xA;&#xA;Many providers also allow you to securely store more than just passwords. You can store passphrases, decryption keys, or files. This makes it extremely easy to take advantage of encryption while not relying on providers like Microsoft and Apple to store your decryption keys.&#xA;&#xA;~ Torman&#xA;psmallVerify this post: a href=&#34;https://github.com/decentproject/Signatures/blob/main/whenencryptionisnotenough.md&#34; target=&#34;blank&#34;Source/a | a href=&#34;https://github.com/decentproject/Signatures/blob/main/whenencryptionisnotenough.md.asc&#34; target=&#34;blank&#34;Signature/a | a href=&#34;https://github.com/decentproject/Signatures/blob/main/torman-pgp-key.asc&#34; target=&#34;blank&#34;PGP Key/a/small/p&#xA;&#xA;#privacy #security #bigtech #encryption&#xA;&#xA;---&#xA;&#xA;If you enjoyed reading this or found it informative, please consider subscribing in order to recieve posts directly to your inbox:&#xA;!--emailsub--&#xA;&#xA;Also feel free to leave a comment here:_  a href=&#34;https://remark.as/p/decentproject.org/when-encryption-is-not-enough&#34;Discuss.../a&#xA;&#xA;]]&gt;</description>
      <content:encoded><![CDATA[<p><img src="https://i.snap.as/qvXYktxK.jpeg" alt=""/></p>

<p>There is a saying in cryptocurrency: “not your keys; not your coins.”</p>

<p>In essence, if you don&#39;t control the keys to the wallet containing the cryptocurrency—usually a series of random words generated at the time that the wallet is created—then you don&#39;t <em>really</em> own the money inside it.</p>

<p>It&#39;s the difference between having your money in a bank that actually possesses your cash and lets you access it, or in an impenetrable safe where only you know the combination. If you possess the cash and the safe, you truly <em>own</em> the money.</p>

<p>The same can be said for encryption.

Whether you realize it or not, it&#39;s likely that many of your devices enable encryption by default. For example, iPhones are encrypted by default and so are most modern Windows machines.</p>

<p>Sounds good, right?</p>

<p>But it presents the same problem as with crypto: who holds the keys?</p>

<p>When your Windows computer is encrypted, it&#39;s using Microsoft&#39;s BitLocker. The data can be accessed only once you type in your password or PIN, or authenticate with biometrics. However, Microsoft also ensures that a recovery key is created and backed up to your Microsoft account.</p>

<p>It&#39;s a convenient solution and provides an avenue of recovery should you ever forget your password or PIN. But it also means that Microsoft has access to that recovery key at any time.</p>

<p>This was evidenced recently when Microsoft <a href="https://techcrunch.com/2026/01/23/microsoft-gave-fbi-a-set-of-bitlocker-encryption-keys-to-unlock-suspects-laptops-reports/" target="blank" rel="nofollow">gave the FBI the recovery keys to unlock hard drives belonging to suspects in a fraud case</a>.</p>

<p>Notably, Microsoft complies with these kinds of requests from law enforcement multiple times each year:</p>

<blockquote><p>Microsoft told Forbes that the company sometimes provides BitLocker recovery keys to authorities, having received an average of 20 such requests per year.</p></blockquote>

<p>The story isn&#39;t much different at Apple, though there are some notable improvements. The company&#39;s iCloud services are encrypted by default, but similar to Microsoft, the decryption keys are sent to Apple&#39;s servers, giving the company access if needed.</p>

<p><img src="https://i.snap.as/v7vBpIei.png" alt=""/></p>

<p>The good news is that Apple has set aside 14 categories that it says it cannot access no matter what, as the keys are only stored on your devices. These categories include your messages, health, passwords, and maps.</p>

<h3 id="owning-your-data-is-a-form-of-digital-autonomy" id="owning-your-data-is-a-form-of-digital-autonomy">Owning your data is a form of digital autonomy</h3>

<p>Some might say Microsoft sharing a user&#39;s recovery key with law enforcement is not a problem. Generally speaking, the Decent Project agrees.</p>

<p>The Decent Project believes that law enforcement has a job to do and there are laws within which they must operate. When law enforcement has identified a suspect and obtains a lawful warrant to access account information from a company, we do not argue that the company is under an obligation to comply.</p>

<p>Instead, the Decent Project advocates for individuals to minimize their own risks by reducing their attack surface. If Microsoft or Apple do not have access to decryption keys, then there&#39;s virtually nothing they can turn over.</p>

<p>To be clear, government officials seeking information via a lawful warrant is the least of our concerns. Instead, we recognize that what is available to the “good guys” is also available to the “bad guys.”</p>

<p>Any decryption key stored by Microsoft or Apple runs the risk of being exploited by rogue employees, hackers, or government officials who are <em>not</em> operating with the bounds of the law.</p>

<p>Are you comfortable them seeing all your photos? Your digital journals? Your notes? Your health records?</p>

<p>The best defense is an offense in which individuals retain control of their data—and most importantly—the keys to it.</p>

<h3 id="recommendations" id="recommendations">Recommendations</h3>

<p><b>Turn on encryption wherever possible</b></p>

<p>Whether it&#39;s your computer or phone, if there are options to encrypt your device your should always do so.</p>

<p>Encrypting your device ensures better security and privacy, but does comes with additionally responsibility.</p>

<p>When encrypting your devices, you should look for options that allow you to control the recovery/decryption keys. With BitLocker, for example, this means declining any options to store the recovery key in your Microsoft account.</p>

<p>Keys should be securely stored and this can be done by using a reputable password manager—another basic privacy and security tool discussed below.</p>

<p><b>Turn on Apple&#39;s Advanced Data Protection</b></p>

<p>For Apple users, it is a simple procedure that can be done by following this <a href="https://support.apple.com/en-us/108756" target="blank" rel="nofollow">guide</a>.</p>

<p>There are two ways you can ensure recovery, one is by designating a trusted contact who would be able to use their Apple device to unlock your account, or by storing the recovery key yourself.</p>

<p>You&#39;ll have to decide which method is best for you, but again, storing your own recovery key is the safest method—just be sure to store it in a manner that ensures it will not get lost, stolen, or compromised.</p>

<p><b>Use a password manager</b></p>

<p>It is 2026. If you are not yet, it is time to start using a password manager.</p>

<p>There are a number of free or nearly free options out there that will greatly enhance your privacy and security.</p>

<p>Password managers almost always include password generators to ensure unique and strong passwords for each account. Your credentials can be autofilled so you virtually never have to type in your passwords or copy/paste.</p>

<p>A reputable password manager is an essential tool in an idividual&#39;s privacy and security toolkit. Please check out our <a href="https://decentproject.org/resources" rel="nofollow">Resources</a> page where you can find recommendations. (As of the time of this writing, we are still working to put this together but it should be there for those reading this the future).</p>

<p>Many providers also allow you to securely store more than just passwords. You can store passphrases, decryption keys, or files. This makes it extremely easy to take advantage of encryption while not relying on providers like Microsoft and Apple to store your decryption keys.</p>

<p>~ Torman
<p><small>Verify this post: <a href="https://github.com/decentproject/Signatures/blob/main/when_encryption_is_not_enough.md" target="_blank" rel="nofollow noopener">Source</a> | <a href="https://github.com/decentproject/Signatures/blob/main/when_encryption_is_not_enough.md.asc" target="_blank" rel="nofollow noopener">Signature</a> | <a href="https://github.com/decentproject/Signatures/blob/main/torman-pgp-key.asc" target="_blank" rel="nofollow noopener">PGP Key</a></small></p></p>

<p><a href="https://decentproject.org/tag:privacy" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">privacy</span></a> <a href="https://decentproject.org/tag:security" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">security</span></a> <a href="https://decentproject.org/tag:bigtech" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">bigtech</span></a> <a href="https://decentproject.org/tag:encryption" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">encryption</span></a></p>

<hr/>

<p><em>If you enjoyed reading this or found it informative, please consider subscribing in order to recieve posts directly to your inbox:</em>
</p>

<p><em>Also feel free to leave a comment here:</em>  <a href="https://remark.as/p/decentproject.org/when-encryption-is-not-enough" rel="nofollow">Discuss...</a></p>
]]></content:encoded>
      <guid>https://decentproject.org/when-encryption-is-not-enough</guid>
      <pubDate>Sat, 24 Jan 2026 20:14:11 +0000</pubDate>
    </item>
    <item>
      <title>Should you use biometrics on your phone?</title>
      <link>https://decentproject.org/should-you-use-biometrics-on-your-phone?pk_campaign=rss-feed</link>
      <description>&lt;![CDATA[&#xA;&#xA;There are a lot of positives to using biometrics on your devices. It&#39;s hard to deny their convenience and in some ways, avoiding passwords can be a good thing since they can be forgotten or stolen.&#xA;&#xA;But the law doesn&#39;t necessarily treat your fingerprint the same as a PIN code or password when it comes to unlocking your device. This means you could be compelled to unlock your phone or computer depending on which unlock method you use.&#xA;!--more--&#xA;Testimonial vs. non-testimonial evidence&#xA;&#xA;Whether the government can compel you to unlock your device hinges on whether a court considers your biometric data to be &#34;testimonial&#34; or not.&#xA;&#xA;Testimonial evidence is anything that reveals the contents of your mind, i.e., things you&#39;ve seen, heard, or know.sup1/sup&#xA;&#xA;Importantly, testimonial evidence falls under the Fifth Amendment&#39;s protections against self-incrimination. In other words, you cannot be compelled to provide testimonial evidence that may incriminate you.&#xA;&#xA;However, courts distinguish testimonial evidence from non-testimonial evidence, which doesn&#39;t call on a person to reveal the &#34;contents of [their] own mind.&#34;sup2/sup For example, compelled physical actions are not usually considered testimonial.sup3./sup This is why you can be compelled to provide fingerprints during booking, or a bloodtest as part of an investigation.&#xA;&#xA;Courts have illustrated the distinction between testimonial and non-testimonial by comparing an individual who is compelled to produce keys to a lockbox (non-testimonial) against an individual who is compelled to produce a combination to a safe (testimonial).sup4/sup One is simply handing over a key while the other requires you to divulge something you know.&#xA;&#xA;This disctinction is important because when it comes to your devices courts typically agree that PINs and passcodes are testimonial, while some courts have found that biometrics are non-testimonial.&#xA;&#xA;That might make the difference as to whether you can be compelled to unlock your device.&#xA;&#xA;Circuit Split&#xA;&#xA;Currently, there are different schools of thought on this issue.&#xA;&#xA;Just last year, in United States v. Brownsup5/sup the D.C. Circuit Court of Appeals found that compelling an individual to unlock their phone with biometrics was testimonial. The court found the act of opening a phone with biometrics--while physical--is testimonial because it &#34;directly announces the owner&#39;s access to and control over the phone, as well as his mental knowledge of how to unlock the device.&#34;sup6/sup&#xA;&#xA;It&#39;s an interesting take on the testimonial vs. non-testimonial issue. &#xA;&#xA;It illustrates the distinction between physical acts that communicate something and those that don&#39;t. Submitting to a fingerprint panel at the police station doesn&#39;t reveal anything incriminatory. It&#39;s only once those fingerprints are anaylzed that they may incriminate. Whereas, a fingerprint that unlocks a phone essentially authenticates you as its owner. &#xA;&#xA;However, in 2024, the 9th Circuit Court of Appeals in United States v. Paynesup7/sup found the opposite. It ruled that a fingerprint unlock of a phone is akin to handing over the keys to a safe, rather than divulging its combination.sup8/sup&#xA;&#xA;The court rejected the idea that biometrics are a substitute for PINs or passcodes and should therefore enjoy the same protections.sup9/sup It also rejected the idea that a biometric unlock is testimonial because it confirms ownership and knowledge of the device&#39;s contents. The court said the access is not incriminating by itself, but only provides access to potential source of incriminating information.sup10/sup&#xA;&#xA;Should you use biometrics?&#xA;&#xA;Each person has to assess their own threat model. But given the variances in the law and the lack of direct precedent in many circuits, it would seem that the safest approach is to use a PIN or passcode to unlock your device.&#xA;&#xA;Even if you find the Brown case pursuasive or think it would apply, there have already been court decisions that distinguish its finding. &#xA;&#xA;Noteably, P. Diddy cited Brown, among other cases, in his criminal case in New York in order to prevent compelled production of a cell phone. The District Court ruled in favor of the government, in part, because there was no question as to whether the phone was his.sup11/sup&#xA;&#xA;Essentially, Brown suggests that the testimonial aspect of unlocking the phone is that it communicates control and ownership. But if the government can show that you own and control the device in other ways, then compelling a biometric unlock is not really implicating your Fifth Amendment rights.sup12./sup&#xA;&#xA;Recommendations&#xA;&#xA;The Decent Project recommends you avoid using biometrics on your devices. There is little debate over whether divulging a PIN constitutes testimonial evidence.sup13/sup&#xA;&#xA;We recognizes, though, that typing in a six-digit PIN (yes, please make your PINs at least six digits) every time you want to unlock your phone can be annoying. Given this, you may consider PIN-locking important apps, such as your e-mail, messengers, and password managers.&#xA;&#xA;We also recommend using unique PINs for each of these apps rather than one generic PIN.&#xA;&#xA;Additionally, if you are traveling across an international border, such as returning to the U.S. from a vacation overseas, consider disabling your biometrics temporarily. This way, if you are stopped your device cannot be unlocked simply with a face scan or fingerprint.&#xA;&#xA;~ Torman&#xA;psmallVerify this post: a href=&#34;https://github.com/decentproject/Signatures/blob/main/shouldIusebiometrics.md&#34; target=&#34;blank&#34;Source/a | a href=&#34;https://github.com/decentproject/Signatures/blob/main/shouldIusebiometrics.md.asc&#34; target=&#34;blank&#34;Signature/a | a href=&#34;https://github.com/decentproject/Signatures/blob/main/torman-pgp-key.asc&#34; target=&#34;blank&#34;PGP Key/a/small/p&#xA;&#xA;#privacy #security #opsec #FifthAmendment &#xA;&#xA;---&#xA;&#xA;Subscribe &amp; Comment&#xA;&#xA;If you found this post informative, please subscribe by entering your email below. You&#39;ll receive the latest posts from the Decent Project to you inbox.&#xA;!--emailsub--&#xA;&#xA;Do you use biometrics on your phone or devices? Do you think there should be an exception for device biometrics in the testimonial/non-testimonial paradigm? Let us know your thoughts in the comments below!&#xA;a href=&#34;https://remark.as/p/decentproject.org/should-you-use-biometrics-on-your-phone&#34;Discuss.../a&#xA;&#xA;--- &#xA;&#xA;Footnotes&#xA;sup1./sup &#34;The touchstone of whether an act of production is testimonial is whether the government compels the individual to use &#39;the contents of his own mind&#39; to explicitly or implicitly communicate some statement of fact.&#34; United States v. Doe (In re Grand Jury Subpoena Duces Tecum), 670 F.3d 1335, 1345 (11th Cir. 2012).&#xA;&#xA;sup2./sup &#34;[F]orcing the custodian to testify orally as to the whereabouts of nonproduced records requires him to disclose the contents of his own mind. He might be compelled to convict himself out of his own mouth. That is contrary to the spirit and letter of the Fifth Amendment.&#34; Curcio v. United States, 354 U.S. 118, 128 (1957).&#xA;&#xA;sup3./sup &#34;[T]he Fifth Amendment privilege is not triggered where the Government merely compels some physical act, i.e. where the individual is not called upon to make use of the contents of his or her mind.&#34; In re Grand Jury Subpoena, 670 F.3d at 1345.&#xA;&#xA;sup4./sup &#34;He may in some cases be forced to surrender a key to a strongbox containing incriminating documents, but I do not believe he can be compelled to reveal the combination to his wall safe -- by word or deed.&#34; Doe v. United States, 487 U.S. 201, 219, 108 S. Ct. 2341, 2352 (1988) (Justice Stevens dissent).&#xA;&#xA;sup5./sup  United States v. Brown, 125 F.4th 1186 (D.C. Cir. 2025).&#xA;&#xA;sup6./sup &#34;Though placing a thumb on a phone may seem akin to submitting to fingerprinting or providing a handwriting exemplar, the act, as performed here, is much closer to responding to a lie detector test or complying with a command to say a password. When Schwartz was ordered to open the cellphone, his act of unlocking the phone represented the thoughts &#34;I know how to open the phone,&#34; &#34;I have control over and access to this phone,&#34; and &#34;the print of this specific finger is the password to this phone.&#34; If Schwartz had instead been compelled to disclose whether he could open the phone, and made to say yes or to verbally disclose the password, those answers unquestionably would be testimonial communications. The compelled opening of the cellphone that occurred here is no different.&#34; United States v. Brown, 125 F.4th 1186, 1202-03 (D.C. Cir. 2025).&#xA;&#xA;sup7./sup United States v. Payne, 99 F.4th 495 (9th Cir. 2024).&#xA;&#xA;sup8./sup &#34;While providing law enforcement officers with a combination to a safe or passcode to a phone would require an individual to divulge the &#34;contents of his own mind,&#34; turning over a key to a safe or a thumb to unlock a phone requires no such mental process.&#34; Payne, 99 at 511.&#xA;&#xA;sup9./sup &#34;[T]he Supreme Court has framed the question around whether a particular action requires a defendant to divulge the contents of his mind, not whether two actions yield the same result.&#34; Payne, 99 at 511.&#xA;&#xA;sup10./sup &#34;The officers were left to identify any incriminating evidence through their own investigation.&#34; Payne, 99 at 511.&#xA;&#xA;sup11./sup  United States v. Combs, No. 24-CR-542 (AS), 2025 LX 289072 (S.D.N.Y. Apr. 18, 2025).&#xA;&#xA;sup12./sup But when &#34;&#39;[t]he existence and location of the papers are a foregone conclusion and the [defendant] adds little or nothing to the sum total of the Government&#39;s information by conceding that he in fact has the papers,&#39; production does not run afoul of the Fifth Amendment.&#34; Combs, LX 289072 at 2 (quoting Fisher v. United States, 425 U.S. 391, 410-11, 96 S. Ct. 1569, 48 L. Ed. 2d 39 (1976)); &#34;Second, under the &#39;foregone  [1346]  conclusion&#39; doctrine, an act of production is not testimonial—even if the act conveys a fact regarding the existence or location, possession, or authenticity of the subpoenaed materials—if the Government can show with &#39;reasonable particularity&#39; that, at the time it sought to compel the act of production, it already knew of the materials, thereby making any testimonial aspect a &#39;foregone conclusion.&#39;&#34; In re Grand Jury Subpoena, 670 F.3d at 1345-46.&#xA;&#xA;sup13./sup &#34;[P]roviding law enforcement officers with a combination to a safe or passcode to a phone would require an individual to divulge the &#34;contents of his own mind.&#34; Payne, 99 at 511; &#34;Requiring Doe to use a decryption password is most certainly more akin to requiring the production of a combination because both demand the use of the contents of the mind ...  Hence, we conclude that what the Government seeks to compel in this case, the decryption and production of the contents of the hard drives, is testimonial in character.&#34; In re Grand Jury Subpoena, 670 F.3d at 1346.&#xA;&#xA;---&#xA;&#xA;Disclaimer: I am not a lawyer, and I am not your lawyer. This post is meant to be informative and not to be taken as legal advice. If you are facing a legal issue you should always consult with a licensed attorney who can render legal advice that is specific to your needs. ]]&gt;</description>
      <content:encoded><![CDATA[<p><img src="https://i.snap.as/X1tXUy9U.jpg" alt=""/></p>

<p>There are a lot of positives to using biometrics on your devices. It&#39;s hard to deny their convenience and in some ways, <em>avoiding</em> passwords can be a good thing since they can be forgotten or stolen.</p>

<p>But the law doesn&#39;t necessarily treat your fingerprint the same as a PIN code or password when it comes to unlocking your device. This means you could be compelled to unlock your phone or computer depending on which unlock method you use.
</p>

<h2 id="testimonial-vs-non-testimonial-evidence" id="testimonial-vs-non-testimonial-evidence">Testimonial vs. non-testimonial evidence</h2>

<p>Whether the government can compel you to unlock your device hinges on whether a court considers your biometric data to be “testimonial” or not.</p>

<p>Testimonial evidence is anything that reveals the contents of your mind, <em>i.e., things you&#39;ve seen, heard, or know</em>.<sup>1</sup></p>

<p>Importantly, testimonial evidence falls under the Fifth Amendment&#39;s protections against self-incrimination. In other words, you cannot be compelled to provide testimonial evidence that may incriminate you.</p>

<p>However, courts distinguish testimonial evidence from <em>non-testimonial</em> evidence, which doesn&#39;t call on a person to reveal the “contents of [their] own mind.”<sup>2</sup> For example, compelled physical actions are not usually considered testimonial.<sup>3.</sup> This is why you can be compelled to provide fingerprints during booking, or a bloodtest as part of an investigation.</p>

<p>Courts have illustrated the distinction between testimonial and non-testimonial by comparing an individual who is compelled to produce keys to a lockbox (non-testimonial) against an individual who is compelled to produce a combination to a safe (testimonial).<sup>4</sup> One is simply handing over a key while the other requires you to divulge something you know.</p>

<p>This disctinction is important because when it comes to your devices courts typically agree that PINs and passcodes are testimonial, while some courts have found that biometrics are non-testimonial.</p>

<p>That might make the difference as to whether you can be compelled to unlock your device.</p>

<h2 id="circuit-split" id="circuit-split">Circuit Split</h2>

<p>Currently, there are different schools of thought on this issue.</p>

<p>Just last year, in <em>United States v. Brown</em><sup>5</sup> the D.C. Circuit Court of Appeals found that compelling an individual to unlock their phone with biometrics <em>was</em> testimonial. The court found the act of opening a phone with biometrics—while physical—<em>is</em> testimonial because it “directly announces the owner&#39;s access to and control over the phone, as well as his mental knowledge of how to unlock the device.”<sup>6</sup></p>

<p>It&#39;s an interesting take on the testimonial vs. non-testimonial issue.</p>

<p>It illustrates the distinction between physical acts that communicate something and those that don&#39;t. Submitting to a fingerprint panel at the police station doesn&#39;t reveal anything incriminatory. It&#39;s only once those fingerprints are anaylzed that they may incriminate. Whereas, a fingerprint that unlocks a phone essentially authenticates you as its owner.</p>

<p>However, in 2024, the 9th Circuit Court of Appeals in <em>United States v. Payne</em><sup>7</sup> found the opposite. It ruled that a fingerprint unlock of a phone is akin to handing over the keys to a safe, rather than divulging its combination.<sup>8</sup></p>

<p>The court rejected the idea that biometrics are a substitute for PINs or passcodes and should therefore enjoy the same protections.<sup>9</sup> It also rejected the idea that a biometric unlock is testimonial because it confirms ownership and knowledge of the device&#39;s contents. The court said the access is not incriminating by itself, but only provides access to potential source of incriminating information.<sup>10</sup></p>

<h2 id="should-you-use-biometrics" id="should-you-use-biometrics">Should you use biometrics?</h2>

<p>Each person has to assess their own threat model. But given the variances in the law and the lack of direct precedent in many circuits, it would seem that the safest approach is to use a PIN or passcode to unlock your device.</p>

<p>Even if you find the <em>Brown</em> case pursuasive or think it would apply, there have already been court decisions that distinguish its finding.</p>

<p>Noteably, P. Diddy cited <em>Brown</em>, among other cases, in his criminal case in New York in order to prevent compelled production of a cell phone. The District Court ruled in favor of the government, in part, because there was no question as to whether the phone was his.<sup>11</sup></p>

<p>Essentially, <em>Brown</em> suggests that the testimonial aspect of unlocking the phone is that it communicates control and ownership. But if the government can show that you own and control the device in other ways, then compelling a biometric unlock is not really implicating your Fifth Amendment rights.<sup>12.</sup></p>

<h3 id="recommendations" id="recommendations">Recommendations</h3>

<p>The Decent Project recommends you avoid using biometrics on your devices. There is little debate over whether divulging a PIN constitutes testimonial evidence.<sup>13</sup></p>

<p>We recognizes, though, that typing in a six-digit PIN (yes, please make your PINs at least six digits) every time you want to unlock your phone can be annoying. Given this, you may consider PIN-locking important apps, such as your e-mail, messengers, and password managers.</p>

<p>We also recommend using unique PINs for each of these apps rather than one generic PIN.</p>

<p>Additionally, if you are traveling across an international border, such as returning to the U.S. from a vacation overseas, consider disabling your biometrics temporarily. This way, if you are stopped your device cannot be unlocked simply with a face scan or fingerprint.</p>

<p>~ Torman
<p><small>Verify this post: <a href="https://github.com/decentproject/Signatures/blob/main/should_I_use_biometrics.md" target="_blank" rel="nofollow noopener">Source</a> | <a href="https://github.com/decentproject/Signatures/blob/main/should_I_use_biometrics.md.asc" target="_blank" rel="nofollow noopener">Signature</a> | <a href="https://github.com/decentproject/Signatures/blob/main/torman-pgp-key.asc" target="_blank" rel="nofollow noopener">PGP Key</a></small></p></p>

<p><a href="https://decentproject.org/tag:privacy" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">privacy</span></a> <a href="https://decentproject.org/tag:security" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">security</span></a> <a href="https://decentproject.org/tag:opsec" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">opsec</span></a> <a href="https://decentproject.org/tag:FifthAmendment" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">FifthAmendment</span></a></p>

<hr/>

<h4 id="subscribe-comment" id="subscribe-comment">Subscribe &amp; Comment</h4>

<p>If you found this post informative, please subscribe by entering your email below. You&#39;ll receive the latest posts from the Decent Project to you inbox.
</p>

<p>Do you use biometrics on your phone or devices? Do you think there should be an exception for device biometrics in the testimonial/non-testimonial paradigm? <em>Let us know your thoughts in the comments below!</em>
<a href="https://remark.as/p/decentproject.org/should-you-use-biometrics-on-your-phone" rel="nofollow">Discuss...</a></p>

<hr/>

<h3 id="footnotes" id="footnotes">Footnotes</h3>

<p><sup>1.</sup> “The touchstone of whether an act of production is testimonial is whether the government compels the individual to use &#39;the contents of his own mind&#39; to explicitly or implicitly communicate some statement of fact.” <em>United States v. Doe (In re Grand Jury Subpoena Duces Tecum)</em>, 670 F.3d 1335, 1345 (11th Cir. 2012).</p>

<p><sup>2.</sup> “[F]orcing the custodian to testify orally as to the whereabouts of nonproduced records requires him to disclose the contents of his own mind. He might be compelled to convict himself out of his own mouth. That is contrary to the spirit and letter of the Fifth Amendment.” <em>Curcio v. United States</em>, 354 U.S. 118, 128 (1957).</p>

<p><sup>3.</sup> “[T]he Fifth Amendment privilege is not triggered where the Government merely compels some physical act, i.e. where the individual is not called upon to make use of the contents of his or her mind.” _In re Grand Jury Subpoena, 670 F.3d at 1345.</p>

<p><sup>4.</sup> “He may in some cases be forced to surrender a key to a strongbox containing incriminating documents, but I do not believe he can be compelled to reveal the combination to his wall safe — by word or deed.” <em>Doe v. United States</em>, 487 U.S. 201, 219, 108 S. Ct. 2341, 2352 (1988) (Justice Stevens dissent).</p>

<p><sup>5.</sup>  <em>United States v. Brown</em>, 125 F.4th 1186 (D.C. Cir. 2025).</p>

<p><sup>6.</sup> “Though placing a thumb on a phone may seem akin to submitting to fingerprinting or providing a handwriting exemplar, the act, as performed here, is much closer to responding to a lie detector test or complying with a command to say a password. When Schwartz was ordered to open the cellphone, his act of unlocking the phone represented the thoughts “I know how to open the phone,” “I have control over and access to this phone,” and “the print of this specific finger is the password to this phone.” If Schwartz had instead been compelled to disclose whether he could open the phone, and made to say yes or to verbally disclose the password, those answers unquestionably would be testimonial communications. The compelled opening of the cellphone that occurred here is no different.” <em>United States v. Brown</em>, 125 F.4th 1186, 1202-03 (D.C. Cir. 2025).</p>

<p><sup>7.</sup> <em>United States v. Payne</em>, 99 F.4th 495 (9th Cir. 2024).</p>

<p><sup>8.</sup> “While providing law enforcement officers with a combination to a safe or passcode to a phone would require an individual to divulge the “contents of his own mind,” turning over a key to a safe or a thumb to unlock a phone requires no such mental process.” <em>Payne</em>, 99 at 511.</p>

<p><sup>9.</sup> “[T]he Supreme Court has framed the question around whether a particular action requires a defendant to divulge the contents of his mind, not whether two actions yield the same result.” <em>Payne</em>, 99 at 511.</p>

<p><sup>10.</sup> “The officers were left to identify any incriminating evidence through their own investigation.” <em>Payne</em>, 99 at 511.</p>

<p><sup>11.</sup>  <em>United States v. Combs</em>, No. 24-CR-542 (AS), 2025 LX 289072 (S.D.N.Y. Apr. 18, 2025).</p>

<p><sup>12.</sup> But when “&#39;[t]he existence and location of the papers are a foregone conclusion and the [defendant] adds little or nothing to the sum total of the Government&#39;s information by conceding that he in fact has the papers,&#39; production does not run afoul of the Fifth Amendment.” <em>Combs</em>, LX 289072 at <em>2 (quoting <em>Fisher v. United States</em>, 425 U.S. 391, 410-11, 96 S. Ct. 1569, 48 L. Ed. 2d 39 (1976)); “Second, under the &#39;foregone  [</em>1346]  conclusion&#39; doctrine, an act of production is not testimonial—even if the act conveys a fact regarding the existence or location, possession, or authenticity of the subpoenaed materials—if the Government can show with &#39;reasonable particularity&#39; that, at the time it sought to compel the act of production, it already knew of the materials, thereby making any testimonial aspect a &#39;foregone conclusion.&#39;” <em>In re Grand Jury Subpoena</em>, 670 F.3d at 1345-46.</p>

<p><sup>13.</sup> “[P]roviding law enforcement officers with a combination to a safe or passcode to a phone would require an individual to divulge the “contents of his own mind.” <em>Payne</em>, 99 at 511; “Requiring Doe to use a decryption password is most certainly more akin to requiring the production of a combination because both demand the use of the contents of the mind ...  Hence, we conclude that what the Government seeks to compel in this case, the decryption and production of the contents of the hard drives, is testimonial in character.” <em>In re Grand Jury Subpoena</em>, 670 F.3d at 1346.</p>

<hr/>

<p><em>Disclaimer: I am not a lawyer, and I am not your lawyer. This post is meant to be informative and not to be taken as legal advice. If you are facing a legal issue you should always consult with a licensed attorney who can render legal advice that is specific to your needs.</em></p>
]]></content:encoded>
      <guid>https://decentproject.org/should-you-use-biometrics-on-your-phone</guid>
      <pubDate>Thu, 15 Jan 2026 19:40:25 +0000</pubDate>
    </item>
  </channel>
</rss>