xyem: We're not talking about HDDs and safes, we are talking about encryption and safes - and they are identical.
They both secure their contents (protection).
They both require a key (authentication).
They are both breakable given enough force/time.
If they rules were different, which set of rules would a safe that has a digital storage device inside fall under? The safe one because it is a physical safe or the encryption one because it is protecting digital data? If you split the encrypted data between two devices (like RAID0), can you be forced to give the second device up even though its absence is physically protecting the data on the other one?
I don't see where the "analogy" comes apart.
da187jimmbones: I won't argue with you about the similarities and differences of a safe and encryption. I think we just won't agree about whether the legal analogy is proper. One stores digital data exclusively, the other can store a bunch more than that, including physical items. They are far from identical. Put an actual woman's head into "encryption."
A safe and encryption have similarities, but they are ultimately different. The legal system will accept this eventually and technology items like encryption will have it's own set of rules, and won't rely on comparisons to non technology items like safes.
I don't know why you put the word analogy in quotes. It is an analogy. Nothing can change that.
I'm in agreement with Xyem, the fact that the information is digital exclusively has little relevance to the workings of the analogy. The fact is that it contains evidence that they have a warrant to search. That the files are digital stored instead of physically stored is inconsequential.
orcishgamer: They're really not, you're essentially arguing she has to interpret something they cannot understand. She's under no obligation to do so. In a safe, the evidence is not in their hands that's why you can be compelled to hand it over as part of a warrant process, they have the evidence on the harddrive they simply cannot make sense of it, she's under no obligation to help them convict her by helping them understand the data just as a murder suspect is under no obligation to explain how he might have killed the victim.
That's a fair line of argument, but then I think that a person should not have to hand over a key to safe either under that line of argument - the police have the safe under their control (and therefore its content) and you should be under no obligation to help them open it. However, you've said the law disagrees and that you can be forced to hand over a key. If so, then that law should be changed for this argument to hold.
timppu: What occurred to me right away, and was also hinted in the article, why doesn't the suspect simply say she(?) has forgotten the password? I have sometimes forgotten WinZip passwords, and at least once I've forgotten the hard disk decrypting password for one old Fedora Linux installation.
But then, I'm not sure if these systems have usually some kind of backdoor for those cases you forget the password, at least by contacting the company who made the software... but that would kinda defeat the purpose.
Sometimes these systems do and the police can impel a company to help them decrypt the files. As for "forgetting", that is a good line of defense, but a judge *might* still be able to use contempt of court against you depending on if they believe you are lying - so it could come down to the individual judge in this case. But in general you can't be held in contempt for something you are unable to comply with - but then it can come down to whether or not the judge believes you are unable to comply.