

Ask Slashdot: Encrypted Digital Camera/Recording Devices? 285
Ransak writes "As we hear more and more about dashboard cameras catching unplanned events, I've thought of equipping my vehicles with them just in case that 'one in a billion' moment happens. But given the level of overreach law enforcement has shown, I'd only consider one if I could be assured that the data was secure from prying eyes (e.g., a camera that writes to encrypted SD memory). Are there any solutions for the niche market of the paranoid photographer/videographer?"
Why yes, there is. (Score:5, Insightful)
Are there any solutions for the niche market of the paranoid photographer/videographer?"
Why yes, yes there is. It's called building it yourself. While encryption isn't illegal, you may have noticed despite the obvious benefits and lack of drawbacks to the consumer, it isn't found pretty much anywhere. This is deliberate: Various law enforcement agencies that don't want to be found out make backroom deals to keep companies from providing this most useful of features because it would make their job more difficult. Or at least, so they say. In truth, they just want access to "ALL THE THINGZ!" regardless of whether there's a legitimate judiciary need for it. And encryption means they'd have to serve warrants and stuff to get the keys, not just go clandestine copy-pasta on your personal data.
So your niche market isn't niche at all -- it would already be out there, if not for the authoritarian governments of the world (I'm looking at you "free" western society). Now with that out of the way, you can roll your own easily. Embedded devices with a USB connector and linux are a dime a dozen, and most sport the ability to store data to an SD or CF card, as well as boot off of them. It's possible to create one-way encryption so something can be written to using a public key, but only decrypted using a private key not located on the same physical device. This would provide you with a tamper-evident system, and simultaniously provide full protection for your privacy; You can't recover the data without the key, and the data cannot be modified without it either.
Re:Why yes, there is. (Score:5, Insightful)
Re:Why yes, there is. (Score:5, Insightful)
No. There's not a substantial market for it. The market is for things that make it _easier_ for people to post every last second of their lives online (Facebook, Twitter, Vine, Instragram, Youtube, etc). The vast majority of the public will see encryption or anything else that interferes with instant narcissism as broken.
Amazon [amazon.com] says "No." There is a growing market for dashboard cameras. And they're cheap. Really cheap. Forbes [forbes.com] even published an article last month suggesting that they may become mandatory on new cars. As far as people posting "every last second of their lives online." You should really google "russian dash camera". They love posting those things online. It's quite the rage right now. No sir, you are dead wrong.
The market is very much alive and growing fast. And nowhere is "instant narcissism" listed in the reasons people are buying them. Security. Safety. Documenting scams people try to pull (Drive a nice car? Got nice insurance. Target for a personal injury scam). Documenting the police "No officer, I wasn't speeding, and this GPS-enabled dash cam proves it." The only "instant narcissism" I see is from a jaded troll on slashdot going for extra karma by dragging in a favorite scratching post for the slashkiddies: Hipsters. And hey, while I appreciate the sentiment, you're just flat wrong here.
Re: (Score:2)
I'm pretty certain he was only referring to the encryption part as a "niche market" or as interference with "instant narcissism". Most of your reply instead assumes he was talking about dashboard cameras in general, making the last line of your comment pretty extra unfriendly. You're a nice person, girlintraining, and I like your posts, but I think you misread his post and a personal attack is unnecessary.
Re: (Score:2)
I think thesandbender was referring to the lack of market for ubiquitous encryption, not dash cameras.
With the growing number of cases of seizure of cameras and recording devices by police, I think the need for something like this exists, even if people don't realize it. I would add one feature: authorized write-access. It would be nice if someone couldn't maliciously delete the contents.
Re: (Score:2)
Re: (Score:2)
Would a WiFi SD card to a laptop in the car do the same job? I don't know whether those SD cards store stuff permanently or just long enough to transmit it. Or maybe it's configurable to erase after transmission?
Besides the major article on Slashdot just this week about how those cards are so exploitable it makes Java look like Fort Knox, sure. Great idea! One problem: The dude asked for an encrypted storage device. People who ask for things like this generally are against the idea of wirelessly broadcasting their personal data.
Re: (Score:3)
Re: (Score:2)
The reason that there isn't encryption in camcorders is not because of authoritarian governments Encryption is not illegal, Camcorders are not illegal. There is no reason that a company could not make such a device and sell it in the western world. In fact, COTS encrypted USB thumb drives are used by defense contractors to encrypt sensitive data all the time.
The reason that there isn't encryption in camcorders is because it would be more expensive and there isn't a large demand for such a device. It is p
Re: (Score:3)
So your niche market isn't niche at all -- it would already be out there, if not for the authoritarian governments of the world (I'm looking at you "free" western society).
No, the niche market truly is niche, otherwise it would be available. There are three reasons it is not, and only one of them has anything to do with any government.
Re: (Score:2)
If you knew it would arrive, might even be better to send it to various vid sites starting maybe with YouTube and the like, or to public page of one or more of the social sites where you might have membership.
Because you might find yourself in a jurisdiction that can jail you for not either handing over the decryption key or, perhaps, being allowed to decrypt it yourself.
Ummmm.... No. (Score:3)
Encryption being on, or not on, devices is not because of any kind of backroom dealings and is all up to what a company feels it useful, and what they want to spend on it. There are popular devices out there with very good, as in the police can't bypass it, encryption. You can do it on an Android phone, the full device encryption is extremely robust. It is just a pain in the butt to use so most don't.
When a company considers providing encryption, and in what capacity, there is a few things they have to eval
Re: (Score:2)
I think you mean "utter lack of benefits and significant drawbacks". I'm a photographer, and there's pretty much zero benefit to encrypting my work, and the risk of losing everything forever because I forget th
It is everywhere, where it makes sense (Score:2)
While encryption isn't illegal, you may have noticed despite the obvious benefits and lack of drawbacks to the consumer, it isn't found pretty much anywhere.
That is utter bullshit. Every iPhone for example has the whole device storage encrypted. Use of SSH for web traffic is everywhere.
The reason why you don't see it more overtly is not because of your paranoid "law enforcement issues", it's because a lot of other uses of it end up sucking for the user.
I would be OK with encrypting and signing my email b
Camouflage (Score:5, Insightful)
Hmm, an SD card plugged into your camera, sticking out in plain view, with nothing on it. A second card, installed under the dash, that does the recording. "Why no, officer, I don't believe the camera was turned on".
Re: (Score:2)
Because the concern is that the sd card contains video of you breaking the law and you'd rather the police not be able to view it.
Re: (Score:3)
If you have a video camera constantly recording on your car dash you are going to end up recording a traffic offense you have committed (unless you never commit any of course, but most people make the occasional mistake). Not wanting a police officer who pulls you over for fun to be able to access the video and look for such cases doesn't seem like that strange a desire.
Looking good in a court of law isn't the issue, it's not getting there in the first place. Though I can't help but notice that the amazing
Doesn't Help In The UK (Score:2, Informative)
In the UK you are required to decrypt files that may contain evidence of a crime under the RIP act.
Re:Doesn't Help In The UK (Score:5, Funny)
In the UK you are required to decrypt files that may contain evidence of a crime under the RIP act.
That's why you have two decryption keys - one that decyrpts the actual video, and one that decrypts a stream of LOLcats videos. Then you say "Oh noes! My wife must have recorded LOLcats on here!".
Re: (Score:3)
Re: (Score:2)
Re: (Score:2)
they can keep you in indefinitely for forgetting the password. RIPA allows for this. It's the ONLY Act that allows for this - although, it is being challenged, as it falls foul of the "cruel and unusual punishment" bit in the ECHR. It also falls foul of the double punishment rule, in that you can't be legally punished twice for the same crime, they get around that by saying that repeated contempt is not the same crime.
Re: (Score:2)
no, that's a Statutory Instrument. Statutes have the force of Law only by the implied consent of the Governed. YOU HAVE THE RIGHT TO TELL THE JUDGE TO FUCK OFF.
PICMicro Project (Score:3)
Re: (Score:2)
You should be able to use an arduino to do this.
Take something like this shield [seeedstudio.com], and then connect the camera's SDCard socket to the arduino on 6 of the GPIO lines. (The shield uses the SPI interface.) Read/write speed may be a factor though, due to using serial bitbash mode to read and write to the card over SPI.
This would let you add encryption functionality to any SDcard capable device that doesn't currently support it. Putting a buffer lytic cap on, and a voltage regulator would let you tap the camera's
Which prying eyes? (Score:2)
Do you want to prevent anyone from accessing the information without your approval or are you merely concerned about the device being physically confiscated? If it's the latter, how about just streaming the audio/video to remote storage?
Re: (Score:2)
That said, having your laptop serve as a local WiFi and using one of those WiFi SD cards...do they store the data and keep it stored or just long enough to transmit it? That might solve the problem entirely since the laptop certainly will be capable of being encrypted well enough to protect from usage and the SD card is bla
Re: (Score:2)
Put some photos on the SD card, so they will see what they expect. If you are British, you may want to avoid that big blob of random bits.
Re: (Score:2)
Partition a 64GB card with a 2GB partition on it, with a FAT32 filesystem and maybe a bunch of street maps. Put a label on the card that says 2GB. Record encrypted data to raw unpartitioned disk space past 2GB. Bonus points for hacking the firmware on the SD card so that it normally shows up as a 2GB card unless a special code is sent to it.
Off-device streaming (Score:4, Insightful)
Re: (Score:2)
Re: (Score:2)
Amen!
Cops destroy recordings and "lose" devices all the time. Streaming video is the only real solution and not practical in this case.
Eye-fi SD card... (Score:5, Informative)
Get an eye-fi SD car for $50.
It transfers your photos/video from your camera to your laptop/tablet/smartphone and then deletes it from its local storage.
So you can show an empty SD card. And your laptop/tablet/smartphone is password protected and/or encrypted.
Re: (Score:2)
This setup comes with the side benefit that you can sound cool at the same time, if your car has blue-tooth audio, or a blue-tooth/FM tran
Re: (Score:2)
Or maybe a cheap small ARM DC powered board like a pcDuino or a cubieboard, run Linux on it, do whatever you want.
Re: (Score:2)
Forensically secure? (Score:4, Interesting)
The scenario I'm more interested in is having a camera running at all times that catch the various idiot drivers all over the place. Hit a button and the last 5 minutes and anything until the next press are permanently stored. Then send the file to the traffic cops.
The challenge is making the video admissible in court with sufficient weight to be enough to actually convict somebody of the traffic violation they're on tape performing. Currently "we" consider a cops' word as overwhelming evidence in such a case, with police dashboard cameras being a "bonus".
If there's some way to ensure that *I* don't tamper with the recording at a level that the courts would trust, I'd install one in a heartbeat.
Re: (Score:2)
Given how much "revenue" city police get from traffic violations, I'd think they'd be all for this. Get the population that's fed up with jackass drivers to buy and install cameras that do the cops' job for them in court, bringing in additional fines without adding more traffic cops.
I'd call that a win for everybody except the jackass drivers.
Correct me if I am wrong. (Score:2)
I think the OP wants to have the data encrypted so that in the event he inadvertently captures video that could implicate himself in a crime (e.g. speeding, running a red light, etc), that this information can only be unencrypted and accessed with his consent if the data is confiscated.
I think the best solution (although I am not sure if this product exists), is an SD card that has hardware encryption built in to it. This would be ideal because it wouldn't require the camcorder to know anything about the e
Waste of time (Score:2)
The cops will just confiscate and "lose" your encrypted memory card.
security through obscurity (Score:5, Interesting)
I have a camera built into the front license plate bracket rather than sitting on the dashboard. This particular one has the recording device elsewhere on the vehicle, but I suspect with today's technology the entire thing could fit in the license plate bracket. Just sayin'.
Re:security through obscurity (Score:4, Informative)
Re: (Score:3)
How do you avoid mud and bugs obscuring the lens?
Maybe that is exactly what he is trying to record.
+5 Profound.
Google Glass? (Score:4, Interesting)
The way I understand it, you could offload the data before the corrupt cop could seize the glasses. That is, if he even figures out what the glasses are for.
How long before Google Glass-type technology shows up in a pair of glasses that don't look any different from a regular pair of specs?
I know, I know, they're creepy. But they may also be something of an equalizer in the coming surveillance wars.
SD = Secure Digital = encryption. Old phone (Score:3)
Most cameras don't have a keyboard to enter the password of course, so use an old phone as a camera. Some phones support locking and unlocking the card with a passphrase.
Slashdot normally has good answers for TECHNICAL issues. I'm amazed that apparently nobody replying sooner knew what SD stands for.
Re:SD = Secure Digital = encryption. Old phone (Score:4, Informative)
Yes and no. Not every device that uses (micro)SD cards can do encryption, and not every card that's the shape and size of a (micro)SD card is necessarily a real (micro)SD card that supports encryption. Remember, SD is a superset of MMC, and 99% of devices that don't support encryption really just treat the "(micro)SD" card like a MMC card.
I believe that in the US, anybody can read and write (micro)SD using the 1-bit MMC-compatible SPI interface without encryption royalty-free, but if you want to either use its built-in encryption or communicate in 4-bit mode, you have to pay royalties and obtain a license to use the superset of capabilities that (micro)SD adds to MMC.
Re:This solves what? (Score:5, Insightful)
"Hrm. Well there, this SD card looks blank. Format."
And it's tossed in the trash because it was broken.
What you need is something that streams to off site.
I thought he was clear on the problem that encryption solves: the level of overreach law enforcement ....assured that the data was secure from prying eyes
He wasn't looking for a solution to prevent him from throwing away an SD card that he recorded his encrypted steam to - how is that even a problem? I have a flash drive right here with gigabytes of encrypted data and I haven't thrown it away because it contains gigabytes of encrypted data.
Re:This solves what? (Score:5, Informative)
He doesn't throw the card away. The "prying eyes" do. If his car gets searched and they confiscate the contents of his car. It's very easy for an SD card to go missing or get formatted.
Re: (Score:2)
He doesn't throw the card away. The "prying eyes" do. If his car gets searched and they confiscate the contents of his car. It's very easy for an SD card to go missing or get formatted.
Then problem solved, right? He's looking for protection from having his own evidence used against him.
If the police are searching his car and seizing SD cards, I don't think they are going to casually steal the card and format it. If they are searching the car, the card (and everything in the car) is evidence and it will be bagged and stored with the rest of the evidence, and possible will undergo forensic analysis if they think there's useful data on it. Even if they don't know the data is encrypted, when
Re: (Score:3)
Not really. He never mentioned why he exactly wanted it to be encrypted. It also deletes the evidence of the police doing something wrong. What if it was a cop that ran the red light but said it was you? What if you pull up and see a cop beating someone?
Re: (Score:3)
Not really. He never mentioned why he exactly wanted it to be encrypted. It also deletes the evidence of the police doing something wrong. What if it was a cop that ran the red light but said it was you? What if you pull up and see a cop beating someone?
He said he wants to record video but keep it safe from prying eyes, doesn't that say exactly why he wants to encrypt it?
He said nothing about wanting to keep it safe from confiscation or destruction by the police, that's a much different problem that isn't solved by encryption - he just doesn't want them to be able to view the video.
Re: (Score:3, Interesting)
So what the query really is, "I want a camera that I can use when the accident is someone else's fault and I can pretend doesn't exist when the accident is my fault?". After all the cameras only record a certain amount of time and then overwrite previously recorded video, hence there isn't much worry for loss of privacy.
Re: (Score:3)
So what the query really is, "I want a camera that I can use when the accident is someone else's fault and I can pretend doesn't exist when the accident is my fault?". After all the cameras only record a certain amount of time and then overwrite previously recorded video, hence there isn't much worry for loss of privacy.
Exactly - what's wrong with that? If the other guy wants a camera to prove it's my fault, let him get his own camera, don't expect me to use my camera to prove my own guilt.
But even if the camera only records 30 minutes or an hour of video, there are still privacy concerns. If I'm in an accident 30 minutes after a quick romp on the hood of my car with my mistress, I sure don't want my wife seeing that video when they play it back in court.
Re: (Score:3)
If I'm in an accident 30 minutes after a quick romp on the hood of my car with my mistress, I sure don't want my wife seeing that video when they play it back in court.
Well then do it in the back seat. It will be more comfortable anyway.
Jeez. It's not hard.
Re: (Score:3)
That's going to work only if the justice system is ... you know ... just. Which it isn't. Since the times of Cardinal Richelieu at least. You probably broke some law today before you got out of the bed.
Re: (Score:3)
0100010001010011:
Original submitter:
But that's a false reason (Score:5, Insightful)
Either it isn't thought through, or it is chimera. The thing is if you what you are worried about it corrupt cop does something you record, they stop you, and take the recording away, encryption does fuck-all to stop that. The cops steal the gear, that is that.
The solution to that is a backup, or a fake item. A setup where the obvious camera isn't the one that records, or that there is a second SD card elsewhere that has a copy or something.
Encryption is only useful if he wants to be able to cover his tracks, and selectively release video. This is precisely what corrupt police like to do with their dash cams. They use them to protect themselves, but turn them off or "lose" the video when they are breaking the law.
So to me it implies that he probably like breaking traffic law, and doesn't want the evidence of that around, but still wants to be able to record things.
Re:But that's a false reason (Score:4, Insightful)
...or have an officer believe "This is not evidence that can be used against me." Count yourself lucky that you don't have enough experience with corrupt police officers to understand how they operate.
"I was recorded committing a crime, but I can use as much force as I want without any consequences in order to change how much evidence becomes available to prosecutors, who are mostly my buddies. Plus, my partner has been inculcated to back me up on anything and everything with a straight face. If I fire my gun, though, there's going to be a hell of a lot of paperwork."
Re:But that's a false reason (Score:4, Insightful)
Yeah, the only people who care about privacy are criminals and bad drivers.
Fuck you. Really.
Re:This solves what? (Score:4, Funny)
ok.
1. The Police can, sans warrant, only seize items that are reasonably thought to have been used in the COMMISSION OF A CRIME. For example, firearms.
2. The Police have NO RIGHT to take private property just because they want to.
3. "Just Cause" is NOT a justification for seizure.
4. The Police have NO RIGHT to demand that you incriminate yourself by turning over materials. EVER.
5. The Police have NO RIGHT to search you or your property for evidence without a specified WARRANT. PERIOD.
Re:This solves what? (Score:4, Insightful)
#2: Once you "lose" control of your SD card (given to - or - taken by the officer)
I would think
Re: (Score:2)
Re:This solves what? (Score:4, Insightful)
All that sounds great in the classroom/laboratory, but in the street it's pure bullshit. The cops can and will do want they want any time they think they will get away with it, including rape [cbslocal.com]. and the biggest lie they continue to tell is that it's not systematic. Well, it is, and the only anomaly is getting caught.
Re:This solves what? (Score:5, Insightful)
What police have the right to do and what police do are two very different things.
Re:This solves what? (Score:5, Informative)
5. The Police have NO RIGHT to search you or your property for evidence without a specified WARRANT. PERIOD.
You seem to be misinformed. They can search your vehicle during a traffic stop if they have probable cause [wikipedia.org]. This can also be grounds for forcibly entering you home if they have cause to believe you are holding someone hostage, etc. Unfortunately probable cause can be very easy to abuse.
The you have even worse abuses such as the NYC stop and frisk law [wikipedia.org]
Re:This solves what? (Score:5, Informative)
"Also, in some states it is a crime to record an on-duty police officer without their permission."
No, it isn't.
This has been tried in a relatively few states, and while at first some judges were cooperative with the police, eventually in every state where it has been tried so far it has been thrown out of court.
It is now a pretty well-established principle that if something is occurring in public, you can film it. Even if it's cops doing it. Almost anything that occurs on the street, in fact, plus anywhere else public. Even backcountry roads.
People have a RIGHT to film the police doing their taxpayer-funded jobs in public. Period.
Recently some cops tried a new twist on this idea. They claimed that filming was okay, but that recording audio at the same time was "illegal surveillance" under their states' "all-party consent" law. (I.e., in some states, all parties have to consent before a phone conversation, for example, can be legally recorded.)
That didn't stand up in court, either.
Re: (Score:3)
If the police are searching his car and seizing SD cards, I don't think they are going to casually steal the card and format it.
If the police are searching the car, then everything they remove will go into an evidence bag for later examination, including the camera and the SD card. Before examination, the SD card will certainly be duplicated so that any changes that accessing the card while studying it can be accounted for, and an exact duplicate can be provided to the defense if necessary.
If the camera is a commercial product, then the police will contact the manufacturer to find out what the data format is when they cannot read
Re: (Score:3)
"If the police are searching the car, then everything they remove will go into an evidence bag for later examination, including the camera and the SD card. Before examination, the SD card will certainly be duplicated so that any changes that accessing the card while studying it can be accounted for, and an exact duplicate can be provided to the defense if necessary."
Unless the card contains evidence of cops abusing their power. In which case... what card? They never found any card. Or, as you point out, the
Re:This solves what? (Score:4, Informative)
Click here for link [informatio...ration.com]
Re:This solves what? (Score:4, Informative)
"11th circuit court of appeals ruled that you *CANNOT* compel somebody to decrypt their HD."
There is a caveat, however. This is only true if it is NOT known in advance whether there is specific illegal material contained in the encrypted data.
In another case, Customs (apparently randomly) searched a man who was coming back into the United States. His laptop was turned on but asleep, and an encrypted volume was active and accessible. Two Customs agents saw child pornography among the encrypted data, before the man (I don't know how) managed to switch the computer off. When the computer was started back up again, the encrypted data was not accessible without a password.
In this case, the court ruled that the man could be compelled to supply the password, because it was already known that specific illegal material was contained in the encrypted data. (With a certain measure of reliability. After all, two agents testified to seeing that material, AND if that turned out not to be the case when the data was accessed, two Customs agents would no doubt lose their jobs, to say the least. Maybe get sued or be prosecuted as well.)
The lesson here is: be sure your decryption is turned off.
There's more, though: another circuit court recently ruled firmly that even at the border, agents of the government must have probable cause to conduct a search. So the random searches they were doing are no longer kosher. (They never were, really, but they were getting away with it.)
Re:This solves what? (Score:5, Interesting)
Even if the camera manufacturers are not making the camera with built-in encryption, having a public-key encryption can be achieved on a separate tiny device. With current technology the device could have a form-factor of an SD-card. Imagine you have an SD card to which you record a public-key. Every following write to the card will be done through a built-in encryption using that key. All reads will return the encrypted content and it will appear as garbage. But for the purpose of most cameras (that only need to be able to read directories and file names) this will work. If the device is not as small as the SD card, I’d be ok to have wires sticking out of the SD slot that go to my “encryptor”. I can totally see such card to be useful for general photography too.
Re:Why (Score:5, Insightful)
Well you know that they can get a warrant to force you to decrytpt it
The 5th Amendment would tend to disagree with you, at least in the US. Now if they grant you immunity, then yes you have to decrypt it, but then you have immunity and are not at risk.
to be honest if you driving on the public highway is there any reasonable reason why you would want to deny law enforcement access to it?
Because I want to and it's a free society?
try to hide your footage implies that you have been doing something naughty driving wise.
It implies nothing more than I don't want other people to see it without my permission.
Re:Why (Score:4, Informative)
In the US at least, the courts (all the way up to the Supreme Court IIRC) have ruled that law enforcement can't legally force you to provide access to your encrypted data (thanks to a little thing called the 5th amendment)
Re:Why (Score:5, Informative)
Police routinely destroy, delete, edit and/or obfuscate footage when it shows them in an "unflattering" light, why do you expect everyday citizens to turn over evidence against themselves when the police fail to do the same?
http://www.wtop.com/?nid=708&sid=1938732 [wtop.com]
http://www.newschannel5.com/Global/story.asp?S=12951588 [newschannel5.com]
http://www.wtop.com/?nid=428&sid=1116072 [wtop.com]
http://blog.al.com/spotnews/2009/05/birmingham_police_beating_vide_3.html [al.com]
https://www.youtube.com/watch?v=pmXTFr5hoOo [youtube.com]
http://gritsforbreakfast.blogspot.com/2010/03/fort-worth-justice-says-traffic-stop.html [blogspot.com]
http://www.sun-sentinel.com/news/broward/hollywood/sfl-hollywood-cops-fake-report-b072809,0,350771.story [sun-sentinel.com]
Re: (Score:2)
Or say to like a laptop which is then encrypted. I'm not sure about dashboard cams but some cameras offer wifi, which works like take the picture > send the picture > delete the picture. Not sure about a stream though. It would obviously require a lot more resources, but I'm sure an N network could handle it.
Re: (Score:2)
Sounds expensive.
Comment removed (Score:5, Insightful)
Re: (Score:2)
Too much work, too hard to insure you always have a signal. The answer to this one is actually pretty simple...carputer. You can either DIY with one of several kits or a friend of mine has made a good living installing mini-HTPC boxes based on Bobcat chips in trunks, its really not hard and these chips are ultra low power so its not a drain. Add an SSD using Truecrypt and voila! The cops pull the plug to get the SSD out and all they have is a brick without your Truecrypt password. There are plenty of little 5 inch touchscreens you can mount in the front so you can input your password as you are starting up and if you decide you want to keep anything you recorded 5 minutes with a portadrive and Bob's your uncle.
How do you handle the power getting shut off to the CPU several times a day as the car is driven? You can't let it run all the time, it may be "low power", but it's not "no power". If you wait 10 - 20 seconds for it to boot every time you start up the car, then you miss the video of me having some car slam into me when I'm pulling out of the driveway.
Re: (Score:3)
Deep cycle battery and a split-charging relay. If I'm leaving the vehicle parked up for more than a day or so, I'll just power all the computery stuff off.
Re: (Score:2)
Deep cycle battery and a split-charging relay. If I'm leaving the vehicle parked up for more than a day or so, I'll just power all the computery stuff off.
A Bobcat E-350 system including power supply is going to draw around 16 watts when idle, so figure 1.5 amp @ 12V. If you want it to last a day or so (2 days?) you'll need a 72 Amp-hour battery, but you won't want to discharge it too deeply, so let's go with a 90 amp-hour battery to be safe. So you're talking about a $200, 70 lb battery that's bigger than your car battery just to keep this thing powered for 2 days. That's a lot of extra weight to carry around just to run a camera.
Re: (Score:2)
I'm pretty sure you could do some suspend magic to make it draw less power, and I can't really think of any reason why you'd need to have it sitting idle-but-powered with the engine off for more than a couple of hours.
A 90Ah battery is fairly small and inexpensive, and certainly smaller than the existing battery in my car. It's certainly not heavy, compared to the rest of the stuff I carry about - I'm not sure what an "lb" is but the 110Ah battery for the car is about 30kg.
Re: (Score:3)
60lb (~5 stone to put it in units you can understand)
A whatnow? Presumably that depends on the size of stone, and what sort of rock it's made of?
Re: (Score:3)
60lb (~5 stone to put it in units you can understand)
A whatnow? Presumably that depends on the size of stone, and what sort of rock it's made of?
Huh, you'd think that someone from the UK would be familiar with Stone. It may not be as common as it used to be, but my wife's Scottish grandma still uses it.
Re: (Score:2)
The same way computer based metal detectors work. (Those things you walk though? Many models have a COTS PC in the top of th arch!)
Simply pop in a pci card with a boot rom. Or, just replace the system rom completely.
System can by in a ready state in mere seconds. (4 or 5.) About the time between turning the key, and moving the shifter.
Basically, the rom just loads a minimal system state, then "resumes". Bonus if the added rom is really button cell powered SRAM, the carputer has fail over internal emergency
Re: (Score:3)
Re:This solves what? (Score:5, Informative)
Presumably you would have to enter your passphrase before recording can commence. Thus, you enter the passphrase before backing out of the driveway. With a "carputer" you may be able to enter the passphrase over bluetooth or wifi from your smartphone.
Though a small screen with some beeps reminding you to enter the passphrase each time the car was turned on would help you do it every time. Might have BT turned off on your phone and thus not get the notification.
Who wants to enter a 20 character password every time you start your car? Just use public key cryptography to encrypt the data in the car, and keep your private key somewhere safe where you can decrypt the video.
Re: (Score:2)
If the hardware crypto is confiscated, won't it have the private key?
Not if you don't store it on the device - with public key cryptography you can encrypt with your public key (and you can give that public key to the world), but only your private key can decrypt, which you've stored someplace safe.
Re:asymetric cryptography (Score:4, Interesting)
You can't be compelled to produce a 'password' or combination, but you can be compelled to produce a physical key to a safe, or for instance your fingerprint to unlock your fingerprint encrypted laptop.
Does this 'private key' count as a password or a key from a legal perspective?
Re: (Score:2)
That sounds like a distinction between the authentication concepts of "what you are" (fingerprint, retina scan, dna) "what you have" (physical key, smartcard) vs "what you know" (password).
I'd have a feeling that it would come down to a "reasonable person" standard. For example, would a reasonable person be able to memorize a 2048 bit RSA key? If not, then that key goes from being something you know to something you have.
Ultimately that would be up to the courts to decide, but in my objective opinion, that'
Re: (Score:2)
Wheeeee
Re: (Score:3)
post traumatic stress injury is a wonderful thing... makes you forget all sorts of shit.
Re: (Score:2)
would a reasonable person be able to memorize a 2048 bit RSA key?
Depends. Maybe the private key is a hash of, say, the US Constitution. My knowledge of encryption is pretty much non-existent, so I'm afraid I do not know how public/private keys are generated, and if it is possible to take a given private key and work backwards to produce a public key.
If not, then that key goes from being something you know to something you have.
But its location is a "something you know". If you are arrested while carrying a set of physical keys, is it ok for you to remain silent on what each key goes to? If so, I would think that it should also be ok for you to
Re: (Score:2)
in the United States, you cannot be compelled to incriminate yourself, that's true enough. It used to be the same in Britain as well, until recently: precedent has it that someone was ordered by the Court to divulge a password to her laptop. She said she couldn't remember. She was sent to prison "until her memory improves".
She spent fourteen months inside.
No, I don't have a citation. Just something I'm hearing of more and more. Britain is setting a fine example as a Constitutional Monarchy*/Republic*/Democr
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
I don't use passwords, you insensitive clod.
Re: (Score:2)
I'd rather use HTTP PUT to store the files. I'd rather it just delete from the upload directory as soon as encryption is done. I'd rather use a file system with a security erase feature. I'd rather then further upload the encrypted directory to my server instance which allows some otner server instances elsewhere to pull the files, without any logging.
Re: (Score:3)
Are you sure there is no back door in it?
Re: (Score:2)
yes, something small LIKE the raspberry Pi, but something that has enough power to encode and encrypt a real time video stream. I don't think rPI has hardware assisted encryption or encoding, so I doubt it could do the job.
The video camera for the Raspberry Pi is reported to be able to record 1080p at 30 frames/second:
http://venturebeat.com/2013/02/06/raspberry-pi-camera-module/ [venturebeat.com]
I don't know if there's enough left over to do encryption at the same time, but maybe you could cut the frame rate in half and record 15 frames/second to allow more time for encryption. 15fps (or 1 frame eery 66ms) is probably good enough for a car cam.
Re: (Score:3)
If you wish not to be impersonated, perhaps you would avoid posting anonymously?