Converting the data to an unusable form
You said it yourself: "Converting". But it was unusable before (ie., encrypted) and is still encrypted. Hence, no meaningful conversion took place.
How about this: You could set up the system to unpack itself but with an algorithm that takes 20 years. It was locked before and now it is decrypting itself. You were asked to open it and you did.
All good things take time...
That won't help you. Unless the "wipe" included fake usage and history, that's tampering with evidence and a crime all its own.
I think you have a good point that wiping a locked device might be construed as tampering with evidence. But what if it just reencrypted it a second time, maybe even with a random password but one you just don't know ?
IANAL but you didn't erase anything, it was locked before and now it is still locked. Maybe even do it so they could brute force in 10-20 years time?
Conveniently after the statute of limitations has run out.
should be suing for 2 million euros over this copyright beach?.
I think a copyright beach may well be worth 2 million euros.
Funny how these "Terrorist tracking programs" fail to track the US government, the Saudi government and a bunch of other western governments when these happily finance terrorism. But god forbid you try to rent a US movie with a foreign credit card to watch on Netflix or Amazon Prime, you terrorist you.
whether one agrees with him/her or not, who the hell marked this as a troll ?
There is a great deal of evidence that the US and SA funded terrorists.
I thought Slashdot was here to encourage exchange of opinions, even if unpopular with people living in the US or Saudia Arabia...
Every antivirus tool probably has a missive database of every known virus, even from 20 years ago it's checking every file against (with any hope a file hash binary search).
Could you please replete that?
"I may kid around about drugs, but really, I take them seriously." - Doctor Graper