How do the results look if you look at granted patents?
Just curious, as I said, not at all in this field.
Converting the data to an unusable form
You said it yourself: "Converting". But it was unusable before (ie., encrypted) and is still encrypted. Hence, no meaningful conversion took place.
How about this: You could set up the system to unpack itself but with an algorithm that takes 20 years. It was locked before and now it is decrypting itself. You were asked to open it and you did.
All good things take time...
That won't help you. Unless the "wipe" included fake usage and history, that's tampering with evidence and a crime all its own.
I think you have a good point that wiping a locked device might be construed as tampering with evidence. But what if it just reencrypted it a second time, maybe even with a random password but one you just don't know ?
IANAL but you didn't erase anything, it was locked before and now it is still locked. Maybe even do it so they could brute force in 10-20 years time?
Conveniently after the statute of limitations has run out.
should be suing for 2 million euros over this copyright beach?.
I think a copyright beach may well be worth 2 million euros.
Funny how these "Terrorist tracking programs" fail to track the US government, the Saudi government and a bunch of other western governments when these happily finance terrorism. But god forbid you try to rent a US movie with a foreign credit card to watch on Netflix or Amazon Prime, you terrorist you.
whether one agrees with him/her or not, who the hell marked this as a troll ?
There is a great deal of evidence that the US and SA funded terrorists.
I thought Slashdot was here to encourage exchange of opinions, even if unpopular with people living in the US or Saudia Arabia...
"Marriage is like a cage; one sees the birds outside desperate to get in, and those inside desperate to get out." -- Montaigne