“Yes, agreed, but there are times when one may have to take some toys for business reasons.”
Here’s a question: Say you work for a Defense contractor and the Thugs Standing Around (TSA) demands your encryption key and then your passwords to your company device...do you get prosecuted or fired for doing so?
And say you just work for a private firm - can they fire you for handing over access to their networks when the thugs demand it?
I work for a large company, and if something like that were to happen, I’d let them in and notify my IT guys instantly. The key the thugs hold would be worthless inside of 1/2 hour. Not perfect, but it would keep me out of both fires. I don’t get beaten up by the thugs and I don’t get fired.
Companies have contingency plans, and large companies have had a lot of “events” like this key-grabbing business. Every time a laptop gets stolen, for example (usually by the same Thugs Standing Around).
The answer is that you are toast in those situation.
That said, the Cryp tool I referred too, allows a user under those situations to turn over the password, and even then there is a hidden place to keep the secure information that is not ‘visible’ to the casual lurker.
Granted, someone familiar with forensics in this area would know where to look (and they would not need the password to begin with).
Seems as if, if I were a hierarch in the ChiCom BuDer or the Russian FSB (KGB) or a private industrial-spying firm, I'd want a few guys working for me at TSA, what do you think?