Encryption is difficult to implement and hard to use correctly.  As a result, vendor and user mistakes provide several methods for recovering passwords based on the type of protection used. Often times, there are unencrypted copies of the target file scattered throughout the system making it unnecessary to even break the encryption. Also, the court may order the user to surrender all passwords for the computer in question.