• Kairos@lemmy.today
    link
    fedilink
    arrow-up
    35
    ·
    4 days ago

    This person should also turn off their computer and remove the RAM so it’s zeroed out if it gets siezed.

    • [object Object]@lemmy.world
      link
      fedilink
      arrow-up
      7
      ·
      4 days ago

      This is where I think NFC may finally be useful. If cops show up, I slide my phone by a hidden NFC tag, and an http request is sent to my desktop machine. Everything incriminating is wiped and the computer is turned off, before the cops can walk to the room.

      • Ilovethebomb@sh.itjust.works
        link
        fedilink
        arrow-up
        2
        arrow-down
        1
        ·
        3 days ago

        As with many other suggestions made here, if it can be demonstrated in court that you had a system like this set up, it’s going to be a really bad look for you.

        • [object Object]@lemmy.world
          link
          fedilink
          arrow-up
          4
          arrow-down
          1
          ·
          3 days ago

          You see, I’m one of those mysterious creatures who live in the lands outside the US. I know it’s gonna be a shock, but we do exist.

          As I already explained in the thread, where I am, the goal is to not give cops any material to work with, so they find someone else to harass. All the really serious data is hidden better than this.

      • Valmond@lemmy.dbzer0.com
        link
        fedilink
        arrow-up
        3
        ·
        3 days ago

        Better to have a “spare” pc under your desk, with the real one hidden.

        Cheaper and you won’t accidentally wipe your pc all the time.

        But what are you all having on up your PCs??

        • [object Object]@lemmy.world
          link
          fedilink
          arrow-up
          5
          ·
          3 days ago

          Where I am, having a networked machine cemented up in the wall is the national pastime, for when a bunch of masked policemen show up with automatic rifles. As for what’s on that machine, that’s another national sport because no one is paying for those bastards to harass businesses.

      • a4ng3l@lemmy.world
        link
        fedilink
        arrow-up
        11
        ·
        4 days ago

        Unless you have tied the NFC to an arc wielding torch how would proper data disposal process runs its course fast enough? You live in a manor with very long hallways?

        • [object Object]@lemmy.world
          link
          fedilink
          arrow-up
          7
          ·
          4 days ago

          Most of really nasty data is text or a few questionable apps, and should take very little time. Video and audio present a problem, but I think they can be speedily wiped by nuking the metadata parts, making recovery and identification difficult. Not sure how resilient modern formats are to data loss, but afaik e.g. AVI is quite reliant on the description of the stream (which iirc is inconveniently placed at the end of the file).

          • three@lemmy.zip
            link
            fedilink
            arrow-up
            3
            ·
            4 days ago

            The boys and I have a racist group chat and my hard drive is full of kiddie porn and audio recordings of women peeing in public restrooms.

            lmfao you’re going to need a more robust destruction plan

          • a4ng3l@lemmy.world
            link
            fedilink
            arrow-up
            6
            ·
            4 days ago

            Nha my dude you’re lying to yourself if you think that it is nearly enough to survive the level of forensics that will happen in case of a motivated investigation. You need the whole multipass erasure and overwriting or you’re toast. It takes hours…

            • [object Object]@lemmy.world
              link
              fedilink
              arrow-up
              3
              ·
              edit-2
              4 days ago

              First of all, it doesn’t take hours to overwrite several text files and a few binaries. Second of all, I think I know better what my local cops would do. It’s not NSA or Interpol. Lastly, this hypothetical obviously excludes stuff after which ‘motivated investigation’ might come. That kind of data lives in encrypted files tucked in odd places, and even that can probably be wiped from the directory entry like it was never there.

              • a4ng3l@lemmy.world
                link
                fedilink
                arrow-up
                4
                ·
                4 days ago

                Erh well, it takes hours with proper tooling with which I have first hand experience… and just as much experience with various police forces… admittedly my knowledge is limited to Europe and LA on that topic.

                For reference I saw them deploy very serious means for stuff from csam to piracy so be careful on how you perceive their willing to be major annoyances.

                But hey, this is my work experience I offer, you don’t take it it’s not an issue; I’m not invoicing my time anyway :)

                • [object Object]@lemmy.world
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  4 days ago

                  Around here, cops are nasty but not very brainy, hi-tek, or invested. They will be annoying in more brute ways. The goal is just to not give them too much material to go off, so they find someone else who’s easier to pester.

      • LH0ezVT@sh.itjust.works
        link
        fedilink
        arrow-up
        8
        ·
        edit-2
        4 days ago

        If it’s proven that you did it, you are getting locked up anyway.

        In 99% it is better to not say anything or indict yourself

        Edit: ah, misunderstood you, with “did that” you mean turn off the computer, not whatever crime you are accused of. I’d still disagree, but only based on anecdotes, go ask a lawyer, I guess

    • trxxruraxvr@lemmy.world
      link
      fedilink
      arrow-up
      26
      arrow-down
      1
      ·
      4 days ago

      Full disk encryption doesn’t help much if the pc is running anyway since the key will be in memory