This person should also turn off their computer and remove the RAM so it’s zeroed out if it gets siezed.
Comment on The cops pay Anon a visit
kcseb@pawb.social 12 hours ago
And here’s where we introduce you to this magical term called full disk encryption!
LodeMike@lemmy.today 12 hours ago
trxxruraxvr@lemmy.world 11 hours ago
Full disk encryption doesn’t help much if the pc is running anyway since the key will be in memory
B0rax@feddit.org 11 hours ago
How will they carry the running pc if it’s not a laptop?
frog@feddit.uk 10 hours ago
They have a battery attached to flat wires. When you give a couple millimeters of room from the plug, they insert the flat wires and the computer will be powered from the battery.
If the computer is logged in, they have a USB device that mimics a mouse. It makes the mouse pointer move back and forth to prevent it from going to sleep or the screen saver.
trxxruraxvr@lemmy.world 10 hours ago
They use forensic tools to clone the RAM before moving it. Probably depends on exploits so whether it will work may depend on your OS, but they have access to the hardware so there are a lot of possibilities.
SlurpingPus@lemmy.world 6 hours ago
This is where I think NFC may finally be useful. If cops show up, I slide my phone by a hidden NFC tag, and an http request is sent to my desktop machine. Everything incriminating is wiped and the computer is turned off, before the cops can walk to the room.
Valmond@lemmy.dbzer0.com 12 minutes ago
Better to have a “spare” pc under your desk, with the real one hidden.
Cheaper and you won’t accidentally wipe your pc all the time.
But what are you all having on up your PCs??
a4ng3l@lemmy.world 5 hours ago
Unless you have tied the NFC to an arc wielding torch how would proper data disposal process runs its course fast enough? You live in a manor with very long hallways?
SlurpingPus@lemmy.world 5 hours ago
Most of really nasty data is text or a few questionable apps, and should take very little time. Video and audio present a problem, but I think they can be speedily wiped by nuking the metadata parts, making recovery and identification difficult. Not sure how resilient modern formats are to data loss, but afaik e.g. AVI is quite reliant on the description of the stream (which iirc is inconveniently placed at the end of the file).
Ilovethebomb@sh.itjust.works 11 hours ago
If it can be proven you did that, that’s gonna look real bad in court.
mech@feddit.org 11 hours ago
You can get in legal trouble for turning off your PC?
Ilovethebomb@sh.itjust.works 9 hours ago
There’s no law against googling how to dispose of a body, but if you do, and you’re a suspect in a murder, it’s a real bad look for you.
Same story here. Probably legal, but definitely not a good look.
LH0ezVT@sh.itjust.works 9 hours ago
If it’s proven that you did it, you are getting locked up anyway.
In 99% it is better to not say anything or indict yourself
EmpatheticTeddyBear@lemmy.world 12 hours ago
And if you use BitLocker, do NOT backup your recovery key to the cloud!
gizmodo.com/microsoft-reportedly-turned-over-bitl…
Print out out, give it to a friend, don’t mention it via electronic means (email, text, Snapchat, YouTube, and so on…)
msage@programming.dev 8 hours ago
And if you use BitLocker, don’t!
JPAKx4@piefed.blahaj.zone 1 hour ago
I think I’ve heard if you have a Microsoft account it automatically gets backed up
turdas@suppo.fi 9 hours ago
Even better is to memorize it.
rtxn@lemmy.world 9 hours ago
Hide it in a poem in a leather bound book at the end of a trap-filled dungeon.
idunnololz@lemmy.world 4 hours ago
I’ll hide it at the end of my mix tape.
Pilon23@feddit.dk 7 hours ago
Now when you say a trap-filled dungeon. What exactly do you mean?