Most of really nasty data is text or a few questionable apps, and should take very little time. Video and audio present a problem, but I think they can be speedily wiped by nuking the metadata parts, making recovery and identification difficult. Not sure how resilient modern formats are to data loss, but afaik e.g. AVI is quite reliant on the description of the stream (which iirc is inconveniently placed at the end of the file).
Nha my dude you’re lying to yourself if you think that it is nearly enough to survive the level of forensics that will happen in case of a motivated investigation.
You need the whole multipass erasure and overwriting or you’re toast. It takes hours…
First of all, it doesn’t take hours to overwrite several text files and a few binaries. Second of all, I think I know better what my local cops would do. It’s not NSA or Interpol. Lastly, this hypothetical obviously excludes stuff after which ‘motivated investigation’ might come. That kind of data lives in encrypted files tucked in odd places, and even that can probably be wiped from the directory entry like it was never there.
Erh well, it takes hours with proper tooling with which I have first hand experience… and just as much experience with various police forces… admittedly my knowledge is limited to Europe and LA on that topic.
For reference I saw them deploy very serious means for stuff from csam to piracy so be careful on how you perceive their willing to be major annoyances.
But hey, this is my work experience I offer, you don’t take it it’s not an issue; I’m not invoicing my time anyway :)
Around here, cops are nasty but not very brainy, hi-tek, or invested. They will be annoying in more brute ways. The goal is just to not give them too much material to go off, so they find someone else who’s easier to pester.
Most of really nasty data is text or a few questionable apps, and should take very little time. Video and audio present a problem, but I think they can be speedily wiped by nuking the metadata parts, making recovery and identification difficult. Not sure how resilient modern formats are to data loss, but afaik e.g. AVI is quite reliant on the description of the stream (which iirc is inconveniently placed at the end of the file).
Nha my dude you’re lying to yourself if you think that it is nearly enough to survive the level of forensics that will happen in case of a motivated investigation. You need the whole multipass erasure and overwriting or you’re toast. It takes hours…
First of all, it doesn’t take hours to overwrite several text files and a few binaries. Second of all, I think I know better what my local cops would do. It’s not NSA or Interpol. Lastly, this hypothetical obviously excludes stuff after which ‘motivated investigation’ might come. That kind of data lives in encrypted files tucked in odd places, and even that can probably be wiped from the directory entry like it was never there.
Erh well, it takes hours with proper tooling with which I have first hand experience… and just as much experience with various police forces… admittedly my knowledge is limited to Europe and LA on that topic.
For reference I saw them deploy very serious means for stuff from csam to piracy so be careful on how you perceive their willing to be major annoyances.
But hey, this is my work experience I offer, you don’t take it it’s not an issue; I’m not invoicing my time anyway :)
Around here, cops are nasty but not very brainy, hi-tek, or invested. They will be annoying in more brute ways. The goal is just to not give them too much material to go off, so they find someone else who’s easier to pester.
lmfao you’re going to need a more robust destruction plan
You seem to be confused about which side in my scenario is the cops.