• There has been a recent cluster of spammers accessing BARFer accounts and posting spam. To safeguard your account, please consider changing your password. It would be even better to take the additional step of enabling 2 Factor Authentication (2FA) on your BARF account. Read more here.

Hard drive shredders

So, you're saying, that if the Feds come after me for something chickenshit like boinking the lady that sets up the garbage pickup for my neighborhood, and I might have gotten an extra garbage pickup for free, that when they go on the snipe hunt looking to fry someone for something, they'll find all those BARF posts that I didn't hit send on, that might have violated the TOS?

Dood just wait till some malware puts child porn on your drive without telling you and them informs the fbi.

This is why I am using more often then not a thumb drive with Ubuntu on it so there isnt a trace of anything. Im not paranoid of what I do online cause there is nothing to hide but what someone on the outside can do to make it look like I did something nasty and illegal while putting it on my hard drive.
 
uuuh, it's not like they do it voluntarily... it goes like this

nock nock

- answer door

yes?

-this is the FBI, move over we're taking your shit


you don't have time to wipe files unless you were on top of your secret shit from the get go... in which case the FBI wouldn't be nocking on your door

We could go all James Bond and have a red button by the door that fires a bullet into the drive when you press the red button.
 
Dood just wait till some malware puts child porn on your drive without telling you and them informs the fbi.

This is why I am using more often then not a thumb drive with Ubuntu on it so there isnt a trace of anything. Im not paranoid of what I do online cause there is nothing to hide but what someone on the outside can do to make it look like I did something nasty and illegal while putting it on my hard drive.

Holy hell that's a terrifying possibility. You could truly ruin somebody's life that way....and have a very real chance of it working with little to no real risk to yourself.

:|

Fuck.
 
Holy hell that's a terrifying possibility. You could truly ruin somebody's life that way....and have a very real chance of it working with little to no real risk to yourself.

:|

Fuck.

yep, this too

Barry Ardolf, 46, repeatedly hacked into his next-door neighbors’ Wi-Fi network in 2009, and used it to try and frame them for child pornography, sexual harassment, various kinds of professional misconduct and to send threatening e-mail to politicians, including Vice President Joe Biden.

His motive was to get back at his new neighbors after they told the police he’d kissed their 4-year-old son on the lips.
 
We could go all James Bond and have a red button by the door that fires a bullet into the drive when you press the red button.

Methinks the alphabet agencies have the technology and means to capture complete system images silently and remotely, no real need to gain physical access to the drive anymore, but that's just conjecture.

Remember, the feds had a Stingray back in '95 when they busted Kevin Mitnick....their technology is at least 10+ years ahead of what is commonly available today...

I mean....if I was head of DEA/FBI/CIA I'd want a tool that could do so; and where there is a will, there is a way.
 
uuuh, it's not like they do it voluntarily... it goes like this

nock nock

- answer door

yes?

-this is the FBI, move over we're taking your shit


you don't have time to wipe files unless you were on top of your secret shit from the get go... in which case the FBI wouldn't be nocking on your door

Except in Paula Broadwell's case, she was given a pre-arranged time when they would be coming over. And yet they still found evidence of "classified files" on her machine, which leads me to believe that she didn't shred.
 
She may have not been trying to hide anything at all.

My theory is that she might have had "derived info". Meaning that she may have taken notes on things that were classified. That occurs every day in the normal line of work. The tricky part is knowing which of the notes need to be protected and which do not. It is not nearly as straightforward as you'd think when some aspects may be unclassified but when combined with other info, it does become classified etc.

This could lead her to have notes from interviews etc which she pushed the limits a little too far, or inadvertently crossed the line.

Then another case where in her personal line of info-gathering work, she might have gathered unclassified info from several sources which when combined together meet the criteria to be classified.

However, it is likely that you wouldn't have investigators claiming that they found things so quickly if they had to dig through unmarked information to determine the classification levels.

There's also the case of classified info which is leaked through illicit means (wikileaks) which technically is still classified even though it is now in the public domain.

It isn't necessarily as straightforward as the sound bites make it out to be, and there are lots of gotchas. Kinda like a lot of the constructive intent in gun legislation.
 
Thinking that anyone can easily get their hands on a mostly cohesive set of data after it's been rewritten 10x, is just delusional. Data storage is increasingly dense and as any layperson might infer, when you have exponential growth in miniaturization recovery after willful destruction becomes substantially more difficult.

Nor would I buy that the FBI can really do much of anything at a truly forensic hardware level, I would bet that 99% of their "forensic" efforts are basically extracting storage devices, mounting read only and cloning, then pushing a giant red button, whereby some clunky but extremely expensive analysis software designed by a contractor does it's magic by pulling and reconstructing deleted inodes, checking cache locations, etc. In some cases they can probably pop the platters out and interrogate with a custom controller to go a bit deeper, but with a thorough wipe I bet the amount of recoverable data would be in the single percent range. I'm pretty sure the brightest and best in deep system design don't head to the FBI.

The real enemies of people who want privacy are flawed software implementation, and lax operational security. That is, your wiper doesn't actually complete the job or did it poorly, or you never delete anything because your 2 TB hard drive is effectively infinite in size for your needs. As well, cloud storage is increasingly efficient and as you see with gmail, it's possible to store things basically forever at this point. You should assume that anything unencrypted in the cloud that you delete will have 3-10 copies floating around, any of which may persist for over a year.

It's possible and probable that the NSA or the CIA possess more advanced interrogation technologies, but the processes in these cases are likely very labor intensive and not scale-able, and probably only used in instances of national interests. A more likely strategy is that these agencies have spent billions of dollars designing systems to listen to traffic across the internet and utilize sophisticated machine learning to pre-emptively collect and collate data of interest. Then, when they find your computer, they just need to find data fragments (traces of web history, browser user-agent and installed plug-ins that are sent in HTTP headers) that links your data to their data, and they could fill in alot of the missing pieces.
 
A more likely strategy is that these agencies have spent billions of dollars designing systems to listen to traffic across the internet and utilize sophisticated machine learning to pre-emptively collect and collate data of interest. Then, when they find your computer, they just need to find data fragments (traces of web history, browser user-agent and installed plug-ins that are sent in HTTP headers) that links your data to their data, and they could fill in alot of the missing pieces.

:|

http://www.wired.com/dangerroom/2012/11/russia-surveillance/all/
 
Can they discover WHEN you shredded? Even if the shredding app is on an external drive?

Maybe Paula was worried that if she shredded, they'd find out when she last did it, and she would look suspicious.
 
we have an actual hard drive shredder.

you put the hard drive in and it comes out in little metal bits.
 
Can they discover WHEN you shredded? Even if the shredding app is on an external drive?

Maybe Paula was worried that if she shredded, they'd find out when she last did it, and she would look suspicious.

Ummm... you're aware shredding is not a program but an actual physical shredder that destroys the drive into a million pieces, right? :|

[youtube]sQYPCPB1g3o[/youtube]
 
Isnt this where TOR Browser comes into play? Browse anonymously? I tired it it Google does not like it. Makes youtubing and searching very tough.
 
TOR will only hide your IP and location for the site you are visiting. If you are visiting kiddie porn the files are still on your computer and can be found if they take and search it.
 
Ummm... you're aware shredding is not a program but an actual physical shredder that destroys the drive into a million pieces, right? :|

Um, you're aware that "shredder" is a term commonly used by the software applications this thread is about, right? :|
 
Back
Top