CodeMonkeyZ think the auditors will be able to easily crack the password
(media.greatawakening.win)
? Notable
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (115)
sorted by:
you would be surprised, most hard drives keep data until it is overwritten no matter what because its a lot more efficient that way and a log of actions would always be present because its OS, unless the data containing parts were shredded or filled with junk they will be able to at minimum rip pieces of data out of it even if they lacked the password and just had parts
I realize that, which is why I'm surprised anything incriminating would be written to the hard drive of any machine that was designed to commit crime.
I’m not sure what you mean. How is this even possible?
It would depend on if the hard drive or flash memory was designed so you could specify the exact sector that data was being written to, to ensure only one copy only existed because often when you save changed to a document, the hard drive will just flag the storage space that the document previously occupied as vacant and then write the updated document to a new location on the hard drive... and those older versions of the document can often be retrieved using special software.
This is why Hillary Clinton used BitBleach on her devices: because it's specialized software designed to remove EVERYTHING, all data fragments that could possibly be used to recreate documents in part or in whole.
Yeah I think it would be possible for simple compute/tallying operations to be held in a sort of RAM-like memory and even processed (extremely quickly given RAM's bandwidth) before being written to anything with storable memory.
It's sort of how our computers work already, but the RAM cache/load-use ratio compared to the HDD storage media-use ratio is inverted in this case.
This is just a theory, but also one based on tech we already have and have had for some time, just set up with a different use-case in mind (handling essentially untraceable data processing/compute).
That said, the algorithms needed to be accessed from somewhere, but if they were clever (ha) then they would have used the backdoor/internet connection for that, possibly making that part untraceable.
We shall see, because I don't think they are this clever, but then again these evil bastards have unlimited money and have captured some of our species' most brilliant minds in their coercion.
Luckily, we already know who wins, we just don't know exactly how we get there; NCSWIC.
Another example: the BTK Strangler was caught from the embedded metadata on a floppy disk that traced it to his name and church.
I get that. What I’m saying is how is it possible not to leave a trace of evidence of wrongdoing. Server logs can be rewritten, yes. But what executable was used? Now that I’m thinking about it, having a usb drive locally would allow an environment to create fraud without leaving any trace on the host server. Does that sound accurate? A stand alone machine can’t erase everything. Unless it’s straight up mission impossible style like another commenter mentioned.
Talk to Paul Combetta about how he discovered via Reddit that Bleach Bit was the only way to obscure HRC's illicit email account from subpoenaed data.
Spez: his Reddit handle was u/Stonetear and that revelation was how I ultimately ended up on the Trump Train.
I remember that ordeal. Now, do you remember who it was that discovered Stonetear and who caught Stonetear deleting his reddit trail in real time?
Hint: it was a girl and I used to follow her on Twitter before the purge.
You are correct but it depends on the file system. NTFS (windows) and HFS (MacOS) operate that way but ext4 (the native file system for most linux distributions) is not recoverable: once the file is deleted it is gone.
Of course this assumes that logs were enabled and written to disc in the first place to be recovered.