I’ve read your current article as well as the referenced articles regarding
secure deletion, but I haven’t seen anything regarding hidden copies of files.
Maybe it’s just urban legend, but I’ve been led to believe that Windows places
copies of data in locations other than the ones that you see. That even the
so-called secure ‘wipe’ leaves other copies available to trained cyber forensic
specialists.
So you’ve also now made me question the security of my Carbonite backup.
Knowledgeable hacks like yourself and certainly law enforcement professionals
can access all of my data either by simply downloading or by especially
subpoenaing it. Or is that thinking not really ‘real’?
This question raises a number of issues that in some ways, all boil down to
“Just how paranoid are you?” And I mean that not in a negative way at
all.
The fact is that much of the data that we own can be examined by others, sometimes
incidentally, sometimes only as a matter of legal proceedings.
In this audio excerpt from a recent Ask Leo! webinar,
I’ll discuss some of the things that are worth considering if you’re at all concerned
about the accessibility of your digital life.
… and even if you’re not.
]]>
<
Hi All
First of all I have no System Restore or Hiberfill..in fact have very little of that sort of thing..what I do have is a reasonable amount of Ad blocking…Track blocking almost 100% and as regards the article very strong against lack of response to an obvious problem..And def do an Image backup at least once a week (Do blame Leo for that)..But really has saved my butt more than once
If really necessary just wipe free space by cclener (or another) usually 3 times is sufficient but use 7 if worried. Should use Ccleaner also after Sandboxie
What about Shadow Copies?
There have been several cases where the authorities have attempted to compel a suspect to reveal the password for encrypted hard drives. Leo mentioned one case; in another, the court held the suspect in contempt and the person is in jail pending appeal; in the last case, the court ruled giving a password out is tantamount to self incrimination and did not require the password to be revealed. At this point it depends on the state you live in.
I suppose you can encrypt your drive and have encrypted files within it as truecrypt suggests for plausible deniability, but that requires accessing those files only in specific ways so no trail is left. Probably a bit much of any of us.
Kevin. Great, you eliminated those 2 points of “hidden” data. That seems to indicate you want to take your data security seriously.
Here is a question for you. Do you use full disk encryption? Or does your Image copy software encrypt your backups? If not one or the other then your data is exposed that way. When the cops subpeona your computer they make it general enough that they vacuum up anything digital. That includes your backups, usb drives, and CD/DVD that even looks to be written on. Heck, if they even have a ghost of an idea that your microwave could have data on it they’ll take that too. Here is an example of a search warrant request against a student accused of hacking:
http://www.eff.org/files/filenode/inresearchBC/EXHIBIT-B.pdf
Take a look at what they asked for, they obviously have “boiler plate” text they copy down to cover everything possible: “all objects capable of storing Digital data in any form … firewalls … routers … software … hardware … computer passcodes, passwords, and/or protocols”. They totally shut this kid down. It happened to be exam time. Talk about s*****d. The basis for the charge was ludicrous, they couldn’t prove anything.
The original question states “Maybe it’s just urban legend, but I’ve been led to believe that Windows places copies of data in locations other than the ones that you see. That even the so-called secure ‘wipe’ leaves other copies available to trained cyber forensic specialists.”
I have a feeling that this is based on some scare-mongering techniques that I have seen used in “security suite” software packages. One such technique that I’ve seen (it’s been a while, so I don’t recall who was doing this) claimed that Windows kept “secret copies” of “everything” that you do on the computer — every file ever used, every website ever visited, everything of everything, for all time — and that this software was supposed to “clean up” all those “secret copies”.
Of course, we all know that keeping copies of “everything”, “forever”, is simply not physically possible without infinite storage space. But, the intended
victimscustomers weren’t mean to think that far, and simply buy because they were scared into it.Alas do not live in the USA..Still we all have to do our very best..So if we all take reasonable precautions it will make all against us far more difficult to execute..Would suggest that there are human ways to combat State ?????
I’m (from India) not clear why people should be concerned about legal authorities accessing one’s data with a court order. I’m of the opinion that an authority would approach you/your data only on legally valid reasons, especially in USA. Otherwise, there’s no reason why should anyone be concerned about that possibility. Unless one believes that any legal authority might invade privacy illegally or has done something illegal to hide, no one should be concerned. So, I’m confused.
I was really surprised that Leo went the extra mile about hiding one’s data that I am afraid that he might be construed to be one actually helping criminals. I do not find any statement in the article protecting him against this possibility.
Think K.Vee.Shanker raises some very valid points. If you do nothing wrong you should have nothing to fear from the State. My own concerns apply only to Cyber criminals and to those who would secretly invade my privacy