• Kairos@lemmy.today
    link
    fedilink
    arrow-up
    39
    ·
    1 day ago

    This person should also turn off their computer and remove the RAM so it’s zeroed out if it gets siezed.

    • trxxruraxvr@lemmy.world
      link
      fedilink
      arrow-up
      27
      arrow-down
      1
      ·
      1 day ago

      Full disk encryption doesn’t help much if the pc is running anyway since the key will be in memory

        • frog@feddit.uk
          link
          fedilink
          arrow-up
          33
          ·
          edit-2
          1 day ago

          They have a battery attached to flat wires. When you give a couple millimeters of room from the plug, they insert the flat wires and the computer will be powered from the battery.

          HotPlug Field Kit

          If the computer is logged in, they have a USB device that mimics a mouse. It makes the mouse pointer move back and forth to prevent it from going to sleep or the screen saver.

        • trxxruraxvr@lemmy.world
          link
          fedilink
          arrow-up
          13
          ·
          1 day ago

          They use forensic tools to clone the RAM before moving it. Probably depends on exploits so whether it will work may depend on your OS, but they have access to the hardware so there are a lot of possibilities.

          • Sir. Haxalot@nord.pub
            link
            fedilink
            English
            arrow-up
            11
            ·
            1 day ago

            Is this actually practically achievable or mostly theoretical in a lab? Is it confirmed that the cops have actually managed to do this?

            • hector@lemmy.today
              link
              fedilink
              arrow-up
              7
              ·
              1 day ago

              For password guessing they make clones of the computer so they can make countless instances of it to endlessly guess the password at the speed of dickheads to get around the systems cutting the guesser off after a number of attempts.

          • B0rax@feddit.org
            link
            fedilink
            arrow-up
            3
            ·
            1 day ago

            At least in Germany, I would be surprised if the cops could point to the RAM inside a computer. They will not open it before they take it with them.

            • optional@sh.itjust.works
              link
              fedilink
              arrow-up
              3
              ·
              13 hours ago

              If a cop acts as if they don’t have a clue, you have to be extra careful. They might be trying to lull you into a false sense of security. They’ve been working with a lot of criminals before you, and most of those criminals have had computers and smartphones for 20 years now. They know what they are doing, nowadays.

            • LH0ezVT@sh.itjust.works
              link
              fedilink
              arrow-up
              13
              ·
              1 day ago

              Careful. There are levels to it, and from stories that I heard, those levels don’t always communicate with each other. If you get the regular “normal cops”, then no, they won’t know anything more than the average joe about computers.

              If get in deep enough shit, you might get a visit from the specialised cops, either the state or federal variety, and those guys know what they are doing.

              • trxxruraxvr@lemmy.world
                link
                fedilink
                arrow-up
                3
                ·
                20 hours ago

                That’s definitely the case in the Netherlands. I wouldn’t trust the average cop to find the power button. But that doesn’t mean the specialized teams don’t have some really good ones.

                • optional@sh.itjust.works
                  link
                  fedilink
                  arrow-up
                  3
                  ·
                  edit-2
                  13 hours ago

                  And the guys who usually search houses aren’t average cops, they know how to search houses, because they search houses regularly. They’ve had dozens of cases in the past that couldn’t be solved because someone has unplugged a pc too soon. They have regular trainings where they are updated on the newest developments. They have learned by now. We’re not living in 2005 anymore and neither do the cops.

    • [object Object]@lemmy.world
      link
      fedilink
      arrow-up
      7
      ·
      1 day ago

      This is where I think NFC may finally be useful. If cops show up, I slide my phone by a hidden NFC tag, and an http request is sent to my desktop machine. Everything incriminating is wiped and the computer is turned off, before the cops can walk to the room.

      • Ilovethebomb@sh.itjust.works
        link
        fedilink
        arrow-up
        1
        arrow-down
        1
        ·
        10 hours ago

        As with many other suggestions made here, if it can be demonstrated in court that you had a system like this set up, it’s going to be a really bad look for you.

        • [object Object]@lemmy.world
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          10 hours ago

          You see, I’m one of those mysterious creatures who live in the lands outside the US. I know it’s gonna be a shock, but we do exist.

          As I already explained in the thread, where I am, the goal is to not give cops any material to work with, so they find someone else to harass. All the really serious data is hidden better than this.

      • Valmond@lemmy.dbzer0.com
        link
        fedilink
        arrow-up
        3
        ·
        18 hours ago

        Better to have a “spare” pc under your desk, with the real one hidden.

        Cheaper and you won’t accidentally wipe your pc all the time.

        But what are you all having on up your PCs??

        • [object Object]@lemmy.world
          link
          fedilink
          arrow-up
          2
          ·
          18 hours ago

          Where I am, having a networked machine cemented up in the wall is the national pastime, for when a bunch of masked policemen show up with automatic rifles. As for what’s on that machine, that’s another national sport because no one is paying for those bastards to harass businesses.

      • a4ng3l@lemmy.world
        link
        fedilink
        arrow-up
        8
        ·
        1 day ago

        Unless you have tied the NFC to an arc wielding torch how would proper data disposal process runs its course fast enough? You live in a manor with very long hallways?

        • [object Object]@lemmy.world
          link
          fedilink
          arrow-up
          6
          ·
          24 hours ago

          Most of really nasty data is text or a few questionable apps, and should take very little time. Video and audio present a problem, but I think they can be speedily wiped by nuking the metadata parts, making recovery and identification difficult. Not sure how resilient modern formats are to data loss, but afaik e.g. AVI is quite reliant on the description of the stream (which iirc is inconveniently placed at the end of the file).

          • a4ng3l@lemmy.world
            link
            fedilink
            arrow-up
            5
            ·
            23 hours ago

            Nha my dude you’re lying to yourself if you think that it is nearly enough to survive the level of forensics that will happen in case of a motivated investigation. You need the whole multipass erasure and overwriting or you’re toast. It takes hours…

            • [object Object]@lemmy.world
              link
              fedilink
              arrow-up
              2
              ·
              edit-2
              22 hours ago

              First of all, it doesn’t take hours to overwrite several text files and a few binaries. Second of all, I think I know better what my local cops would do. It’s not NSA or Interpol. Lastly, this hypothetical obviously excludes stuff after which ‘motivated investigation’ might come. That kind of data lives in encrypted files tucked in odd places, and even that can probably be wiped from the directory entry like it was never there.

              • a4ng3l@lemmy.world
                link
                fedilink
                arrow-up
                3
                ·
                22 hours ago

                Erh well, it takes hours with proper tooling with which I have first hand experience… and just as much experience with various police forces… admittedly my knowledge is limited to Europe and LA on that topic.

                For reference I saw them deploy very serious means for stuff from csam to piracy so be careful on how you perceive their willing to be major annoyances.

                But hey, this is my work experience I offer, you don’t take it it’s not an issue; I’m not invoicing my time anyway :)

                • [object Object]@lemmy.world
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  22 hours ago

                  Around here, cops are nasty but not very brainy, hi-tek, or invested. They will be annoying in more brute ways. The goal is just to not give them too much material to go off, so they find someone else who’s easier to pester.

          • three@lemmy.zip
            link
            fedilink
            arrow-up
            3
            ·
            22 hours ago

            The boys and I have a racist group chat and my hard drive is full of kiddie porn and audio recordings of women peeing in public restrooms.

            lmfao you’re going to need a more robust destruction plan

        • Ilovethebomb@sh.itjust.works
          link
          fedilink
          arrow-up
          6
          ·
          1 day ago

          There’s no law against googling how to dispose of a body, but if you do, and you’re a suspect in a murder, it’s a real bad look for you.

          Same story here. Probably legal, but definitely not a good look.

            • Ilovethebomb@sh.itjust.works
              link
              fedilink
              arrow-up
              1
              ·
              15 hours ago

              The comment that started this was talking about removing the RAM from your computer, which would mean disassembling it.

              You’re a bit hard of thinking, aren’t you?

              • msage@programming.dev
                link
                fedilink
                arrow-up
                2
                ·
                12 hours ago

                The comments can change the topic at hand.

                Regardless, removing RAM should change nothing after the PC was powered off.

      • LH0ezVT@sh.itjust.works
        link
        fedilink
        arrow-up
        7
        ·
        edit-2
        1 day ago

        If it’s proven that you did it, you are getting locked up anyway.

        In 99% it is better to not say anything or indict yourself

        Edit: ah, misunderstood you, with “did that” you mean turn off the computer, not whatever crime you are accused of. I’d still disagree, but only based on anecdotes, go ask a lawyer, I guess