this post was submitted on 05 Feb 2026
284 points (99.0% liked)

Greentext

7725 readers
1413 users here now

This is a place to share greentexts and witness the confounding life of Anon. If you're new to the Greentext community, think of it as a sort of zoo with Anon as the main attraction.

Be warned:

If you find yourself getting angry (or god forbid, agreeing) with something Anon has said, you might be doing it wrong.

founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] kcseb@pawb.social 110 points 18 hours ago (2 children)

And here's where we introduce you to this magical term called full disk encryption!

[–] EmpatheticTeddyBear@lemmy.world 68 points 18 hours ago (4 children)

And if you use BitLocker, do NOT backup your recovery key to the cloud!

https://gizmodo.com/microsoft-reportedly-turned-over-bitlocker-encryption-keys-to-the-fbi-2000713550

Print out out, give it to a friend, don't mention it via electronic means (email, text, Snapchat, YouTube, and so on...)

[–] Gullible@sh.itjust.works 1 points 4 hours ago

Don’t print it. Your previous prints are easily retrievable

[–] msage@programming.dev 31 points 13 hours ago

And if you use BitLocker, don't!

[–] JPAKx4@piefed.blahaj.zone 1 points 6 hours ago

I think I've heard if you have a Microsoft account it automatically gets backed up

[–] turdas@suppo.fi 6 points 15 hours ago (1 children)

Even better is to memorize it.

[–] rtxn@lemmy.world 24 points 14 hours ago (4 children)

Hide it in a poem in a leather bound book at the end of a trap-filled dungeon.

[–] FerretyFever0@fedia.io 1 points 1 hour ago

Hide it in a book in a buried chest on a minecraft world 5000 blocks from spawn.

[–] idunnololz@lemmy.world 6 points 9 hours ago

I'll hide it at the end of my mix tape.

[–] Pilon23@feddit.dk 8 points 12 hours ago

Now when you say a trap-filled dungeon. What exactly do you mean?

[–] Insekticus@aussie.zone 7 points 12 hours ago

Ill be honest, this is clearly the best idea out there for passwords safety

[–] LodeMike@lemmy.today 30 points 17 hours ago (3 children)

This person should also turn off their computer and remove the RAM so it's zeroed out if it gets siezed.

[–] SlurpingPus@lemmy.world 4 points 12 hours ago (2 children)

This is where I think NFC may finally be useful. If cops show up, I slide my phone by a hidden NFC tag, and an http request is sent to my desktop machine. Everything incriminating is wiped and the computer is turned off, before the cops can walk to the room.

[–] Valmond@lemmy.dbzer0.com 1 points 5 hours ago (1 children)

Better to have a "spare" pc under your desk, with the real one hidden.

Cheaper and you won't accidentally wipe your pc all the time.

But what are you all having on up your PCs??

[–] SlurpingPus@lemmy.world 1 points 5 hours ago

Where I am, having a networked machine cemented up in the wall is the national pastime, for when a bunch of masked policemen show up with automatic rifles. As for what's on that machine, that's another national sport because no one is paying for those bastards to harass businesses.

[–] a4ng3l@lemmy.world 3 points 11 hours ago (1 children)

Unless you have tied the NFC to an arc wielding torch how would proper data disposal process runs its course fast enough? You live in a manor with very long hallways?

[–] SlurpingPus@lemmy.world 4 points 11 hours ago (2 children)

Most of really nasty data is text or a few questionable apps, and should take very little time. Video and audio present a problem, but I think they can be speedily wiped by nuking the metadata parts, making recovery and identification difficult. Not sure how resilient modern formats are to data loss, but afaik e.g. AVI is quite reliant on the description of the stream (which iirc is inconveniently placed at the end of the file).

[–] a4ng3l@lemmy.world 3 points 9 hours ago (1 children)

Nha my dude you’re lying to yourself if you think that it is nearly enough to survive the level of forensics that will happen in case of a motivated investigation. You need the whole multipass erasure and overwriting or you’re toast. It takes hours…

[–] SlurpingPus@lemmy.world 2 points 9 hours ago* (last edited 9 hours ago)

First of all, it doesn't take hours to overwrite several text files and a few binaries. Second of all, I think I know better what my local cops would do. It's not NSA or Interpol. Lastly, this hypothetical obviously excludes stuff after which 'motivated investigation' might come. That kind of data lives in encrypted files tucked in odd places, and even that can probably be wiped from the directory entry like it was never there.

[–] three@lemmy.zip 0 points 9 hours ago (1 children)

The boys and I have a racist group chat and my hard drive is full of kiddie porn and audio recordings of women peeing in public restrooms.

lmfao you're going to need a more robust destruction plan

[–] SlurpingPus@lemmy.world 2 points 9 hours ago

You seem to be confused about which side in my scenario is the cops.

[–] trxxruraxvr@lemmy.world 15 points 16 hours ago (1 children)

Full disk encryption doesn't help much if the pc is running anyway since the key will be in memory

[–] B0rax@feddit.org 9 points 16 hours ago (2 children)

How will they carry the running pc if it’s not a laptop?

[–] frog@feddit.uk 21 points 15 hours ago* (last edited 15 hours ago)

They have a battery attached to flat wires. When you give a couple millimeters of room from the plug, they insert the flat wires and the computer will be powered from the battery.

HotPlug Field Kit

If the computer is logged in, they have a USB device that mimics a mouse. It makes the mouse pointer move back and forth to prevent it from going to sleep or the screen saver.

[–] trxxruraxvr@lemmy.world 11 points 16 hours ago (2 children)

They use forensic tools to clone the RAM before moving it. Probably depends on exploits so whether it will work may depend on your OS, but they have access to the hardware so there are a lot of possibilities.

[–] SirHaxalot@nord.pub 9 points 15 hours ago (2 children)

Is this actually practically achievable or mostly theoretical in a lab? Is it confirmed that the cops have actually managed to do this?

[–] hector@lemmy.today 4 points 11 hours ago

For password guessing they make clones of the computer so they can make countless instances of it to endlessly guess the password at the speed of dickheads to get around the systems cutting the guesser off after a number of attempts.

[–] Archer@lemmy.world 4 points 12 hours ago

You can do this for servers. Desktops would be no problem

[–] B0rax@feddit.org 3 points 15 hours ago (1 children)

At least in Germany, I would be surprised if the cops could point to the RAM inside a computer. They will not open it before they take it with them.

[–] LH0ezVT@sh.itjust.works 7 points 13 hours ago (1 children)

Careful. There are levels to it, and from stories that I heard, those levels don't always communicate with each other. If you get the regular "normal cops", then no, they won't know anything more than the average joe about computers.

If get in deep enough shit, you might get a visit from the specialised cops, either the state or federal variety, and those guys know what they are doing.

[–] trxxruraxvr@lemmy.world 1 points 7 hours ago (1 children)

That's definitely the case in the Netherlands. I wouldn't trust the average cop to find the power button. But that doesn't mean the specialized teams don't have some really good ones.

[–] brotundspiele@sh.itjust.works 1 points 33 minutes ago* (last edited 32 minutes ago)

And the guys who usually search houses aren't average cops, they know how to search houses, because they search houses regularly. They've had dozens of cases in the past that couldn't be solved because someone has unplugged a pc too soon. They have regular trainings where they are updated on the newest developments. They have learned by now. We're not living in 2005 anymore and neither do the cops.

[–] Ilovethebomb@sh.itjust.works -1 points 16 hours ago (2 children)

If it can be proven you did that, that's gonna look real bad in court.

[–] mech@feddit.org 15 points 16 hours ago (1 children)

You can get in legal trouble for turning off your PC?

[–] Ilovethebomb@sh.itjust.works 2 points 14 hours ago (1 children)

There's no law against googling how to dispose of a body, but if you do, and you're a suspect in a murder, it's a real bad look for you.

Same story here. Probably legal, but definitely not a good look.

[–] msage@programming.dev 3 points 13 hours ago (1 children)

Turning off your PC makes you look bad? What the fuck.

[–] Ilovethebomb@sh.itjust.works 1 points 2 hours ago

The comment that started this was talking about removing the RAM from your computer, which would mean disassembling it.

You're a bit hard of thinking, aren't you?

[–] LH0ezVT@sh.itjust.works 6 points 14 hours ago* (last edited 13 hours ago)

If it's proven that you did it, you are getting locked up anyway.

In 99% it is better to not say anything or indict yourself

Edit: ah, misunderstood you, with "did that" you mean turn off the computer, not whatever crime you are accused of. I'd still disagree, but only based on anecdotes, go ask a lawyer, I guess