this post was submitted on 05 Feb 2026
159 points (98.8% liked)

Greentext

7725 readers
696 users here now

This is a place to share greentexts and witness the confounding life of Anon. If you're new to the Greentext community, think of it as a sort of zoo with Anon as the main attraction.

Be warned:

If you find yourself getting angry (or god forbid, agreeing) with something Anon has said, you might be doing it wrong.

founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] trxxruraxvr@lemmy.world 9 points 5 hours ago (2 children)

They use forensic tools to clone the RAM before moving it. Probably depends on exploits so whether it will work may depend on your OS, but they have access to the hardware so there are a lot of possibilities.

[–] SirHaxalot@nord.pub 8 points 5 hours ago (2 children)

Is this actually practically achievable or mostly theoretical in a lab? Is it confirmed that the cops have actually managed to do this?

[–] Archer@lemmy.world 3 points 1 hour ago

You can do this for servers. Desktops would be no problem

[–] hector@lemmy.today 1 points 1 hour ago

For password guessing they make clones of the computer so they can make countless instances of it to endlessly guess the password at the speed of dickheads to get around the systems cutting the guesser off after a number of attempts.

[–] B0rax@feddit.org 3 points 4 hours ago (1 children)

At least in Germany, I would be surprised if the cops could point to the RAM inside a computer. They will not open it before they take it with them.

[–] LH0ezVT@sh.itjust.works 4 points 3 hours ago

Careful. There are levels to it, and from stories that I heard, those levels don't always communicate with each other. If you get the regular "normal cops", then no, they won't know anything more than the average joe about computers.

If get in deep enough shit, you might get a visit from the specialised cops, either the state or federal variety, and those guys know what they are doing.