this post was submitted on 05 Feb 2026
303 points (99.0% liked)
Greentext
7725 readers
1310 users here now
This is a place to share greentexts and witness the confounding life of Anon. If you're new to the Greentext community, think of it as a sort of zoo with Anon as the main attraction.
Be warned:
- Anon is often crazy.
- Anon is often depressed.
- Anon frequently shares thoughts that are immature, offensive, or incomprehensible.
If you find yourself getting angry (or god forbid, agreeing) with something Anon has said, you might be doing it wrong.
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Most of really nasty data is text or a few questionable apps, and should take very little time. Video and audio present a problem, but I think they can be speedily wiped by nuking the metadata parts, making recovery and identification difficult. Not sure how resilient modern formats are to data loss, but afaik e.g. AVI is quite reliant on the description of the stream (which iirc is inconveniently placed at the end of the file).
Nha my dude you’re lying to yourself if you think that it is nearly enough to survive the level of forensics that will happen in case of a motivated investigation. You need the whole multipass erasure and overwriting or you’re toast. It takes hours…
First of all, it doesn't take hours to overwrite several text files and a few binaries. Second of all, I think I know better what my local cops would do. It's not NSA or Interpol. Lastly, this hypothetical obviously excludes stuff after which 'motivated investigation' might come. That kind of data lives in encrypted files tucked in odd places, and even that can probably be wiped from the directory entry like it was never there.
lmfao you're going to need a more robust destruction plan
You seem to be confused about which side in my scenario is the cops.