What if it's made so it will only work if theres write privileges and must be run from exactly the same hardware?
Forensic analysis doesn't involve just turning on the computer and looking around the hard drive with windows explorer. All the things you're thinking of are software based, but if I know the encryption method I don't need to use your specially boobytrapped software to decrypt the data.