Plausible Deniability

In the modern day and age where the most mundane material is considered illegal (see the "tony the tiger" case), hiding illegal material is a legitimate reason to use it.

I remember this case - absolutely DISGUSTING behaviour by the CPS and police trying to ruin an innocent man's life. If you think you have nothing to hide and the authorities have your best interests at heart, just read the details of this case. They desperately tried to pin anything they could on this guy after the child porn they went looking for on his pc didn't exist.
 
mbcn1086l.jpg
 
I've recovered files that have been lost before with some software. To actually get rid of a file you need to overwrite it loads of times I think.

Recovering deleted files is possible only IF the physical space on the disc that they occupied has not been written to with another file. Some computer forensics people try to perpetuate a myth that they can recover data which has been deleted AND has since been overwritten again with something else.
 
edit: I wonder if this thread will turn out like the other one where someone in Computer Forensics was insisting that data could be recovered from a HDD even if it had been fully overwritten and magically increase your HDD space seven-fold... Can't find it now :confused:

That was me, and it was increasing space 256 times, 7 times is only with older drives.

I can't believe you've never heard of that capability? :confused:
 
FTK (Forensic tool kit) can see past these kind of shenanigans, trucrypt or not, there are a number of ways to identify file structure and 'hidden' partitions.

if its on there, it can be read, only in some instances of time critical forensics will they fail to do so.

Link:http://accessdata.com/products/computer-forensics/ftk

if this fails i play some funky drum music, with zoom shots of me looking at your hard drive with narrow eyes, 20 secs later i have the lot off there.

enter Grisham/

if you want to 'secure erase' a drive? 6 inch nail and a hammer, four blows round the disc areas, all good
 
Last edited:
Screw all of this

- Get a plastic cooler casing from a large GFX card and attach it to a small gfx.

- Place a Raspberry Pi inside with a 32gb SD, usb Wifi dongle and bluetooth dongle.

- Connect the Pi to the phono out on the gfx card, for extra security place a small pin-hole latching switch in line with the Pi 5v power input.

- Power the Pi via the 5v pin from a molex connector, made to look like an additional PSU connection for the GFX.

- For audio, discreetly wire up to the green audio out on the back of the main PC motherboard, you can connect both together.

- To turn on simply boot your PC, attach your monitor to the phono video out and use a paperclip to boot the Raspberry Pi.

I see no flaws to this plan.
 
Screw all of this

- Get a plastic cooler casing from a large GFX card and attach it to a small gfx.

- Place a Raspberry Pi inside with a 32gb SD, usb Wifi dongle and bluetooth dongle.

- Connect the Pi to the phono out on the gfx card, for extra security place a small pin-hole latching switch in line with the Pi 5v power input.

- Power the Pi via the 5v pin from a molex connector, made to look like an additional PSU connection for the GFX.

- For audio, discreetly wire up to the green audio out on the back of the main PC motherboard, you can connect both together.

- To turn on simply boot your PC, attach your monitor to the phono video out and use a paperclip to boot the Raspberry Pi.

I see no flaws to this plan.

Forensics open computer, notice unusual wiring, find raspberry pi, game over.
 
FTK (Forensic tool kit) can see past these kind of shenanigans, trucrypt or not, there are a number of ways to identify file structure and 'hidden' partitions.

if its on there, it can be read, only in some instances of time critical forensics will they fail to do so.

Link:http://accessdata.com/products/computer-forensics/ftk

if this fails i play some funky drum music, with zoom shots of me looking at your hard drive with narrow eyes, 20 secs later i have the lot off there.

enter Grisham/

if you want to 'secure erase' a drive? 6 inch nail and a hammer, four blows round the disc areas, all good
No...
http://www.truecrypt.org/docs/?s=hidden-volume
Truecrypt hidden volumes cannot be detected at all. Neither can a hidden OS as it's just a hidden volume essentially.
 
For the people that say a data can be recovered even if overwritten once, can you explain the following:

Essentially data is 1s and 0s in it's base form. To keep this simple:

If I have data which is in the form "10011001101101" and then I delete it then it is possible this can be recovered. However if this exact sector is overwritten in some way so it now reads "110010001111" then could you explain how you can recover the original data that existed there in the first place?
 
Forensics open computer, notice unusual wiring, find raspberry pi, game over.

The only wires going to it would be the molex connector for the GFX, you could run the audio/video through the hdmi rather than wiring into the main MB's audio port thinking about it.

Also, you could have a program running on the Pi that formats the SD card and any other storage on it if you don't type in the password correctly on start up, or something like that.
 
FTK (Forensic tool kit) can see past these kind of shenanigans, trucrypt or not, there are a number of ways to identify file structure and 'hidden' partitions.

if its on there, it can be read, only in some instances of time critical forensics will they fail to do so.

Link:http://accessdata.com/products/computer-forensics/ftk

if this fails i play some funky drum music, with zoom shots of me looking at your hard drive with narrow eyes, 20 secs later i have the lot off there.

enter Grisham/

if you want to 'secure erase' a drive? 6 inch nail and a hammer, four blows round the disc areas, all good

You can't find a hidden encrypted partition. The data is indistinguishable from random data.

There *are* programs which *try* to detect hidden, encrypted partitions.

They have been tested and reviewed. The findings? When fed drives with random data, these programs regularly "found" hidden partitions that *weren't actually there*.

In other words, like an AV program set to aggressive/strict scanning, these programs create far too many "false postitives" to be used as evidence against you.

It would be like a lie detector that would signal a lie 8 times out of 10 when being told nothing but the truth. Absolutely useless.
 
Back
Top Bottom