• FauxLiving@lemmy.world
    link
    fedilink
    arrow-up
    4
    ·
    23 hours ago

    You don’t need to do any of this.

    If your drive is not encrypted, then this won’t save you. It takes time to overwrite files and if your computer were the target of any adversary, they would simply unplug it immediately and then image it.

    If your drive is encrypted, then you can just overwrite the headers that contain the key slots. This would take hundredths of a second.

  • emberpunk@lemmy.ml
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    3
    ·
    22 hours ago

    Cool but it’s windows… If you’re going to be serious about privacy there’s a lot more that needs to be done, like switching to a Linux distro.

  • FrostyPolicy@suppo.fi
    link
    fedilink
    arrow-up
    22
    ·
    2 days ago

    Curious choice to write a c++ program for this instead of doing the same thing in a powershell script.

    One feature it should have: delete itself after running to leave no traces of such a tool.

    • rumba@lemmy.zip
      link
      fedilink
      English
      arrow-up
      4
      ·
      1 day ago

      That or make some attempt to do a free space wipe, or prune the registry, or, you know any reason whatsoever to actually write it in c++.

      It’s probably a sufficient wipe to keep your partner or kids from finding stuff, But it’s not going to stop a state agency. Like they won’t have logs from those services from your IP address. Like your registry isn’t absolutely chocked full of your history and the history of those apps.

      Forensic analysis on that drive will net them most of every one of those deleted files.

      And frankly of all the things to wipe, wth is up with steam?

  • Em Adespoton@lemmy.ca
    link
    fedilink
    arrow-up
    8
    ·
    2 days ago

    Since we’re discussing Windows privacy here…

    What I’d really like is something that creates a situation like VeraCrypt plausible deniability, but where the base image gets updated regularly so that the timestamps and temporary file usage also look plausible for a computer used today.

    Then instead of running an app like this, you just log out, and when you log in with the wrong password, it presents a plausible if mostly empty userland that overwrites the real encrypted data as new files are written to disk.