Hacker News new | comments | show | ask | jobs | submit login

Can't the investigators get a warrant to spy on the suspect? They then install a bunch of spyware on the machine and in the suspect's home and on the suspect's internet connection.

If I was that suspect then I would never, ever, use that computer again.

For sure.

There are other measures the suspect could have taken; store everything on an always encrypted micro-SD, which is tiny enough to be easily destroyed.

Actually: Has anyone done any research about the risks of "super microscopes and Flash memory"? There's a theoretical risk with conventional platters. I don't know how big one bit is on a conventional drive, and I don't know how big one bit is on a, say, 8GB micro-sd card.

What are they going to do, read the encrypted data off the flash drive the hard way?

I stress this is just me noodling around, and that I'm not talking about real world risks. But: Is it possible to read unencrypted data of the flash drive the hard way?

Obviously, if it's sensibly encrypted there's no point. But a person may think they have physically destroyed a flash drive only to have left information available.

Here's some links to DIY de-capping and microscopy of a variety of ICs:




I imagine it's probably possible. The trick with flash drives though I think is the size. You could easily swallow a micro sd card without anyone even noticing.

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact