laptop so I can destroy this bitch easily if the feds come through
swap laptops every couple months (I dont do the wifi adapter swap thing, for the price of a quality adapter I can just get a used laptop cash, without a trace of purchase- which comes with a wifi adapter) - saves me the time to replace the adapter too so all I gotta do is get rid of the mic and Im set.
bonus : I sell the old laptop after formatting it so I basically swap my laptop/wifi adapter for free everytime
You could also overwrite the data to make it hard to recover, instead of just formatting, it's not sufficient if your threat model is high, it's called "shredding".
If the data isn't encrypted before format, it can be recoverable and reconstructed, ideally you want to shred data/over write using specialized software or scripts, again this really depends on your threat model.
what data can be recovered then ? Surely only a small fraction of the formatted data can be recoverable, if I wipe 250 GB of data that frees up 250GB on the hard drive where the hell else is that data gonna be stored ?
I dont get what you're saying man where is all that encrypted data going to be stored after you wiped the PC and the hard drive is showing that the GB Is now available for new data to be written ?
When you format a hard drive, the data doesn't magically immediately cease to exist. Instead, the formatting process rearranges the file system and removes references to the existing files from the drive, making them inaccessible through normal means, (to the average person just looking around in the drive).
The actual data remains on the disk until it's overwritten by new data, which is why I brought up overwritten using specially crafted scripts or softwares.
The formatting process typically only removes the file system's pointers to the data, such as the file names, locations, and other metadata.
The raw data itself, like the 1s and 0s that make up the files, is still present on the disk.
This is why it's sometimes possible to recover data from a formatted hard drive using specialized software or techniques, as long as the data hasn't been overwritten. However, the likelihood of successful recovery decreases over time, especially if the drive is used regularly after formatting, or ideally if it's encrypted before format (full disk encryption), it becomes borderline impossible to recover the data to even brute force.
no need for a new laptop but recommended to swap Wifi adapters, which are costly if you want a good one.
Another paranoid side of me thinks that using the same laptop can give out information about the machine you're using (screen size, MAC address, etc..)
"No matter how paranoid you are, what they're actually doing is worse than you can possibly imagine."
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
"No matter how paranoid you are, what they're actually doing is worse than you can possibly imagine."
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
You can ask any time.
But Anyone concerned with OpSec shouldn't share that they're using currently.