Situation 1:
Someone has embarrassing/incriminating documents on you on their PC.
You have physical access to this PC, and secretly know the password.
You also know when this person is out of town or at work so you can have anywhere from a few hours to a few days with this computer if need be.
You want to rid the PC's owner of these documents but you don't want the owner to notice, or you will be in deep shit for tampering with someone else's property.
If the owner suspected tampering, you wouldn't rule out them having the PC professionally inspected for evidence that could confirm tampering.
What do you do?
Situation 2:
There is a remote possibility that at some unknown point in the future, your computer could be confiscated for evidence, and you are unsure if anything on it would be damaging to you, and there's too much content to sift through.
You value your data too much to wipe it all.
The level of the severity of the investigation leads you to believe that they won't try THAT hard to break an encryption if there is one.
What do you do?
>Situation 1:
if the only files that are deleted are their blackmail files of you, they'll know you did it. they won't be able to prove it unless they have a camera recording who does the deleting.
>Situation 2
what do you mean by "damaging to you"? illegal content or just personal info? what kind of investigation is it that will look through your harddrive but stop at trying to look at encrypted files?
>>348385
>Situation 2
>What do you do?
Claim it was a joke.
>>348385
you don't even need to know the password as long as you have physical access to their computer and the disk isn't encrypted
just boot up a linux liveusb and delete the relevant files from there
if the disk was encrypted and you didn't know the password you'd still be able to wipe it entirely, but you wouldn't be able to selectively delete specific files
>>348385
Situation 1: overwrite the incriminating files with garbage, then infect their PC with a ransomware trojan. Set it as a scheduled task so it goes off while they're using it. Randomise the timestamps on their filesystem so any forensic work would be inadmissible.
Situation 2: make a backup on a tryecrypt/bitlocker microSD card and hide it literally anywhere. In the fabric of your loft insulation. Between one hinge of one door and the doorframe. Inside the mechanism of your front door lock. Underneath your car battery. Inside an LED lightbulb. Inside a pocket cut into one of your floorboards. Underneath the water cooler at work. Inside a floppy disk. Between the layers of a cardboard box. At the end of a hole made by pushing a knife into the foam of your sofa. Hotglued to the cable winder spool on your hoover. Pushed in through the hole used to spray in your refrigerator's insulation. Tossed inside one of your walls so it lands on a crossmember.
MicroSDs are so small, the only way to guarantee you find one in a house is to demolish the house. You are not Al Capone. They're not going to spend enough time searching your house to find a MicroSD they don't even know exists.