In the hostile landscape of the Digital Age, protecting the most sensitive information from unauthorized access and searches is crucial.
We have already discussed how to protect your data using disk encryption. We have also delved into nesting techniques to achieve "plausible deniability" against searches by authorities, such as during customs inspections.
Now, we will focus on another critical aspect: ensuring that you know how to minimize your traces and that once your data is no longer needed, it is securely erased and rendered irrecoverable. This is called anti-forensics.
Anti-forensics includes the methods and tools used to obstruct forensic analysis, making it difficult for attackers and investigators to recover deleted data from our devices.
This article explores various aspects of anti-forensics, focusing particularly on:
1. Methods for secure data deletion and sanitization of storage units
2. Removal of metadata and configurations to minimize data
3. OpSec approaches to enhance your anti-forensics capabilities
Secure Data Deletion on HDD and SSD
On traditional mechanical hard drives, deleting files or formatting the disk does not remove the data. Instead, the space is marked as available for new data to be written over it. However, the original information remains on the disk until it is overwritten by new data, which means it can be recovered using forensic tools.
Keep reading with a 7-day free trial
Subscribe to Cyber Herm3tica to keep reading this post and get 7 days of free access to the full post archives.