Hello,
Are there any solution for encrypted hard drives such as flagstone. I think digital forensic does not seem to have a long life without finding any backdoors to these.
Adnan
1. Live imaging
2. Interviews
3. Cold Boot Attacks
4.
5. Other media (CDs, DVDs, Thumb drives, hand written notes)
6. etc.
The game goes on.
6. etc.
6. Waterboarding/torture
7. etc.
The game goes on, though it's not a game anymore. cry
jaclaz
8. Obtaining password through mind melds
9. etc.
9.
10. etc.
Are there any solution for encrypted hard drives such as flagstone. I think digital forensic does not seem to have a long life without finding any backdoors to these.
That is a good question and deserves a better answer.
In short, nearly perfect means of encryption exist, today, which are practically unbreakable. Since their use cannot be prevented, the only thing that can be done is to make the punishment for failure to disclose the key/password so severe that at least some who might, otherwise, risk it, would give in.
But you also balance the data stored on a particular medium with that stored out in the "Web" about which the user has much less control.
The bottom line is that forensics will need better laws to compel legitimate production while protecting the user against unreasonable violations of privacy.
And investigators will need to be more clever about building circumstantial cases.
I've been doing this for 15 years and in spite of technological advancements, there is, rarely, the time when there is nothing to be found where something exists (I'm excluding technologies available to governments).
And it is often hubris, rather than technology, that causes the evidence to be found.