Notifications
Clear all

(Google) "Hello again..."

3 Posts
3 Users
0 Reactions
344 Views
(@c-colina)
New Member
Joined: 16 years ago
Posts: 4
Topic starter  

Stuck in a tricky case of forensic examination, the suspects computer shows transfers of incriminated data via "Google Hello" …

Actually I'm quite proficient with Hello, but now I have to analyze RAW-Recovery chatlogs, filmstrips, etc. and therefore have to reassemble the initial state (somehow, that is).

So now to the question I have

A filmstrip header contains an XML-ish header.
Especially the filemodtime-Tag is of interest … which time does it depict, though ?

size, width, height, filesize are known to describe the origin.

But filemodtime ??
Assumption is, that filemodtime should encode the timestamp of the origin in the Senders FS.

Does anyone recall having verified this ?

Google Hello is effectively offline since Mid-2008, so re-verification is not possible for me.

If though, the filemodtime actually describes the transfer/storage-time on the recipient's computer, it would influence the outcome and development of the current legal case.

Regards

C. Colina

Edit removed typos


   
Quote
samizell
(@samizell)
New Member
Joined: 15 years ago
Posts: 2
 

Did you ever get an answer for this? I have the exact same question.


   
ReplyQuote
Welshie
(@welshie)
Eminent Member
Joined: 16 years ago
Posts: 21
 

This paper on Harry's site might be of help to shed some light on "Google Hello"..

http//computerforensics.parsonage.co.uk/downloads/HelloWhitePaperVer1dated03Nov2006.pdf


   
ReplyQuote
Share: