Is throwing powered on laptop into a fish tank effective against forensic [closed]

Let’s say someone has a full disk encrypted laptop powered on when the adversary tries to break into her home to seize her laptop. If she simply put her powered-on laptop into a fish tank nearby, would it be effective against forensic inve… Continue reading Is throwing powered on laptop into a fish tank effective against forensic [closed]

As long as an Android device does not get rooted, is it safe to assume that the main phone app has not been modified?

From a forensics standpoint, is there any technical possibility that WITHOUT rooting the device the potential cybercriminal used a manipulated system phone app to have hidden functionalities like secret messaging, which he had modified via… Continue reading As long as an Android device does not get rooted, is it safe to assume that the main phone app has not been modified?