Is throwing powered on laptop into a fish tank effective against forensic [closed]

Let’s say someone has a full disk encrypted laptop powered on when the adversary tries to break into her home to seize her laptop. If she simply put her powered-on laptop into a fish tank nearby, would it be effective against forensic inve… Continue reading Is throwing powered on laptop into a fish tank effective against forensic [closed]

As long as an Android device does not get rooted, is it safe to assume that the main phone app has not been modified?

From a forensics standpoint, is there any technical possibility that WITHOUT rooting the device the potential cybercriminal used a manipulated system phone app to have hidden functionalities like secret messaging, which he had modified via… Continue reading As long as an Android device does not get rooted, is it safe to assume that the main phone app has not been modified?

What might one want to accomplish by running ffmpeg -i video.mp4 -map 0 -map_metadata 0:s:0 -c copy video.mp4 in terms of forensics?

In the eighth episode of the second series of Mr. Robot, Trenton
does this to the video that was recorded by a VHS camera before releasing it to the public via Vimeo.
ffmpeg -i fuxFBI.mp4 -map 0 -map_metadata 0:s:0 -c copy fuxFBI.mp4
From … Continue reading What might one want to accomplish by running ffmpeg -i video.mp4 -map 0 -map_metadata 0:s:0 -c copy video.mp4 in terms of forensics?