If I delete a file with Freeraser and then encrypt its original directory with VeraCrypt, will it be unaccesible from the rest of the PC? Even by the police?
FREERASER + VERACRYPT
You do realize police can always just put tazer to your gonads and keep pressing the button until you tell them the password, right?
But if we're talking encrypting over erased file, then yes, it should make the file safely unrecoverable. However, if this particularly shameful folder / file came off the internet it can be traced to you by ISP traffic history.
>encrypt its original directory
This is where you have it ass backwards. If you've erased the file the reference is gone and the offending blocks, which may be anywhere on the disk, won't be encrypted. Sure they've been overwritten but you wanted paranoid level security.
Encrypt the file first, then shred it. No fuss, no muss, no electrodes on your bollocks.
If you die the information will become irretrievable.
Assuming AES-256, that information should be secure for a good 100 years.
Veracrypt is a honeypot faggot.
It's been audited.
I was skeptical at first, but the source code is still available, and it's been audited.
What you should worry is the NSA intercepting your download of the binaries.
I audited your mum's ass lass night, your point?
My point is that you should learn what words mean.
I'm not going to explain to you what an audit is.
>If I delete a file with Freeraser and then encrypt its original directory with VeraCrypt, will it be unaccesible from the rest of the PC? Even by the police?
I don't follow your logic. If you shred the file, why would encrypting it make any difference?
He meant to say it the other way around. Encrypt a copy the file and then delete the original.
I think...
well then we can assume the shredded original is unrecoverable so it depends on the strength of the encryption
ccleaner or eraser?
GNU shred
which doesn't answer my question
No, you moron
You're supposed to encrypt first and then shred.
They can still see you had the files on your drive if you just deleted and then encrypted because the "empty" sectors are not meddled with during the encryption process. Depending on how poorly you did the shredding, it's still possible to reconstruct the files even if you encrypt the drive afterwards.
what is he supposed to do the encryption with?
Get out of Sup Forums fucking illeterate normie
Pic related
But why would you want to depend on encryption if the original task was to make it unrecoverable?
Shouldn't OP just keep to using freeraser?
OP is a faggot.
>can't even spell illiterate
magnetforensics.com
>The subject can use all sorts of ‘sanitation’ or anti-forensic techniques, but there are many artifacts left behind in areas that these consumer-level tools do not address or affect, that even when used, a full Internet artifact analysis is still worthwhile and likely to produce results.
what do you think of this?
This article is talking about wiping free space, which wont touch in most cases the MFT where filenames, size etc is saved.
There is no way anyone can do anything after a full disk wipe.
You scared bro
>dumb normie falling for a meme
color me shocked
cancerous sub-IQ worm
Was only PARTLY audited iirc
How good is the TuneUp Shredder using Gutmann?
>not literally shredding your hardware if you're compromised
>posting xkcd
dumb niggerposter
Is "US DoD" method safe?