Wipe data

>knocking is heared from your front door
>you look through the peep hole and see FBI Agents
>Sir, we know you're in there. We have a warrant and some technicians with us who want to take a look at your harddrive. Open up know!

What do you do in such a situation Jow Forums?
(Reminder you only hav a few seconds before they ram your door in.)


Would this be the only weapon available?
cmd ---> cipher /w:C

Attached: 1552747431425.jpg (800x800, 80K)

Other urls found in this thread:

bing.com/videos/search?q=intel management engine&view=detail&mid=3755430F001DCB3E11833755430F001DCB3E1183&FORM=VIRE
youtube.com/watch?v=Lr-9aCMUXzI
youtube.com/watch?v=qIRmxBPHh_8
twitter.com/AnonBabble

Probably nothing

A lot of drives have a secure erase function, which I don't believe takes very long.

Run fbi.sh which gracefully unmounts encrypted partitions and shuts everything down. EZ

It's a little more complicated, SSD's have encryption built in and if you issue the ATA secure erase command it wipes the encryption keys, so while the drive contents are still there it's completely indecipherable.

Assuming they didn't fuck up the crypto part of the firmware like with many recent SSDs.

>>knocking is heared from your front door
>you look through the peep hole and see FBI Agents
>Sir, we know you're in there. We have a warrant and some technicians with us who want to take a look at your harddrive. Open up know!
then who was phone

Only one thing left to do

Attached: 1460877502285.gif (269x270, 387K)

jokes on them i'm not from burgerland. still, i-if they really insist i can show them my anime collection.

Attached: 6bac020242a27f794e004c4dd772748d3858a6ce7d2c489089d3dc21b87e70ec.png (1180x590, 144K)

that pic got Seth Rich killed

>"alexa, initiate pizza protocol"
>*bang as my arduino drives a solenoid into the shotgun shell I glued to my hard drive*
>"heh... nothing personal"

I have been reading about this. Security data firms are trying to demand that SSD's use their "already more than adequate" write-speed and capacity to add in backdoor functionality, like Intel and others already did.

redpill me on intel backdoor applications.
Is it true there is a killswitch in your CPU?

search for "intel management engine" there's an entire world of shit going on in your processor you have 0 control over

bing.com/videos/search?q=intel management engine&view=detail&mid=3755430F001DCB3E11833755430F001DCB3E1183&FORM=VIRE

sry bad link my bad

youtube.com/watch?v=Lr-9aCMUXzI

Attached: IME.jpg (688x361, 86K)

>shove my usb with compromising data up my ass
nothing personnel fbi

Are there other CPU manufacturers that work? Or is it a complete monopoly?

>puts gloves on
*snap*
>nothing personal user

Attached: gloves.jpg (980x1108, 59K)

CIA: You are a Big Guy
(NSA: with a Big Data)

youtube.com/watch?v=qIRmxBPHh_8

Attached: CIA:you are a Big Guy.gif (280x358, 2.18M)

AMD have similar stuff in their CPUs

Unfortunately unless you bootstrap your own CPU from raw silicon you can't know it wasn't compromised

Laugh my ass off. Mostly due to I have nothing illegal but more why stated below.
I have over 40 laptops, and 14 desktops, misc hard drives down to a 20 mb drive from a Tandy 1000. Top that with over 30 USB drives, compact cards, micro and regular SD cards, 3.5 floppies, zip disks, etc. Not to mentions binders filled with CD and DVDs. Processing and documenting my shit would be a full time job year or more.

Attached: 1556231380035.jpg (1280x720, 78K)