How to Not be Hunter Biden: A Guide to Securing Data

 
BREAKING: Rudy Giuliani has handed over the Hard Drive to Delaware State Police Stating: "There's a sexual depravity to this that's disgusting," and "This is a really very, very sensitive one," We now know that the Computer and Hard Drive of Hunter Biden, the Bombshell Story by The New York Post is Confirmed and Being Investigated by Multiple Agencies including the FBI and Senate Homeland Security Committee  Director of National Intelligence John Ratcliffe also said: "Let me be clear: the intelligence community doesn't believe that [Russian Dis-info] because there is no intelligence that supports that. And we have shared no intelligence with Adam Schiff, or any member of Congress." on FBN 

We might hear the echoes of Conspiracy around this data however, those with InfoSec/OpSec backgrounds know this data can easily be verified through metadata and forensic software like EnCase or DEFT. Also, IMO I believe that Chain of Custody was followed by the Shop Owner once this became his property after 90 Days. He is quoted: 'I think that it's not the government as an entire entity but I think there's a history in this country of people with political motives doing horrible things. I don't want to be on the receiving end of that.'

 

HOW TO NOT BE HUNTER BIDEN:

Both Windows 10 and MacOS have built in File Encryption Software for Data

  • Both FileVault & DiskUtility for MacOS allow you to encrypt Files, Folders and Disk Drives.
  • BitLocker for Windows also lets you Encrypt Data at Rest and Disk Drives.
  • Set a BIOS Password - This is an easy quick option which won't let any Drives start unless a Password is entered. Less Secure because the BIOS can be flashed and reset but this requires time and physical access inside of the Computer. Also, a Disk Drive with no Encryption can just be removed and have it's Disk Image cloned.
  • Don't store any actual data on your physical devices. Use Cloud Services like iCloud, DropBox, Google Drive 

Remember unless you write and rewrite over data numerous times files and meta data can still be recovered from a device. The Dept of Defense Standard for wiping Data recommends rewriting over data at least 3 times while being the most secure at 7 times.


Extra Reading:


- Sodaghar 10/20/20


No comments:

Post a Comment