14
The Traces We Leave Behind AND HOW TO FIND THEM Mattias Wecksten 2009 (cc) by-nc-sa

The Traces We Leave Behind

  • Upload
    fscons

  • View
    772

  • Download
    0

Embed Size (px)

DESCRIPTION

As you most likely are aware of everything you do with a computer system might be logged and tracked in every last minute detail if you or someone else decide to do so. What most users are not aware of though is all the traces and data that you leave behind although none asked for it.This talk will give the audience an insight in the world of invisible surveillance and what kind of tracks we leave behind by merely using a computer system. The audience will also be introduced to how this data can be extracted and how the authorities, the employer or the user can benefit from this. The talk ends with a few examples of how to protect yourself from leaving unwanted traces behind.

Citation preview

Page 1: The Traces We Leave Behind

The Traces We Leave Behind

AND HOW TO FIND THEM

Mattias Wecksten

2009 (cc) by-nc-sa

Page 2: The Traces We Leave Behind

What Traces Do You Leave If…

Page 3: The Traces We Leave Behind

…you delete a file?

Page 4: The Traces We Leave Behind

…you format a hard drive?

Page 5: The Traces We Leave Behind

…edits a document without saving?

Page 6: The Traces We Leave Behind

…use an USB memory?

Page 7: The Traces We Leave Behind

Files on the Hard Drive

• Hard drive = Binder with index

• Write file = Insert document

• Remove file= Erase from index

• Format = Replace index

Page 8: The Traces We Leave Behind

Data Extraction: deleted file

• Recreate the entry• Analyze data• Recreate data

Page 9: The Traces We Leave Behind

Data Extraction: formatted hard drive

• Recreate the register• Analyze data

Page 10: The Traces We Leave Behind

Data extraction: Word-recovery

Page 11: The Traces We Leave Behind

The Windows Registry

Page 12: The Traces We Leave Behind

Metadata

Page 13: The Traces We Leave Behind

Questionnaire:

• Who is responsible if erased information turns up?• What information seeps out?• What ethical aspects are considered?• Are you prepared for the incident?

Page 14: The Traces We Leave Behind

References

Presentation: M. Weckstén (cc) by-nc-sa

[email protected]

Photo: Bitxo (cc) by-nc-sa

Illustrations: T. Weckstén (cc) by-nc-sa