wooddoctor
New member
Goggle stores your every key stroke that you make on your computer in some data base for some future use.
DuckDuckGo claims not.
DuckDuckGo claims not.
Goggle stores your every key stroke that you make on your computer in some data base for some future use.
Could you please provide some evidence of this? I am a computer guy (professionally) and one of my hobbies is computer security and I've not heard this before. Making a comment like this without evidence to back it up is irresponsible. I'm not saying it doesn't happen, I'm just saying that without any evidence I'm not buying it.
And remember...the internet was invented by Al Gore...scary, huh?.hahahahahaIt has to be true, it's on the internet!
Ben;Could you please provide some evidence of this? I am a computer guy (professionally) and one of my hobbies is computer security and I've not heard this before. Making a comment like this without evidence to back it up is irresponsible. I'm not saying it doesn't happen, I'm just saying that without any evidence I'm not buying it.
Just remember the Casey Anthony case...Could you please provide some evidence of this? I am a computer guy (professionally) and one of my hobbies is computer security and I've not heard this before. Making a comment like this without evidence to back it up is irresponsible. I'm not saying it doesn't happen, I'm just saying that without any evidence I'm not buying it.
Ben;
I've worked some digital forensic cases where we analyzed the activities and computers of the accused. Google, Facebook, Myspace, etc all have a law enforcement guide outlining the procedures for obtaining the data. An adminstrative supeona issued to any ISP will result in the return of all session data on a particular user, email, internal server or IP address. Providers and websites (chat) generally comply without complaint, returning all data on file. Considering the low cost of computer storage many companies keep expansive records. Analysis of the returned data, the hard drives and removable media is performed usin FTK (Forensic Toolkit) or ENCASE Forensics. The findings are then merged and sorted by date/time to create a complete history of the suspect's activities.
This could be a problem for those who post violent responses on forums such as USA Carry. Should they ever be involved in a shooting, and depending on circumstances, law enforcement may build a case based on repeated statements that one will shoot anyone who messes with them. It goes to their state of mind and character during criminal procedings
Ben, you are correct in that Google can't capture your local keysrokes. But, depending on what you're doing on your own computer (word document? spreadsheet? IM? email?) the results are probably stored on your own system. For example, if you create a word document and then delete it we can absolutely find it. If you load a photo from your camera, burn it to CD and delete it, we can find it. Even initializing your hard drive won't completely dispose of it. That is why we destroy the drives at then end of a digital investigation. We initially create several copies of the hard drive to be examined using a replicator. We then seal the original drive in an evidence bag. All investigative efforts are then made on one of the copies. At the end of the investigation we initialize the drive copies, disassemble them and cut the platters up with a bolt cutter before disposing of them. Once that computer is confiscated most perps are screwed. The average person (or even software developer) can't hide their tracks.BC1 -
Yes, anything you do in a digital world is recorded. Even when you delete something from your computer it is many times not actually gone, it's just flagged as available. The issue I had with the original comment was that Google captured "every key stroke that you make on your computer". Every search that you send to them is one thing, but every key press on my computer is a whole different question. That would involve them having some code on my system to phone home with that info. If something like that were happening I'm sure I would have heard about it from the people I talk with on a regular basis.
There are also a lot of people who work on anti-forensics things. As with any security related topic, digital or physical, it is a race between the good guys and the bad guys. Unfortunately the good guys have to do everything right all of the time and the bad guys don't.
Tucker's Mom -
I'm sorry but I didn't follow the case that closely to know to what you are referring. I'm guessing it's related to my response to BC1.
As for the PEBKAC errors, yes, I deal with them on a regular basis.
Ben
Some companies really watch employee Internet use closesly.For lack of a better term I am an IT manager and some of our employees will ask me, "Can you actually read my email?" I tell them yep, but I don't have time to read half od my email and I am sure not wasting my time reading yours unless you give me some reason to. There have been a few times that I have had to do some "research" on an employ's email or such but I really don't have time to mess with that as it is very tedious and time consuming. I tell them please behave because I really hate it when I get a call about so-and-so is on vacation and we need such-and-such and document from their system.
Remember that if the company owns the computer or pays for the Internet service then they also own the data no matter if it is your personal email or not.