PDA

View Full Version : BleachBit



EE_
25th August 2016, 09:38 PM
FBI Admits Clinton Used Software Designed To "Prevent Recovery" And "Hide Traces Of" Deleted Emails
by Tyler Durden
Aug 25, 2016 5:15 PM

South Carolina Representative Trey Gowdy appeared on Fox News today and disclosed new details about the Clinton email scandal that seem to indicate intent to destroy evidence. Per the clip below, Gowdy reveals that Clinton used "BleachBit" to erase the "personal" emails from her private server.

For those not familiar with the software, BleachBit is intended to help users delete files in a way to "prevent recovery" and "hide traces of files deleted." Per the BleachBit website:

Beyond simply deleting files, BleachBit includes advanced features such as shredding files to prevent recovery, wiping free disk space to hide traces of files deleted by other applications, and vacuuming Firefox to make it faster.
During his appearance on Fox, Gowdy clearly indicates that Clinton's use of BleachBit undermines her claims that she only deleted innocuous "personal" emails from her private server.

“If she considered them to be personal, then she and her lawyers had those emails deleted. They didn’t just push the delete button, they had them deleted where even God can't read them.

"They were using something called BleachBit. You don't use BleachBit for yoga emails."

"When you're using BleachBit, it is something you really do not want the world to see."
Gowdy also questioned whether Hillary considered "Clinton Foundation" emails to be "personal" and, if not, asked why the FBI's investigation revealed minimal emails about Foundation-related topics.


https://www.youtube.com/watch?v=WTC9DwgFseY

So Dear Reader, we leave it to you to decide whether - like FBI Director Comey - you see no "intent" to hide or obfuscate any of the deleted emails; or - like Rep. Gowdy - you see the facts as proving Hillary Clinton's intent to ensure no trace was left of these harmless emails about yoga routines or wedding plans.

http://www.zerohedge.com/news/2016-08-25/fbi-admits-clinton-used-software-designed-prevent-recovery-and-hide-traces-deleted-e

mick silver
25th August 2016, 09:46 PM
http://www.dailystormer.com/wp-content/uploads/2016/07/jewholohoaxpatriotard2-310x165.jpg

Glass
25th August 2016, 10:03 PM
Some thoughts.
Bleachbit don't really say what methodology they use.
The application appears to be a selective application file cleaner. This would suggest that the intention is to keep using the computer.
Is this the application deployed to the PC and from which files were still recovered?

The lack of Bleachbit methodology information means you don't know what level of over write, if any is being used.
Why would you want to keep such a computer including operating system and all its disk drives intact an in operation?
It can't be all that good if files are still recoverable. I haven't looked into the story. I can't stand listening to shit bags on TV so I don't play the vids.

I would have nuked the disk drive completely. All of it. The Govt even has a bunch of tools for the job. Some of the best I might add.
I would have taken the drive to a car shredder and got them to toss the drive in the machine.
Job done.

I'm now fairly convinced this is a contrived story. No body could be that stupid by accident. On purpose probably but not by accident.

monty
25th August 2016, 10:59 PM
Doesn't the government use any email encryption? Banks and utility companies do. Hillary is pure evil, but not stupid.

Glass
25th August 2016, 11:22 PM
Doesn't the government use any email encryption? Banks and utility companies do. Hillary is pure evil, but not stupid.

I think the point was that it was not part of the government network. Which is why she also uses a blackberry. So it is outside the government network.

crimethink
26th August 2016, 03:41 AM
Thank you, your Majesty, for your endorsement of a favorite software tool, BleachBit!

Ares
26th August 2016, 10:02 AM
Some thoughts.
Bleachbit don't really say what methodology they use.
The application appears to be a selective application file cleaner. This would suggest that the intention is to keep using the computer.
Is this the application deployed to the PC and from which files were still recovered?

The lack of Bleachbit methodology information means you don't know what level of over write, if any is being used.
Why would you want to keep such a computer including operating system and all its disk drives intact an in operation?
It can't be all that good if files are still recoverable. I haven't looked into the story. I can't stand listening to shit bags on TV so I don't play the vids.

I would have nuked the disk drive completely. All of it. The Govt even has a bunch of tools for the job. Some of the best I might add.
I would have taken the drive to a car shredder and got them to toss the drive in the machine.
Job done.

I'm now fairly convinced this is a contrived story. No body could be that stupid by accident. On purpose probably but not by accident.

Most file shredders use the same method. Over write the sectors where the file resided with garbage data (all 1s or all 0's) and then null it out. Makes recovery absolutely impossible.

Joshua01
26th August 2016, 10:06 AM
Most file shredders use the same method. Over write the sectors where the file resided with garbage data (all 1s or all 0's) and then null it out. Makes recovery absolutely impossible.
Kind of sucks for the Hildabeast they she got hacked before she had a chance to scrub the data, huh? I wonder if she can get a refund on the licensing

Jewboo
26th August 2016, 10:28 AM
Most file shredders use the same method. Over write the sectors where the file resided with garbage data (all 1s or all 0's) and then null it out. Makes recovery absolutely impossible.

CCleaner (https://www.piriform.com/ccleaner/download) is free and can overwrite 3 or 7 times.

Joshua01
26th August 2016, 10:37 AM
Kind of sucks for the Hildabeast they she got hacked before she had a chance to scrub the data, huh? I wonder if she can get a refund on the licensing

My bad, Bleachbit is open source and free so no Clinton Foundation donations were used to wipe the Beast's email server

monty
26th August 2016, 11:18 AM
I think the point was that it was not part of the government network. Which is why she also uses a blackberry. So it is outside the government network.

If there were government emails on Hillary's private email server wouldn't they be encrypted? If they were there how did the hackers and the FBI read them? Were classified emails sent to clinton.com by the Dept. of State or did Hillary transfer the unencrypted email to her private server. If she did transfer them, why?

Ares
26th August 2016, 11:22 AM
CCleaner (https://www.piriform.com/ccleaner/download) is free and can overwrite 3 or 7 times.

BleachBit's file shredder uses only a single pass[13] because of the lack of evidence that multiple passes, such as the 35-pass Gutmann method, are more effective. However, multiple passes are significantly slower and may give the user a false sense of security by overshadowing other ways privacy may be compromised

https://en.wikipedia.org/wiki/BleachBit

Joshua01
26th August 2016, 11:24 AM
If there were government emails on Hillary's private email server wouldn't they be encrypted? If they were there how did the hackers and the FBI read them? Were classified emails sent to clinton.com by the Dept. of State or did Hillary transfer the unencrypted email to her private server. If she did transfer them, why?

She's SOS, she simply is supplied with the decryption for her home server. She's the nigga in charge and she can get anything at that point

monty
26th August 2016, 11:33 AM
She's SOS, she simply is supplied with the description for her home server. She's the nigga in charge and she can get anything at that point

To simplify my question, how did the emails get from the .gov secure network to the clinton.com network. Any gov't. employee who addressed a secure classified message to he private server is also guilty.

I can see her using the private server to set up lucrative deals for the Clinton Foundation to communicate between Huma Abedin and various "prospective clients".

Ares
26th August 2016, 11:38 AM
If there were government emails on Hillary's private email server wouldn't they be encrypted? If they were there how did the hackers and the FBI read them? Were classified emails sent to clinton.com by the Dept. of State or did Hillary transfer the unencrypted email to her private server. If she did transfer them, why?

That depends on the question regarding encryption as there is 2 primary means and 1 or both are usually used in a secure environment. With Hillarys server I'm going to go out on a limb and say that neither method was employed. The only encryption employed was probably between her device and her mail server. That's standard with ActiveSync.

The 2 primary methods are encryption in transit and encryption at rest. Meaning the messages were in encrypted format during transmission (i.e. a TLS channel between source and destination server, which is not used that often as it requires a trust between the 2 servers as well as some special domain configuration rules in transport) and the other would mean she would have to employ encryption at rest which means she would have to have a pretty high end server so she didn't complain about the encryption / decryption overhead when accessing her emails (It can be really slow most times). In my experience even 15K SAS drives have issues with encryption / decryption overhead. The only drives that I'm aware of where it doesn't get noticed is with Solid State Drives.

Why I said neither method was most likely employed with her server.

Jewboo
26th August 2016, 12:33 PM
BleachBit's file shredder uses only a single pass[13] because of the lack of evidence that multiple passes, such as the 35-pass Gutmann method, are more effective. However, multiple passes are significantly slower and may give the user a false sense of security by overshadowing other ways privacy may be compromised

https://en.wikipedia.org/wiki/BleachBit

CCleaner is user select-able with 1-pass, 3-pass, 7-pass etc.

You appear to be correct. Multi-pass also wears out the new ssds.

http://www.howtogeek.com/115573/htg-explains-why-you-only-have-to-wipe-a-disk-once-to-erase-it/

:(??

Ares
26th August 2016, 01:08 PM
CCleaner is user select-able with 1-pass, 3-pass, 7-pass etc.

You appear to be correct. Multi-pass also wears out the new ssds.

http://www.howtogeek.com/115573/htg-explains-why-you-only-have-to-wipe-a-disk-once-to-erase-it/

:(??




Definitely recommend CC cleaner. It also clears out the index.dat file that Internet Explorer uses and nothing else will clear it (that I'm aware of). Index.dat is Microsoft's browsing history repository. Why I do not use I.E.

crimethink
26th August 2016, 01:23 PM
Makes recovery absolutely impossible.

Not quite. BleachBit and other programs that use even Gutmann make recovery next to impossible. If the data is exceptionally valuable, very expensive electron (magnetic force) microsopy recovery will be employed.

This is why the NSA, CIA, and others physically destroy retired hard disk drives.

I just don't want anyone to make the mistake of thinking BleachBit, CCleaner, or the equivalent are absolutely sure things.

https://www.nsa.gov/resources/everyone/media-destruction/

Ares
26th August 2016, 01:34 PM
Not quite. BleachBit and other programs that use even Gutmann make recovery next to impossible. If the data is exceptionally valuable, very expensive electron (magnetic force) microsopy recovery will be employed.

This is why the NSA, CIA, and others physically destroy retired hard disk drives.

I just don't want anyone to make the mistake of thinking BleachBit, CCleaner, or the equivalent are absolutely sure things.

https://www.nsa.gov/resources/everyone/media-destruction/

Well absolutely impossible unless you have access to a taxpayer funded multi million dollar data recovery lab. :) I've always told customers if they want absolute 100% guarantee to smash the drive with a hammer.

Jewboo
26th August 2016, 01:54 PM
Definitely recommend CC cleaner. It also clears out the index.dat file that Internet Explorer uses and nothing else will clear it (that I'm aware of). Index.dat is Microsoft's browsing history repository. Why I do not use I.E.

I'm glad you posted Ares. I just reset my CCleaner to single-pass. Will make my new SSD live much longer.

:)

crimethink
26th August 2016, 02:11 PM
I'm glad you posted Ares. I just reset my CCleaner to single-pass. Will make my new SSD live much longer.

:)


NAND flash chips (in most SSDs) work in a very different way than platter drives. While platter drives have a "mean-time-before-failure" (which includes failure of any component, including the platter), NAND has a largely-fixed write/rewrite rating. Reach that, and you're done.

Most SSDs have a specific erase tool (from the manufacturer), which "flushes" (resets) the entire drive, dumping the charge-state of the NAND.

Read this regarding using CCleaner for SSDs:

https://forum.piriform.com/?showtopic=40520