The new Microsoft system to fight tax fraud and child pornography.
You committed a tax crime and deleted the file that proved it?
Or you have looked at child pornography photos on the internet that you have not memorized ?
You are wrong, because the files are never actually deleted from your computer, but only “hidden”.
Even what was seen on the internet was stored in the “cache” which when emptied is actually lonely “hidden”.
in conclusion, if you are placed under investigation for your crimes, better not to pretend too much, you will still be exposed, that's how.
Even after deleting a file and “emptied” the basket, you can recover the file that is actually still present on the disk, perfectly intact, only that it is declared “unnamed” and numbered to the system, and to you ! But all the contents of the file are there, easily recoverable.
I personally did the recovery operations for these files “lost” both for customers who perhaps had deleted a folder by mistake and lost the documents, and for Court Expertise .
The data is always there, even after reformatting the disk (that is, imposing a redrawing of the data volume map).
Even when it is not possible to restore the “formatting” of the entire album, it is still possible to recover all individual files with a so-called “low level scanning”, which in practice works like this: the computer physically searches the entire disk for markers “start of file” and following the data trace like Ariadne's thread reconstructs all the content. Sometimes, however, the thread is broken, but the software can recombine the various pieces that coincide like when rearranging a plate. Special software recombines the individual pieces that fit together, the individual broken ends of the thread, and they tie them together in various ways creating , among many wrong forms , even the right one that the human operator recognizes, and soon also automatic neural network software.
If all this had been done at the time of Tangentopoli, and it could be done, today we won't even have 1 of the politicians we have. But we know that they didn't want to eliminate the entire political class, only the most exposed part to give a signal.
But even for legitimate uses this is a problem, for example, companies that want to update computers cannot sell the disk simply reformatted. If you sell a disc even with the formatting deleted, In 3 minutes you can restore the disk as it is with all the deleted files, including invoices, price lists, list of suppliers and customers, technical data and projects ….. bank access codes….
To permanently delete data there are software techniques that consist of “cover them” dozens of times with other fake data specifically designed by mathematicians to prevent recovery with low-level scanning. They are like gods “drawings” which are overlaid many times on the file, as if you were going over the pen many times with lines and circles to erase what was written.
But to do it in such a way that it is definitively impossible to recover the data, you have to rewrite over them at least 33 times, otherwise there remains one “trace” atomic energy that can be recovered with magnetic devices, those used to recover data even from broken disks.
However, this system requires a lot of time, the computer must remain working for days if the data is a few hundred Giga.
Otherwise the only solution is to crush the disc into dust, which however contains various very toxic substances, so it is better to have it done with the considerable costs involved.
So the problem is to equip yourself with the right software, for when you need to discard an old computer with legitimate data .
But another matter is the deletion of files with illegal content with the intention of using the computer again, that is, what tax evaders and child pornographers do.
You will no longer need to have cleaning software, the new disks and the new Microsoft systems keep copies everywhere so many and in such numbers as to make total deletion impossible .
Microsoft has inserted into its systems a technology that we could call the “copy machine over time”.
These are copies that the system automatically makes to keep an image of the files at a certain point in time.
I am so-called “points will restore you”, whose function is that of “photograph” a certain situation in the system, so that if it is attacked by viruses or something else it can be “restored” what it was like and where it was. But restore points store more than just copies of configuration data, may also include user data such as files and documents, and be automatic and periodic or activated in this sense.
in conclusion, if “System Restore” allows you to restore an entire system to a certain date, the same automation can be used to keep a copy over time of all users' modified archives, Asia those created or modified by him, but also those only seen.
E’ like having a video recorder always on that records everything you watch.
Certainly Microsoft has created some “backdoor” as it has done in the past for certain commitments with the American administration.
E’ It is a known fact that through some secret systems Microsoft actually has access to everything on the computer.
This is very useful to the police force, but I don't know if it is also under the control of the European Union or just the USA.
To understand, backdoors are gods “tricks” which open control to third parties, it would be like a snack vending machine, pressing the keys at the same time 1,3 E 9 a full meal would come out for free.
Backdoors are everywhere, an investigation recently found that some poker machines in bars were churning out more money to Chinese players.
The machines are made in China, and perhaps they put in some backdoors that the Chinese know about among themselves.
The Chinese in poker and the Americans in Microsoft systems? And why not the Germans in programs like OpenOffice or Firefox?
If you don't invest in technology you become its slave. Or, If you don't know how to screw in a light bulb you need to call an electrician.
Returning to the copies introduced by Microsoft over time, they certainly offer a very powerful crime-fighting system, which I imagine can be activated without the customer's knowledge.
Surely the police forces today have the opportunity to put an end to it “auditing” the computers of the suspects, including mobile phones which are real computers connected to the network, and after a few weeks all the trafficking of the suspects will be known, including old documents which will be sent piece by piece .
That's why the new increasingly powerful computers aren't actually that much faster: they spend their time making copies of data, rescues and various broadcasts.
There is a rule at the Pentagon: the only safe computer is the one disconnected from any network, locked in an atomic bunker deep in the earth, without contact with the outside.
It means a computer not used by anyone, i.e. useless.
Mafiosi, pedophilia, tax evaders will no longer have a chance, except politicians whose wiretapping is not permitted, never mind if some mafioso gets away with them.
E’ It's true that as usual this problem has already triggered a problem “electronic warfare”, and in fact there are already programs that allow you to delete restore points, but even in this case it is a cancellation that does not prevent low-level recovery as mentioned above.
There is, however, another factor in favor of the tax and postal police , the fact that disks today are enormously more capacious than those of just a few years ago. Every user , even a company, usually uses a few Gigabytes. If he has many films, a few dozen. Little stuff for today's records which are mostly always empty, discs that contain often 500 GB et al 1000 GB ( = 1 TeraBytes) at a cost of a few tens of Euros.
To give an idea, on a disk from 100 euros can fit 10 years of internet browsing and mail of a user
Even laptops from 200 euros they have at least 10 times the space needed by a normal user.
All free space is now used for data copies in “restore points”, dozens and dozens always made in new free areas of the disk.
in conclusion, not even we specialists can think of getting away with it, because there is always an uncalculated software variable that would emerge sooner or later, without considering what passes through the network interfaces without our knowledge, and perhaps maintained in computer hardware areas.
So life is increasingly tough for child pornographers, tax evaders, and also for simple music pirates.
Big Brother ? time. But what we understand is the reason for the useless obscurantist atrocities desired by the Italian government.
These tools make the limitations on broadband access that Italy implements completely useless , legal repression of freedom of communication, password obligations, privacy laws …. all things completely useless compared to these systems.
It makes no sense and Croatia proves it, Slovenia, Austria, United States that do not limit access to the internet, because it is practically impossible to keep your computer clean from postal police analyses, so you can hardly get away with it 1 time.
Now the amount of data and copies is such that it wouldn't even be enough to have a dedicated computer to delete the data used by the other.
But perhaps all this won't make Microsoft richer, seeing as China, Brazil and India have adopted Linux as their standard computing system, that it too has equally important prevention tools.
So anyway, better not to commit a crime by thinking you know more than you think.