Quote from: kmfkewm on May 30, 2012, 03:58 pmQuote from: vlad1m1r on May 19, 2012, 06:57 pmYou'd need a customised version of the program to do that.V.Quote from: Diamond on May 17, 2012, 10:48 pmQuote from: oscarzululondon on May 15, 2012, 04:29 pmWhat you want to do is TrueCrypt a small partition, which you install your 'naughty' operating system on, and then produce two keys. One key loads the partition normally for you, the other key loads a clean operating system and wipes the naughty one (3 pass eraze) which you can give to the police during interrogation. By the time they realize what's happened it's too late. You've not broken any laws, you've given them a legit key, and they have no evidence. BINGO 8)Woah woah woah... there are keys that will start to wipe a hidden volume? With truecrypt? Is that built in or some custom shit?It would be a waste of a custom program too, considering the first thing forensics people do with data storage devices is make perfect copies of their contentsOne of the most instructive ways to spend your time is to download a copy of the Autopsy forensic tools CD and probe some of the test images of disk drives they have available on the website.V.