7156
DOWN WITH THE ESTABLISHMENT (media.patriots.win) 🌶️🌶️ SPICY🌶️🌶️
posted ago by Oberfunkelnfurher72 ago by Oberfunkelnfurher72 +7159 / -3
Comments (460)
sorted by:
You're viewing a single comment thread. View all comments, or full comment thread.
10
SilverStarv5 10 points ago +10 / -0

Are you sure about this?

5
Libertas_Vel_Mors 5 points ago +6 / -1

NIST STIG * configuration requirements practically demand it.

Pretty sure that unless they changed the passwords before killing the machine, they're well and truly fucked.

They might luck out and the IT guy only relied on Bitlocker (which isn't that hard to bypass), but I wouldn;t bet too much on that.

  • Yes, STIG is typically DoD, but IIRC it's still the hallmark for how all sensitive government computers/servers/etc are to be configured and maintained.
2
LibertarianXian 2 points ago +2 / -0

Yea it's DISA STIG but this is still pretty much right.

Oh and they probably use some kind of VDI (Virtual Desktop Infrastructure) that requires minimum client hardware - basically just a monitor and a box for peripheral plugs and USB media. The actual guts is floating on a hard drive array somewhere in a secure fed datacenter.

2
CantStumpTheTrump 2 points ago +2 / -0

Yeah, they needed to sit and export her mail right there, well as much as would be allowed before her account was shut off. Turning it off was the worst thing to do.

Remember kids, these days if you find a computer and want to snoop at what's in it; do not turn it off and expect to be able to get anything later.

2
soldierofcovfefe 2 points ago +2 / -0

a lot of valuable information might be held in volatile memory, which would most likely be lost on any shutdown, but there is still a lot of places information could be salvaged off hidden hard drive sectors, memory swap, page files, etc. so not a totally lost cause