• Kairos@lemmy.today
    link
    fedilink
    arrow-up
    0
    ·
    26 days ago

    This person should also turn off their computer and remove the RAM so it’s zeroed out if it gets siezed.

        • trxxruraxvr@lemmy.world
          link
          fedilink
          arrow-up
          0
          ·
          26 days ago

          They use forensic tools to clone the RAM before moving it. Probably depends on exploits so whether it will work may depend on your OS, but they have access to the hardware so there are a lot of possibilities.

          • B0rax@feddit.org
            link
            fedilink
            arrow-up
            0
            ·
            26 days ago

            At least in Germany, I would be surprised if the cops could point to the RAM inside a computer. They will not open it before they take it with them.

            • optional@sh.itjust.works
              link
              fedilink
              arrow-up
              1
              ·
              25 days ago

              If a cop acts as if they don’t have a clue, you have to be extra careful. They might be trying to lull you into a false sense of security. They’ve been working with a lot of criminals before you, and most of those criminals have had computers and smartphones for 20 years now. They know what they are doing, nowadays.

            • LH0ezVT@sh.itjust.works
              link
              fedilink
              arrow-up
              1
              ·
              26 days ago

              Careful. There are levels to it, and from stories that I heard, those levels don’t always communicate with each other. If you get the regular “normal cops”, then no, they won’t know anything more than the average joe about computers.

              If get in deep enough shit, you might get a visit from the specialised cops, either the state or federal variety, and those guys know what they are doing.