Oh, and I had a thought about their methodology - the screen recording software only works when it's booted from the internal hard drive. Boot with a USB stick with a Linux live image, mount the internal drive as read-only, and you can copy the entire thing, and nobody will ever know.
privacy
Big tech and governments are monitoring and recording your eating activities. c/Privacy provides tips and tricks to protect your privacy against global surveillance.
Partners:
- community.nicfab.it/c/privacy
Most people struggle with the idea of installing an OS let alone a portable OS that can be moved from one machine to another. I doubt the CBC has any Linux nerds outside of the IT department.
Also, even mounting a drive as RO can leave traces. In a forensics lab special devices are used to read drives while stoping any changes from being made to a disk in order to not disturb evidence.
Also, wipe your hard drives before you throw out computers. Folks throw PCs out all the time in my office building, and I pick them up to refurb and 'freecycle' them. More than half the time, I'll plug it in to see if it will boot it up, and the drives are still intact, and loaded up with personal data... Then I plug in my DBAN USB stick and wipe the drive(s) 3x.
I had an old Windows Phone I recycled years ago. It had nothing on it since I had migrated everything to Google a while earlier. Instead of wiping it, I dropped it at the recycling place in Vancouver.
Imagine my surprise when I get an automated email 6 months later saying someone just tried logging into my Microsoft account on that device from Shenzhen, China.
Wipe your shit, folks! It’s good advice inside and outside the bathroom.