this post was submitted on 25 May 2024
74 points (100.0% liked)
chat
8151 readers
2 users here now
Chat is a text only community for casual conversation, please keep shitposting to the absolute minimum. This is intended to be a separate space from c/chapotraphouse or the daily megathread. Chat does this by being a long-form community where topics will remain from day to day unlike the megathread, and it is distinct from c/chapotraphouse in that we ask you to engage in this community in a genuine way. Please keep shitposting, bits, and irony to a minimum.
As with all communities posts need to abide by the code of conduct, additionally moderators will remove any posts or comments deemed to be inappropriate.
Thank you and happy chatting!
founded 4 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Data centers are 99.9% encrypted hard drives, a scavenger has a good chances of finding working ones, but no chance of decrypting a single one, and extraordinarily tiny chance of restoring one of the internet's current backbones, S3. The chances of finding an unencrypted hard drive strongly correlates with finding a relatively small (non-notable) company or hobbyist user's activity. Most small datacenter tenants are sharing multiple encrypted hard drives with other smaller tenants.
When an internet ending event happens, data centered could be physically destroyed, or there could be economic reasons that clients drop services, their data will probably get overwritten with a few waves of desperate clearance priced offers by the data centers, then data center employees will one day stop showing up to work. Each data center could have a different story. CEO went AWOL? Employees just stop showing up (layoffs? died? stayed home to conserve gas? stayed home to protect family from bandits?). Security contractors abandoned the data center and other clients to take up a contract with government's last attempt to keep things under control? Decided to become a billionaire's armed militia?
As for personal computers, windows 10 encrypts user drives by default. Unless you're lucky and guess a bad password, only pre-2015 windows computers will be widely unencrypted. You might not be able to figure out how to login to that computer, but you'll be able to see some files with a linux liveCD/liveUSB.
I have no idea what percent of hobbyist linux desktop/laptop installs will be unencrypted.
While I agree with everything else, I setup a fresh win10 install yesterday and it didn't encrypt anything automatically (although the installer might have been old enough, I made the usb stick a couple years ago)
this what MS says:
power users hate making non-local accounts, but also IDK how many regular users have "supported" devices.
I had to login with an MS account before I could finish the install and create a local account, but I noticed I had the option to secure drives with bitlocker in the right click menu, I guess the registration process bypassed the automatic encryption