Evading Digital Forensics

I don't support criminals, but evading forensics is also about privacy, not just breaking the law. For those with the interest and skill, check out the article for some tools used to evade detection of things you'd rather keep hidden. Here are some of them:
- Timestomp – Destroys the timestamp evidence of files on your computer. Probably not something you'd want to run willy-nilly.
- Transmogrify – Hide files by making them seem like other file types. For example, you have that picture of you in Tahiti, but you don't want someone who steals your computer to know it's there. Make it look like a text document.
- Slacker – Breaks a file up and hides it in the free space at the end of other files. This could be very dangerous to use because if those files change, your hidden file could be destroyed. I'd be curious to see how this works in practice.
- KY – Puts files into null directories. Most tools won't know the directory is there so your files will be hidden. This one has potential for home use. If I try it and it's good, I'll post it in my tools section.


