xeon Posted April 16, 2018 Report Share Posted April 16, 2018 Can this tactic be used with EAM? https://www.csoonline.com/article/3268813/antivirus-software/law-enforcement-uses-anti-virus-software-to-recover-suspects-web-history.html Link to comment Share on other sites More sharing options...
Elise Posted April 16, 2018 Report Share Posted April 16, 2018 No it can't because we don't collect that information. To read more about this: https://blog.emsisoft.com/en/26117/https-interception-what-emsisoft-customers-need-to-know/ Link to comment Share on other sites More sharing options...
xeon Posted April 16, 2018 Author Report Share Posted April 16, 2018 I understand Emsisoft doesn't collect that information, but what about " SQLite file left behind by anti-virus vendors has profound privacy implications." ? Thanks Link to comment Share on other sites More sharing options...
Elise Posted April 17, 2018 Report Share Posted April 17, 2018 That file is not used nor collected by us, for that reason this simply doesn't apply. Link to comment Share on other sites More sharing options...
JeremyNicoll Posted April 17, 2018 Report Share Posted April 17, 2018 The logs.db3 file, in: C:\Program Files\Emsisoft Internet Security\Logs is also an SQLite database, containing various tables of data, presumably all (or mostly) information that's visible via the GUI using the logs display. A user who's paranoid might want also to purge old scan reports (as those used for scanning specific files list those files' names), and certainly ensure that no old debug log files were lying around. Link to comment Share on other sites More sharing options...
Elise Posted April 17, 2018 Report Share Posted April 17, 2018 Your computer is full with more or less personal data, if it's searched by law enforcement they'll be able to find personal data no matter what. The article talks about Avast that leaves an easily readable file containing browser data. This is not the same as having system logs that show when the AV was updated, what files or urls were blocked and such. In other words, no matter if you use incognito mode or browse normally, the only URL or files showing up in our logging database are those that are detected. It is impossible to use that database to track your browsing history. Link to comment Share on other sites More sharing options...
JeremyNicoll Posted April 17, 2018 Report Share Posted April 17, 2018 Sure, I understand the difference between the EAM SQLite logs.db3 file, and the Avast browser log one... but it's possible that the OP might have thought your earlier reply implied that EAM leaves no SQLite file(s) in place. Of course the SQLite-ness of the files is an irrelevancy - it's just a convenient database format. A system log that shows which URLs you attempted to visit, which were blocked, does though show some of your browsing history and I suppose if someone tried to visit a whole set of such sites then they might regard the info in the blocked log entries as a problem. Your GUI does allow a user to clear the logs though. Link to comment Share on other sites More sharing options...
Elise Posted April 17, 2018 Report Share Posted April 17, 2018 Yes, I was referring to the content of the file, not any database file obviously. Logging itself is not bad, logging private information is another thing. Link to comment Share on other sites More sharing options...
bobbonomo Posted April 17, 2018 Report Share Posted April 17, 2018 If they grab your computer, they will also be looking at the physical disk sector by sector using a forensic program. They will look for keywords or all readable words then choose to look at words of interest and hunt. So you better wipe those "old" logs. Now what about all those temp files which are created and deleted on the fly by the apps and OS? So wipe the free space? At what frequency? Ah! You have a 53.7% full 3TB disk. How much time to do? What about all those trackers you leave around the world from all the SM platforms. If you are in that type of environment, then you might as well be using something like Tails (TOR app). Does not use the disk and wipes RAM memory and video before shutting down. I actually use my browser logs as a filing cabinet so I can search keywords for articles I have read. Regularly I clean it of fluff. Link to comment Share on other sites More sharing options...
McFarlandIT Posted April 18, 2018 Report Share Posted April 18, 2018 Trust me. If Cyber forensics wanted to find your child porn and other nasty stuff on your machine, there would be a lot more places to find it than your Antivirus. and Emsisoft I trust 100% with what it stores and doesn't store. Personally I don't care. Link to comment Share on other sites More sharing options...
bobbonomo Posted April 18, 2018 Report Share Posted April 18, 2018 You targeted child port to which 99.999% of people would respond with "I don't care" [about my stuff being discoverable (my editorial)]. People always zoom in on this point. That's not the point. Change the target. You are a journalist working in Liberia and your laptop is seized by that "benevolent government". One of your colleagues got popped. Now do you care? I can think of umpteen similar situations and go on and on. Privacy is privacy... the bad comes with the good. What's the alternative? Bring back the little man, from the 30s, with the funny moustache and hair. He would love what we got. NO not Charlie Chaplin. 1 Link to comment Share on other sites More sharing options...
xeon Posted April 20, 2018 Author Report Share Posted April 20, 2018 On 4/18/2018 at 12:10 PM, McFarlandIT said: Trust me. If Cyber forensics wanted to find your child porn and other nasty stuff on your machine, there would be a lot more places to find it than your Antivirus. and Emsisoft I trust 100% with what it stores and doesn't store. Personally I don't care. What has "child pron" have to do with this topic, Sicko. Link to comment Share on other sites More sharing options...
Elise Posted April 20, 2018 Report Share Posted April 20, 2018 I think it was just an example used here. Law enforcement won't typically want to investigate any computer without there being a reasonable suspicion of something illegal going on. 1 Link to comment Share on other sites More sharing options...
xeon Posted April 20, 2018 Author Report Share Posted April 20, 2018 I am concerned with privacy and most people should too. I just hate when the people who don't care (about privacy) always try to bring it down to the lowest common denominator. Link to comment Share on other sites More sharing options...
McFarlandIT Posted April 26, 2018 Report Share Posted April 26, 2018 What Elise said. It's an example. I've seen many many real examples of that as well. Most of the time RCMP need to investigate something on someone's computer is that reason, or other hate crimes, or online-predators. Link to comment Share on other sites More sharing options...
xeon Posted April 26, 2018 Author Report Share Posted April 26, 2018 I like my computer to be a closed book, not for any prying eyes. If it is not possible, I will try my best."Hate" Crime? All crimes are backed with "hate", what a laugh. I guess it is called a "like/love crime" to assault, burglarize, rape someone of your own race, or gender, for example? But I digress. Link to comment Share on other sites More sharing options...
Elise Posted April 27, 2018 Report Share Posted April 27, 2018 Please stop accusing people of saying things they did not. Everyone is entitled to their own opinion and terms related to criminal behavior can certainly be discussed, but this forum is not the right place for that. Since your original question has already been answered, I am locking this topic. 1 Link to comment Share on other sites More sharing options...
Recommended Posts