We Love Trash

by Oscar T. Grouch

This is a tale of caution.

Most all of you hacker-types reading this already know to always wipe any old hard disk before disposal - ideally, multi-pass drive wipes follow by partitioning as a LUKS volume with drive encryption.

These baselines are out of scope for this article, to tell you the real story.

When I found this data on the Windows trashed laptop, I wrote my findings in a notebook, then multi-pass wiped the laptop disk.  These files were not even deleted, so no NTFS recovery needed to review drive contents.

Enter the Dragon

This tale starts by my walking home from working in a major metropolitan city near the East Coast.  Walking along, I saw a trash management employee giving someone else a laptop.

I went over to learn more.  Talking to the sanitation workers, they told me people throw away multiple laptops all the time.  They noted seeing a dozen laptops a week in the trash, easily.  I struck up a conversation and was given a free 17-inch HP laptop running Windows 7 with a dead laptop battery.  Two minutes later as I loaded lappy into my backpack, they found a matching power supply.  I added that into my bag.

Game On!  Time to go home and check this out!

I got home, grabbed one of my favorite Linux Live USB sticks (Ubuntu, Kali, Tails, TempleOS, Hannah Montana Linux).

Once booted up, your favorite hacker mounted the Windows volume, then browsed the "C:\Users\%username%" folder.

These details are facts I obtained.  I was so stunned that I called my wife over to confirm this event was real.  This is the story of a restaurant with zero data integrity.

The disk was reviewed and wiped in September 2019 (pre-COVID - the world seemed so simple then).

The Goods

I recognized the company name.

I ate dinner there a few months ago and laughed when I recalled why the place sounded familiar.

On the desktop, files of note:

The archive data went from 2015 to February 2018. Digging more, this laptop had been in use since 2013.

Data, Data, More Data

Found an advertisement for Valentine's Day 2018, food menu specials, and payroll details for January 29, 2018 to February 11, 2018 - names, positions, hours worked, hourly pay, net pay.

Pause to reflect.

This is a ton of data and I have more.  Please wipe business and personal details.  I could have committed tons of fraud with this data.

I still have a few more cringe details to wrap this article up.  I appreciate your patience as a reader.

Some files ask for a password to open, most files do not.

Writing this out was longer than I expected.

May this article go easy on the 2600 editorial staff.  Redact names if necessary, but I felt sharing that I had both owners' names solidifies the concern in the discoveries.

Wipe and/or encrypt your disks.

Might I suggest amateur forensics to learn more.

Also, if using Linux, create a LUKS volume with an encryption passphrase to encrypt the whole disk.

You can then create EXT4 data volumes.

Return to $2600 Index