On Sun, 23 Apr 2023 17:41:48 -0400, MarioCPPP <
NoliMihiFran...@libero.it> wrote:
> tnx for competent advice.
> I have sort of 7-8 browsers installed and sure, I save
> everything.
>
> But not only web-browsing data were found. Every cut/pasted
> piece of text (from kate, LibreOffice, leafpad and other),
> every folder opened, every video played with VLC or
> SMPlayer, audio listened with clementine. Everything
> conceivable seems to have left traces.
> So I was wondering where from ... The browsers, yes, I knew
> they cached a lot, because now I make manual backups with
> FIND (including hidden dot files) and revise manually the
> outcome in kate and refine the dirt with RegEx, and
> regularly find a huge load of cached stuff under brower
> abscribable paths.
> But I did not expect that program was so smart in retrieving
> everything ! It seems to be able to decode every particular
> "format" used by all program installed, not just the place
> the info are stored.
> Seems more a FORENSIC TOOL than just a journaling utility !
Many programs store a list of recently opened files. Things from copy/paste
are not normally saved, but may be depending on the programs used and their
settings. Clipboard managers are an obvious case where the data is stored.
It depends on which desktop environment and clipboard program is being used
as to whether it's stored or not.
User data is stored in /home and /var with temporary things in /tmp and /run.
Programs can be designed to be easy to use, with lots of features or they can
be designed to be very secure. It's rare that user level programs are both easy
to use and highly secure.
Systems level programs tend to be designed to be secure, but are made as easy
as then can be while still secure. User level programs are generally designed
for ease of use with only as much security as can be gotten away with.
High security systems have as few programs installed as they can, and take extra
steps to minimize what's stored by them. Part of hardening a system is making
sure the number of programs installed (attack surface) is made as small as
possible.
Regards, Dave Hodgins