Topic
Forensic evidence
Articles on the forensic surface of digital infrastructure — what is recoverable from a compromised system, what is recoverable from operator-side logs, and the disciplines that narrow the recoverable record without eliminating it.
12 min read
Email as forensic evidence — what offshore mail hosting changes
A reading of the forensic surface of email — what the mailhost operator sees mechanically, what the operator does not, what TLS-in-transit and PGP narrow down — with notes on Swiss and Icelandic mail-server jurisprudence and the practical posture for an editorial-register customer.