Other subs in the v/Pizzagate network:
v/pizzagate - The main investigative subverse.
v/pizzagatewhatever - Anything Pizzagate-related goes
v/pizzagatememes - All pizzagate memes
v/pizzagatemods - Meta discussion/ discussion about Pizzagate moderation
SUBVERSE RULES
Rule 1: All Submissions must be about pizzagate or the pizzagate investigation. Off-topic submissions will be deleted.
Rule 2: Submissions should be questions, or answers to questions.
Rule 3: All answers must be sourced, and those sources must also have citations. We encourage the self-moderation of this rule by asking subverse members to actively downvote posts which do not have proper sources for their claims, or which are misleading in nature.
Rule 4: No spam. Duplicate or multiple posts (posts with the same title/with the same postbody/which link to the same page) and spam will be deleted.
This is not necessarily a place to bring all topics which have been deleted from v/pizzagate. If your submission had been deleted just because it was an unsourced post and was a question, then you can probably post it here and get an answer. If you are asking about debunked leads, post at your own risk.
view the rest of the comments →
[–] facevalue 0 points 1 point 1 point (+1|-0) ago
Do you have a link to an article detailing the release or anything?
If the release is a "hard drive" then it could contain any number of malicious things. If it is an image of a drive then just mounting it could cause harm.
Best bet would be to copy the data to a freshly provisioned computer that has nothing on it but a fresh OS install and whatever applications required to access the data. Make sure this isolated computer has no internet or network connection or wifi capability. View the data as you like, then wipe the drive when you're done. This will prevent 99.9% of possible negative effects.
Regarding tracking, there will be obtainable proof of your posessing/accessing the data the instant you download it.
[–] the_sharpest_knife ago
Can always use a virtual PC.
https://www.virtualbox.org/wiki/VirtualBox
http://www.vmware.com/products/player/playerpro-evaluation.html
https://www.sandboxie.com/
[–] facevalue 0 points 1 point 1 point (+1|-0) ago
VMs can certainly be used for convenient sandboxing and isolation but in the past there have been exploits that provided processes on the VM access to the physical hardware and host OS. I assume that similar vulnerabilities are known but remain unpublished today. Of course I'm going full blown tinfoil hat here - using a VM in this scenario would probably be fine.
[–] neverobey [S] ago
thank you very much. I was talking about this.