>>22617229if we dont see you do it, we have no suspicion to believe you did. Just keep your mouth shut, and you will be fine(just be polite and ask for your lawyer, no need to be rude or obnoxious).
>>2261720490% of the worlds computers run windows, so, its statistics. I have only seen 1 linux machine in 3 years of doing this. OSx is more common than linux
>>22617216you would get 5 years for evidence tampering and destruction if we saw it, and recovered all or part of the sdcard. most first time offenders on CP only get a slap on the wrists, and sometimes dont even have to register as a sex offender, and only very rarely do prison time(only if they created content).
>>22617228well, they usually have you caught downloading something from them, in all or in part(honeypots are legal, as long as the files are fake, they can infer that if you were trying to download something with the obvious name that clearly made it CP, that you were downloading something else too, which this will get them a search warrant). The other way is that they see your IP listed as a peer that has a file they know is CP(hash checking negates any name change), and they download its hash. that will also get them a warrant. These alone would not stand in court, so they rely on people actually having stuff on their computers to get a conviction or bargain. Also, we get driven pretty hard to find stuff. We start with the obvious(looking for hidden pictures and files), then we look for pictures hidden within pictures, then we look for hidden volumes on the disk(pretty easy to ID after a few tries), and then we try to see whats in that hidden volume. If its encrypted, we will know what software did it, by way of what software was run historically(portable versions leave many traces), and what was installed. Data recovery also is quite common. Even with 1 pass overwrites, we can still get some stuff back.