• The trouble here is that if you have been hacked, by definition something has happened to compromise the security of your computer. Thus, you're already in a flaky situation. If you could create such a system, that new system would just become a target for hackers - after all, if I can pull off a hack and leave the new digital tamperproof seal in place, wouldn't that be the best hack ever?

    Worse, the number one (by far) best way to hack a computer is to get the user to do something stupid. MOST hacks are because a user clicked on something the system warned them they shouldn't click. And people do it anyway. So, the number one security vulnerability in any computing system is the user.

    But the best news is that hiding tracing of how a hack happened is really, really, hard - nearly impossible hard. Which is why computer forensics is a thing. As always, as a victim, your best bet is going to be to get a good lawyer. And a hire a forensics expert.

  • Voted!
    Need karma! Please check submission guidelines.
    Paid!
    Why pay twice?