Skip to content

Limitations

Read this before you build habits around NAILS

Section titled “Read this before you build habits around NAILS”

NAILS is designed to increase the work required for disk forensics after proper deactivation. That is useful, but it is narrower than many people first assume.

  • memory forensics during or shortly after active use
  • hardware implants, keyloggers, and firmware compromise
  • coercion, legal compulsion, or physical observation
  • operator mistakes such as identity crossover or leaving hidden storage mounted

Security products lose credibility when the important warnings are buried. This page exists so you can rule NAILS out early if your threat model needs something else.