Techniques to subvert forensic recovery and post-compromise analysis. Includes hidden volumes, RAM OS use, secure deletion, memory defenses, and timeline disruption tactics.