BleachBit: Hillary’s gift to criminals …

How many times have you seen clips of the police confiscating a suspect’s computer for forensic analysis?

Pretty common on Forensic FIles, CSI and the 11 o’clock news, right?

And, the punch line is always the same …

The perps try to delete files & browsing histories, but unknowingly leave behind evidence.



Well, thanks to Team Hillary, FBI documents and a shout-out by Congressman Trey Gowdy, criminals now have no excuse for not covering their tracks.

Introducing to the American consciousness: BleachBit:


Here’s the story ….


You may remember that Clinton and her crack team of lawyers carefully (?) reviewed about 85,000 emails on Hillary’s private email server.

They turned about 55,000 work-related emails to the State Dept.

They deleted about 30,000 emails that they deemed non-work-related.  You know Chelsea’s wedding, yoga exercise routines, etc.

About half of the 30,000 “deleted” emails have been recovered forensically.

Hard to believe, but many of those were work-related.

The other 15,000 “deleted” emails haven’t been recovered yet … at least by U.S. government agents.

They were D-E-L-E-T-E-D (or “scrubbed” in tech-slang) using software called BleachBit.

Verbatim from the Bleach Bit web site:

BleachBit quickly frees disk space and tirelessly guards your privacy.

Free cache, delete cookies, clear Internet history, shred temporary files, delete logs, and discard junk you didn’t know was there.

Designed for Linux and Windows systems, it wipes clean a thousand applications including Firefox, Internet Explorer, Adobe Flash, Google Chrome, Opera, Safari,and more.

Beyond simply deleting files, BleachBit includes advanced features such as shredding files to prevent recovery, wiping free disk space to hide traces of files deleted by other applications, and vacuuming Firefox to make it faster.

Better than free, BleachBit is open source.

Let’s do some English translation:

Most crooks don’t know that files deleted by simply hitting the delete key are only kinda deleted.

They won’t show up in folder & file listings, but traces of them still remain on the computer.

Eventually, these traces are overwritten with other data … but for normal folks, that process takes a very, very long time.  Think, years or an eternity.

What BleachBit does is wipe out those traces immediately.

Boom.  GONE.


And, what about that “open source” claim?

So what?

Also from BleachBit’s site:

Perhaps Clinton’s team used an open source application because, unlike proprietary applications, it can be audited, like for backdoors.

“Closed-source software is easier for the NSA to backdoor than open-source software.”

English translation: “Catch me if you can … because you can’t.”



Summing up, BleaachBit proudly channels Congressman Gowdy’s shout-out:

She and her lawyers had those emails deleted.

And they didn’t just push the delete button; they had them deleted where even God can’t read them.

They were using something called BleachBit.

You don’t use BleachBit for yoga emails or bridemaids emails.

When you’re using BleachBit, it is something you really do not want the world to see.

@ThreatcoreNews compared the (Clinton) situation to the 18 minutes of audio erased from tapes from President Richard Nixon’s Oval Office.


Questions for FBI Director Comey:

(1) Do these seem to be the innocent actions to you?

(2) Do you feel a bit silly now?

Maybe you can use BleachBit and  permanently delete the stay-out-of-jail-free card that you dished to Mrs. Clinton.

Just wondering ….


P.S. BleachBit reports record traffic to their site.

Surprise, surprise, surprise.



Follow on Twitter @KenHoma            >> Latest Posts


One Response to “BleachBit: Hillary’s gift to criminals …”

  1. John Carpenter Says:

    I am willing…maybe…to believe the claim that BleachBit can erase all traces of a file on a C: Drive or any hardwired drive on a personal computer…possibly even a server. This type of software has been around for decades. While in the military I used it routinely to wipe computer files on computers with classified information. They basically overwrite files with repeating “0”, “1” and then do it again. Some only do the content of the file however and leave the file directory entry. But, especially for communications (e-mail, text)…, the hard-wired file is unlikely to be the only copy, or trace. So many internet users are using “backup in the cloud”, sometimes without even realizing it (think Apple Cloud) that there are copies of stuff everywhere. Also, think about the copies of files on your phone. Then think back to the last time you opened something like Google News and there were ads for something you recently looked at on eBay. That is because someone is keeping track of what you are doing. Soon, or maybe even now, it is not going to be too hard to track these cloud copies down. It is however, much much harder to delete these “cloud” files.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s