I am asking all minds who have an in-depth understanding of how Elite Proxies and Data Carving working. This is an important topic for me and I think for a number of other people as well, and as much as I love forum trolls as the next person threads tend to be over-shadowed by them. With that said I need help with the following (hypothetically): A fraudulent criminal act was performed using the premium version of the product hide-my-ip. The product claims that it uses Elite Proxies and the customer support states that no activity logs are kept. I have verified the raw header data with cloakfish and I am unable to trace the route past the proxy used. To this extend I can say with certainty that the ISP provider has been unable to do the same, otherwise this thread would not exist. Beyond this and assuming that a warrant can be used to access the Elite Proxy how hard and what actions would need to be taken to produce evidence showing that route and connection? Additionally the next question is Data Carving and how effective is a computer forensics expert at recovering lost data? For the hypothetical to be fleshed out, lets assume an unrelated warrant was used to confiscate the subjects computers and phone. During the course of the suspects use of these items there has been reformats and the primary drive of her computer uses a solid state drive. CCleaner was used and the DNS flushed routinely. All content when removed was cut and pasted to an external drive rather than deleted. During the course of the subjects web-surfing she used the program from sandboxie and TOR where critical work was performed. The question is how effective are the current techniques at data carving and can it fully be explained in layman's terms?