appreciate the responses nullius, been doing a lot of work on this the last few days. responses in bold below, and I remember zero part of the seed.
But I had another disturbing thought: Have you any way to verify that your coins have not moved? Do you have any other record of your Bitcoin addresses with balances? If at all possible, I would suggest you check them on the blockchain before you spend more effort and potentially much more money on data recovery.
I have the address and seeds have indeed not been touched. I kept them all in the same single address and not change addresses. I do have access to the last account the BTC were in, and which sent the full balance to the last account (had to switch wallets from the BCH airdrop)
If you did not have full disk encryption, and the seed was in a “sticky note” on your desktop, then you are gambling that either the thieves didn’t look at your files—or they were too abjectly stupid to realize what they had found. I sincerely hope that they were idiots who just want to grab a computer, install a fresh OS, and flip it for a few fast rupees. That seems likely, but uncertain. Nowadays, would even the dumbest thief grab a computer and not even pause to snoop for info on Paypal, credit cards, banks, etc.?
My desktop had a password on it, the thief seemed to just immediately sell the laptop to another person who wasn't malicious, just saw a good deal and bought a computer - saw it was locked so reinstalled the OS to be able to use the computer.
As for you—have the drives made any contact with a clean computer, via USB-SATA adapters or otherwise? If so, it may no longer be so clean. Better be safe than sorry.
Yes they have, but this whole thing was a bit of an odd situation, my fault, and the timing/computer logins of everything completely point towards a poor person stealing a computer, then selling it to someone in their low rent hotel. The person they sold it to seems nice, refugee from Pakistan and I met their whole family, he simply felt sorry and was very very happy to hand over the computer as I paid him 3x the price of what he paid for it
0. Temporarily disable my kernel’s drive-“tasting” functions, so that the kernel will not try to read partition information and filesystems. (The forensics wonk will probably tell me to use a “live CD” system, too.) Of course, my system does not have Autoplay; but even if it did, Autoplay would never start because the system would not reach the userland part of peeking at the drive.
1. Take an image of the drive with dd, a dead simple block copier with no imaginable attack surface via data passed blindly from the input file (drive) to the output file.
2. Try to interpret the image with carefully contained userland tools: ntfsprogs for NTFS, mtools for msdosfs/FAT filesystem... or in your case, just something which searches a huge file for binary patterns which look like an Electrum wallet file, regular expressions for a seed phrase, etc. The Forensics Wiki probably lists a good tool for that. Any which way, the point here is that tools which try to interpret data stay trapped in ring3. I would not mount the drive image. No, not even through FUSE.
This is where I'm at now. I made a clone of one of the drives that did not have the OS on it. 160gb of data was found by easeus software (recuva deep scan found nothing). None of the files have filenames, so its impossible to search for .snt files, .dat files, electrum, or otherwise. It feels like an overwhelming amount of data to sort through, half of it compressed. I've spent hours going through it so far and absolutely nothing.
Any which way, good luck recovering your private keys.
So I have no hints about the seed, and am scared to clone my other M2 drive which has the OS and other data, some of which has surely been overwritten. I don't want to mess anything up more. I've contacted many, many firms around asia and nobody seems very helpful, not even telling me their methods used for attempted recovery. I wanted to know if they use non-invasive methods, what types of hardware (PC3000),if they do binary code extraction, etc etc. Their canned responses were always along the lines of 'we are professionals and have a clean room and good technology.' Just don't feel comfortable with them besides one company in Singapore I might try. Another option is USA, where I spoke with someone at length from DriveSavers who seem extremely professional and seems to think there is a decent chance of recovery. They don't even charge unless the specific data I'm looking for is recovered.
So, that's my next step, trying to find a M2 USB to SATA cable here to clone my M2 drive, which I'm not as hopeful about since its been overwritten, and then either ship the drive off or start flying around the world in search of companies that have non-invasive methods of attempting to recover. If not, save the drive in a secure location and maybe in 20 years new tech will be out that can recover everything.
Nice to hear that Kroll OnTrack worked decently for you, appreciate that comment. they were the one firm in singapore that after explained in a chain of 5+ emails that 'we so professional and has clean room sir' is simply not good enough for me, she connected me with a higher up in the company who explained more of their procedures and they have some top technology that may be able to help me. It's not a huge amount of coins, but obviously enough to dedicate my life to attempting recovery for quite some time.
The problem with easeus is that 80k files were found and none have file names.
https://gyazo.com/8b7b63f5bf5acafafdb0b39cf9d9bfb8really do appreciate the responses. Been working on this night and day