yes, getting a full file listing requires crawling the full file system? 😅
there are several forensic tools that can do this (in addition to hashing (md5) all files, and other stuff), this is a standard practice when doing a full IR investigation (vs triaging)
for linux and mac a full disk crawl/file listing is often a requirement if a full live response investigation is being done
for windows parsing the MFT file may be enough to get a full file listing (contains metadata for each file/directory on disk)
can u clarify the privacy question/thought?
its just metadata of all the files (ex: filename, directory, timestamps, attributes?)
a full file listing would only be needed when doing an investigation, (maybe hunting too, with limits ex: all files that have the extension ".dmp" or all zip files greater than 10GB in size (potential data staging))