Wiping Out Data
Jeffrey F. Bloss
jbloss at tampabay.rr.com
Wed Mar 28 19:34:44 UTC 2007
Matthew Flaschen wrote:
> Jeffrey F. Bloss wrote:
> > I'd wager that dd fails in this context too, even if as Matt suggested
> > you immediately recreate a file system on the "overwritten" device.
>
> Well, that explains why dd is useless for this. However, I
> /recommended/ shred, which does work.
That's what I've always used, and it certainly does work better than
dd. But just to beat the dead horse one more time, on journaling file
systems or any other "caching" scenario shred is likely to fail too.
Not as horribly as dd perhaps, but in the context of a powerful
attacker's ability to recover data forensically it's still a crap shoot
in my opinion. Degaussing is a better option if you can swing it, but
in the practical world the only truly secure way to keep data from being
recovered is strong encryption... making the issue of physical recovery
irrelevant.
Of course in the *practical* world 'rm' might be enough if your
"attacker" is very weak. ;-)
--
_?_ Outside of a dog, a book is a man's best friend.
(o o) Inside of a dog, it's too dark to read.
-oOO-(_)--OOo------------------------------[ Groucho Marx ]---
http://wrench.homelinux.net/~jeff/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 892 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-users/attachments/20070328/d5c05f70/attachment.sig>
More information about the ubuntu-users
mailing list