sanitizing disc
Patrick Asselman
iceblink at seti.nl
Mon Feb 3 08:16:37 UTC 2014
On 2014-02-03 04:34, Karl Auer wrote:
> On Mon, 2014-02-03 at 02:40 +0000, Liam Proven wrote:
>> DBAN is the tool of choice.
>>
>> *More* secure than taking a hammer to it. Data can still be
>> recovered from that.
>
> If you pulverise the platters and shatter the chips, there is no way
> to
> recover more than the odd bit or two, and that only if you are lucky
> and
> at very high cost in time and effort. Whereas any software process by
> definition can only destroy what the drive allows to be destroyed.
> DBAN
> does nothing that shred doesn't do in that regard (as far as I can
> tell
> - happy to be corrected if DBAN takes special technical steps).
>
>>From my reading, and with respect to modern disks, a single overwrite
> with random data is ample protection against anything but an
> expensive
> and sophisticated attack. If you have data that is so valuable you
> are
> actually concerned about an expensive and sophisticated attack, you
> should destroy the drive. Shredding it (physically) is a good move,
> especially if the shreds are then widely dispersed. But for all but
> the
> most obsessively paranoid - or possessed of the most amazingly
> sensitive
> data - four or five blows with a sledgehammer will do the job just
> fine.
> And it's MUCH quicker than using DBAN or shred, plus it requires only
> the cheapest of support hardware.
>
> Of course, the TRULY obsessive will run DBAN or shed *then* destroy
> the
> drive :-)
>
> Regards, K.
If you live in the UK you can also claim to be a reporter and have some
data on the disc that came from the NSA. The authorities will then come
and grind your disc for you, or so I am told. Downside is they will also
grind your motherboard and memory chips, but surely that is a small
price to pay for a perfectly secure government-overviewed data
destruction :-P
Best regards,
Patrick Asselman
More information about the ubuntu-users
mailing list