<p>2017/12/04 22:09 "Xen" <<a href="mailto:list@xenhideout.nl">list@xenhideout.nl</a>>:<br>
><br>
> Joel Rees schreef op 04-12-2017 0:56:<br>
><br>
><br>
>> Did you miss the part where some guy who was doing it for a living in 2009 gave a description if what he did and said explicitly how sucessful he was and gave some background on why the usual case, recovering data from a heavily used HD, was more successful than from a once-used, practcally empty HD?<br>
><br>
><br>
> One last thing, I asked a forensics guy and here is the epilogue from Gutmann himself:<br>
><br>
> <a href="https://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html#Epilogue">https://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html#Epilogue</a><br>
><br>
> The forensics guy says there is no validity to the claims whatsoever.<br>
><br>
> And that guy on that forum might just as well have been trolling.<br>
><br>
> And also:<br>
><br>
><br>
>>> You make some really vague statements.<br>
><br>
><br>
>> The air you breathe is all around you. Which direction should I point when telling you that air exists?<br>
><br>
><br>
> Since you give no direct answers I can only assume that you have none.<br>
><br>
> Which is what I originally wanted to say... :-/.<br>
><br>
> I guess I have been trolled.<br>
><br>
><br>
><br>
>>> You also don't allude which companies offer these (explicit) services.<br>
>><br>
>><br>
>> I guess you didn't look at the URL as you read the second one?<br>
><br>
><br>
> That was not a company doing that work. That was a training/expertise centre on general computer security knowledge.<br>
><br>
> An extremely broad consultancy firm, basically.<br>
><br>
> So yeah.<br>
><br>
> Debunked.</p>
<p>What was debunked?</p>