ronys wrote:
Hi Shachar,
'urban legend' may be a bit strong. The reference I had in mind was
http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
<http://www.cs.auckland.ac.nz/%7Epgut001/pubs/secure_del.html>
which is a bit dated (circa 1996, plus a couple of undated epilogues),
but still an interesting read.
Of course, if you're going to keep sensitive data on magentic media,
it's *much* easier to use an encrypted partition (e.g., dm-crypt
http://www.saout.de/misc/dm-crypt/ or TrueCrypt
http://www.truecrypt.org/) and securely destroy the keys.
Rony
Thanks. That seems like an excellent resource (with reasoning, unlike
what I'm used to :-).
I haven't delved into it, yet, but its description of how the drive
actually writes data to the disk differs dramatically from what I
remember described the last time I saw a description of the recovery
process (it claims the 1 and 0 are merely encoded as magnetic polarity,
while I remember them being modulated on a sine wave). Which it actually
is, I'm not sure, but the reasoning your article states for using random
data (create as low a frequency as possible given the disk's RLE) is
negated if the data is actually modulated.
Unfortunately, I have lost track of my previous source, but pending
further analysis, I'm willing to retract my definitive claim that
needing to use random data is an urban myth.
Shachar
--
Shachar Shemesh
Lingnu Open Source Consulting Ltd.
http://www.lingnu.com
_______________________________________________
Linux-il mailing list
Linux-il@cs.huji.ac.il
http://mailman.cs.huji.ac.il/mailman/listinfo/linux-il