On Wed, Jan 13, 2016 at 11:00:09AM +1000, Paul Dale wrote: > On Wed, 13 Jan 2016 12:32:39 AM Viktor Dukhovni wrote: > > In most cases, just overwriting a disk with zeros is as good as > > with any other pattern. > > Peter Gutmann published a paper showing that it is possible to read zeroed > bits with the right equipment: > https://www.usenix.org/legacy/publications/library/proceedings/sec96/full_papers/gutmann/index.html > > I remember a report not long after the original paper was published where the > writer zeroed a drive and went to several data recovery companies who > couldn't retrieve anything (sorry, can't find the reference). > > Also note that this technique doesn't work on newer drives: > http://seclists.org/bugtraq/2005/Jul/464 > > > If you are protecting against governments or extremely well equipped > organisations, a zeroed disc might be recoverable with a large investment of > time and effort. If you are in this case and what you are protecting is > worth that much, follow use one of the approved secure disc erasure methods > -- several times.
There are various ways to do that, including: http://www.dban.org/ https://wiki.archlinux.org/index.php/Securely_wipe_disk http://www.killdisk.com/ Kurt _______________________________________________ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev