On Tue, Apr 26, 2011 at 10:54 AM, Aaron Toponce <aaron.topo...@gmail.com> wrote: > On Tue, Apr 26, 2011 at 10:32:28AM -0600, Nicholas Leippe wrote: >> Well, it only takes a single 0 pass to sufficiently make the data >> unrecoverable w/o extremely expensive forensics (you will have to use >> a microscope directly on the platter and attempt to read residual >> signal levels--which will be complicated by the drive's internal >> signal encoding scheme. But, on 1TB it will still take a few hours >> even for that first pass. > > I would like to see evidence that, given todays drive densities and > recording techniques, someone or some company have successfully recovered > data after a single pass of zeros on the disk level.
Such evidence may never be publicly available--it may not be a capability you would readily advertise. I have no doubt that some agency, somewhere, has put some effort into at least trying. Whether anyone has ever succeeded is anyone's guess. > > Suppose it is possible. Then the speed at which to recover 1TB of > single-pass, overwritten data would take ages, not a few hours like you > presume. Consider the following snippet from [1] using an MFM: I never said that you could *recover* the overwritten-data in a few hours--I said that *writing* a single 0s pass over 1TB takes at least a few hours. Recovering that data, if even possible at all, would be a monumental task--thus the cost would have to be justified. The paper you linked highlights much of the difficulty of such an endeavor. I do know a little bit about secure data deletion--I produced commercial deletion software and have read many of the published studies on the matter. It is my opinion currently that a single 0s pass is for all intents and purposes sufficient to delete data from modern rotating magnetic media. However, there are still other issues to consider--such as retired sectors which are no longer user-addressable. In order to clear these you must presently rely upon the firmware supporting the (optional) ATA Secure Erase Enhanced command--not just the Secure Erase command which is only required to erase user-addressable sectors. However, accessing the data on those retired sectors would again require some expensive expertise and equipment--such as the company whose white paper you linked: > 1: http://goo.gl/mIwFr (PDF) > [snip] > > The fact of the matter is, getting data off a disk that HASN'T been > overwritten is daunting in and of itself, as that paper I have linkd to > confirms. Funnily enough the white paper you linked is essentially an advertisement from a company that claims to have just this capability. It details how they do it, and yes, it is a very daunting task. They outline how recovering data from *failed* drives can be very difficult to impossible depending on the nature of the failure. However, their solution should work quite well for drives that have merely been incapacitated in any manner that leaves the platters in-tact, provided that recovery is not further impeded by inaccessible unit-specific calibration parameters. IOW if the drive was healthy before the user in a fit of panic damages the servo, PCB, connector, or whatever but leaves the platters in-tact, these guys might still successfully extract the data. Also, with their solution scanning remapped sectors is a non-issue (although they may be damaged and thus partially or completely unreadable, of course). > And you want to get at overwritten data, yet you think that if you didn't do > the 35 Gutmann pass, it's not good enough. Accessing overwritten data is an even bigger task. It depends on the ability of the tool to distinguish residual signals in the guard band. The paper you linked expresses that this is clearly possible, and that successfully imaging a drive including the guard band contents has even been demonstrated, but that extracting actual data from the guard band of such imaging has not been demonstrated yet--as you mentioned. It would require considerable resources to do so--lots of disc for the resulting image, and lots of CPU power for the image processing. Difficult, yes. Possible, yes. Demonstrated commercially yet, no. Done anywhere yet, who's to say. My conclusion is that if your data is so valuable that whoever, if anyone, has this capability would be willing to use it to get your data, then, and only then is a single 0s pass insufficient to destroy your data while leaving the drive in-tact. Because if you happen to have data that is that valuable, you aren't going to be deleting drives to protect it anyways--you are going to be physically destroying the drives. Thus, unless you're a super secret spy or a super nasty arch-villain-of-the-world, a single 0s pass is enough. /* PLUG: http://plug.org, #utah on irc.freenode.net Unsubscribe: http://plug.org/mailman/options/plug Don't fear the penguin. */