Sandy Harris writes:
>Yes, but that paper is over ten years old. In the meanwhile, disk designs and
>perhaps encoding schemes have changed, journaling file systems have become
>much more common and, for all I know the attack technology may have changed
>too.
It's nearly fifteen years old (it was
On Mar 9, 2009, at 10:32 PM, Mads wrote:
I know of procedures and programs to erase files securely from
disks, Guttman did a paper on that
What I don't know is how to securely erase information from a
database.
If the material is that sensitive, and you only want to selectively
d
On Mon, Mar 9, 2009 at 10:32 PM, Mads wrote:
> I know of procedures and programs to erase files securely from disks,
> Guttman did a paper on that
Yes, but that paper is over ten years old. In the meanwhile, disk
designs and perhaps encoding schemes have changed, journaling
file systems have
> What I don't know is how to securely erase information from a
database.
>
> I cannot assume that the vendor solves this matter, anyone have a
clue?
I'd say your assumption is valid. This is not to disrespect the
database vendors, but to point out that their risk modelling is
generally significa