Noah Pugsley wrote:
Can I interest you in a pair of steganograpanties? Or for cooler
weather, steganograpantaloons?
are you suggesting there are messages hidden in pictures of beck's ass?
the russians will be very upset. you should have taken thermite to those
disks...
Marco Peereboom
On 29 October 2009 c. 15:34:42 Jacob Yocom-Piatt wrote:
Noah Pugsley wrote:
Can I interest you in a pair of steganograpanties? Or for cooler
weather, steganograpantaloons?
are you suggesting there are messages hidden in pictures of beck's
ass?
the russians will be very upset. you should
2009/10/28 Noah Pugsley noa...@bendtel.com:
Can I interest you in a pair of steganograpanties? Or for cooler weather,
steganograpantaloons?
The problem with steganograpanties is that residual images of my ass
are present *underneath* the panties - therfore if the offending
Germans were to use
On Oct 27 16:12:54, Jordi Espasa Clofent wrote:
$ dd if=/dev/urandom of=disk_to_delete
$ dd if=/deb/zero of=disk_to_delete
?Do you think is it safe enough? I mean ?is it enough against the common
recovery low-level data tools?
Could we please stop this thread now and never bring it back?
Put the sensitive files in a pseudo-device vnd and then delete it.
2009/10/28 Jan Stary h...@stare.cz:
On Oct 27 16:12:54, Jordi Espasa Clofent wrote:
$ dd if=/dev/urandom of=disk_to_delete
$ dd if=/deb/zero of=disk_to_delete
?Do you think is it safe enough? I mean ?is it enough against the
On Wed, Oct 28, 2009 at 08:52:20AM -0300, Gonzalo Lionel Rodriguez wrote:
2009/10/28 Jan Stary h...@stare.cz:
On Oct 27 16:12:54, Jordi Espasa Clofent wrote:
Could we please stop this thread now and never bring it back? Thank you.
(1) Your data is not that interesteing to anyone. (...)
Jordi Espasa Clofent wrote:
Hi all,
The subject is auto-descriptive ;)
After reading a while about wiping [1] I think there's not a unique
way to do it. Finally I've chosen a simple double-step method:
First,
$ dd if=/dev/urandom of=disk_to_delete
and next
$ dd if=/deb/zero
2009/10/28 Joachim Schipper joac...@joachimschipper.nl:
On Wed, Oct 28, 2009 at 08:52:20AM -0300, Gonzalo Lionel Rodriguez wrote:
2009/10/28 Jan Stary h...@stare.cz:
On Oct 27 16:12:54, Jordi Espasa Clofent wrote:
Could we please stop this thread now and never bring it back? Thank
you.
or you should realize that you and your data really aren't that important.
On Wed, Oct 28, 2009 at 2:27 PM, Marco Peereboom sl...@peereboom.us wrote:
or you should realize that you and your data really aren't that important.
It's an issue about privacy, not self-importance. Pawn shops are full
of stolen computers with other people's data. That's the *only* reason
I
I would rather my family photos
Yeah, but I hike with bastards who take pictures of my ass and put it
up on the internet for all to see.. So how can I delete the data
from his web server? Is there some kind of remote bioctl --de-assify I
could run?
On Wed, Oct 28, 2009 at 01:44:00PM -0600, Bob Beck wrote:
I would rather my family photos
Yeah, but I hike with bastards who take pictures of my ass and put it
up on the internet for all to see.. So how can I delete the data
from his web server? Is there some kind of remote bioctl
On Wed, Oct 28, 2009 at 3:44 PM, Bob Beck b...@openbsd.org wrote:
Is there some kind of remote bioctl --de-assify I could run?
I'm not sure you can be de-assified.
What in the world do stolen disks have to do with over writing the
content on it?
On Wed, Oct 28, 2009 at 03:34:07PM -0400, Brad Tilley wrote:
On Wed, Oct 28, 2009 at 2:27 PM, Marco Peereboom sl...@peereboom.us wrote:
or you should realize that you and your data really aren't that important.
On Wed, Oct 28, 2009 at 4:22 PM, Marco Peereboom sl...@peereboom.us wrote:
What in the world do stolen disks have to do with over writing the
content on it?
The thread suggested svnd, softraid and cfs as a counter measure. An
encrypted disk with no key is effectively an over written disk. How
Then the question asked should be How do I keep my data safe if it's
stolen?, not How do I overwrote data on my not-stolen hard drive?
But if somebody would actually be able to sell your family photos to
the highest bidder, I'm extremely jealous. My family is not nearly so
interesting.
On Wed,
* Bob Beck b...@openbsd.org [2009-10-28 20:57]:
I would rather my family photos
Yeah, but I hike with bastards who take pictures of my ass and put it
up on the internet for all to see.. So how can I delete the data
from his web server? Is there some kind of remote bioctl --de-assify I
What, you have pictures of my ass too?
Obviously I must make something to write a random pattern over my
entire ass so that It won't be recognized if some germans steal it.
2009/10/28 Henning Brauer lists-open...@bsws.de:
* Bob Beck b...@openbsd.org [2009-10-28 20:57]:
I would rather my family photos
Yeah, but I hike with bastards who take pictures of my ass and put it
up on the internet for all to see.. So how can I delete the data
from his web server?
They'll use it as torture material during the next krieg.
On Wed, Oct 28, 2009 at 04:48:28PM -0600, Bob Beck wrote:
What, you have pictures of my ass too?
Obviously I must make something to write a random pattern over my
entire ass so that It won't be recognized if some germans steal it.
Can I interest you in a pair of steganograpanties? Or for cooler
weather, steganograpantaloons?
Marco Peereboom wrote:
They'll use it as torture material during the next krieg.
On Wed, Oct 28, 2009 at 04:48:28PM -0600, Bob Beck wrote:
What, you have pictures of my ass too?
Obviously I must
2009/10/28 Marco Peereboom sl...@peereboom.us:
They'll use it as torture material during the next krieg.
I never thought that an OBSD dev ass could be so destructive!
Hi all,
The subject is auto-descriptive ;)
After reading a while about wiping [1] I think there's not a unique way
to do it. Finally I've chosen a simple double-step method:
First,
$ dd if=/dev/urandom of=disk_to_delete
and next
$ dd if=/deb/zero of=disk_to_delete
?Do you think is it safe
Jordi Espasa Clofent wrote:
Hi all,
The subject is auto-descriptive ;)
After reading a while about wiping [1] I think there's not a unique way
to do it. Finally I've chosen a simple double-step method:
First,
$ dd if=/dev/urandom of=disk_to_delete
and next
$ dd if=/deb/zero
On Tue, Oct 27, 2009 at 04:12:54PM +0100, Jordi Espasa Clofent wrote:
Hi all,
The subject is auto-descriptive ;)
After reading a while about wiping [1] I think there's not a unique way
to do it. Finally I've chosen a simple double-step method:
First,
$ dd if=/dev/urandom
It may not erase all data if the device can do block relocation and you
don't have direct access to phisical blocks. But if data remains on
hidden or discarted blocks it is still hard to someone else recover it.
Jordi Espasa Clofent wrote:
Hi all,
The subject is auto-descriptive ;)
After
On Tue, 27 Oct 2009 17:14:52 +0100, Rene Maroufi wrote
Last year, I talked with a employee of a data recovery company about
this. My question to him was: Is it enough to overwrite a partition
or harddisk only once, or must i do this many times. His answer was:
On all modern harddisk its
On Tue, Oct 27, 2009 at 04:12:54PM +0100, Jordi Espasa Clofent wrote:
to do it. Finally I've chosen a simple double-step method:
First,
$ dd if=/dev/urandom of=disk_to_delete
and next
$ dd if=/deb/zero of=disk_to_delete
I overwrite the disk 7 times with arandom, using the following
On Tue, Oct 27, 2009 at 11:12 AM, Jordi Espasa Clofent
jordi.esp...@opengea.org wrote:
$ dd if=/deb/zero of=disk_to_delete
?Do you think is it safe enough? I mean ?is it enough against the common
recovery low-level data tools?
There is no evidence of over-written data *ever* being recovered.
On Tue, Oct 27, 2009 at 11:12 AM, Jordi Espasa Clofent
jordi.esp...@opengea.org wrote:
After reading a while about wiping [1] I think there's not a unique way to
do it. Finally I've chosen a simple double-step method:
You take the hard drive out, you melt it, then you put a new one in.
If your
Jordi Espasa Clofent wrote:
...
$ dd if=/deb/zero of=disk_to_delete
?Do you think is it safe enough? I mean ?is it enough against the common
recovery low-level data tools?
Do just this, and no software-based recovery tool will ever see all your
data again. You might get some pay-dirt if
On Tuesday 27 October 2009 14:12:56 Brad Tilley wrote:
On Tue, Oct 27, 2009 at 11:12 AM, Jordi Espasa Clofent
jordi.esp...@opengea.org wrote:
$ dd if=/deb/zero of=disk_to_delete
?Do you think is it safe enough? I mean ?is it enough against the common
recovery low-level data tools?
On Tue, 27 Oct 2009 15:25:51 -0400, STeve Andre' wrote
...The real danger today are
sectors that got mapped out which are bad, but could contain
interesting or embaressing data; 512 bytes could hold a lot of stuff,
like passwords.
Perhaps what I already noted, in this thread, suggesting
/dev/zero is like a bazillion times faster, and just as secure.
-B
p.s. Why do I have deja vu?
http://archives.neohapsis.com/archives/openbsd/2008-09/1453.html
http://archives.neohapsis.com/archives/openbsd/2008-09/thread.html#1215
On Tue, Oct 27, 2009 at 8:12 AM, Jordi Espasa Clofent
On Tuesday 27 October 2009 15:47:37 Josh Grosse wrote:
On Tue, 27 Oct 2009 15:25:51 -0400, STeve Andre' wrote
...The real danger today are
sectors that got mapped out which are bad, but could contain
interesting or embaressing data; 512 bytes could hold a lot of stuff,
like
Another route to securely erasing information is encryption. OpenBSD
includes at least 3 systems for disk encryption (svnd, softraid, and
cfs (ports)). I've personally used cfs and svnd, and as is usually
the case on OpenBSD, both work nicely once you RTFM. (I should really
write an undeadly
A paper has been published about the claim that you can recover data
with an electron microscope
(http://www.springerlink.com/content/408263ql11460147/).
Unfortunately the paper is not available for free, but the summary is
that after overwriting it 1 time you can't recover data anymore with
37 matches
Mail list logo