Yes. There was a discussion on bugtraq (or focus-linux?) a while back, I
believe. Essentially, the best way to delete your data is to never store
it unencrypted, and make sure to use a good crypto algorithm. You could
always piece together a shattered hard drive and then read that, whereas
brute forcing the encrypted data is mathematically just not going to
happen.

Of course, they could still conceivably read your RAM, so you'll need to
physically destroy/hide that, too. And your crypto key! Breaking into
your house and stealing that hidden USB key is a serious issue...

-DMZ

On Wed, 2005-11-02 at 12:06 -0500, Ritchie, Josiah S. wrote:
> I assume this would have to be done from the start of creation of data
> that concerns you though? 
> 
> JSR/
> 
> -----Original Message-----
> From: UM Linux User's Group [mailto:[EMAIL PROTECTED] On Behalf
> Of Don Schmadel
> Sent: Wednesday, November 02, 2005 11:56 AM
> To: [email protected]
> Subject: Re: [UM-LINUX] "Secure File Deletion"
> 
> Another approach is to encrypt the drive or partition and use a serious 
> password. Then complete erasure is unimportant.
> 
> -Don 
> 
> 

Reply via email to