LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - General
User Name
Password
Linux - General This Linux forum is for general Linux questions and discussion.
If it is Linux Related and doesn't seem to fit in any other forum then this is the place.

Notices


Reply
  Search this Thread
Old 07-06-2005, 10:23 AM   #16
whizbit
Member
 
Registered: Jul 2005
Location: uk
Distribution: mandriva....not out of choice
Posts: 65

Rep: Reputation: 15

ok changing the file type dont do anything but if u chagne the waythe data waas stored..not accessed stored....u will get a truly un peneative thing
just what u want to use as the extra key if u introuble
we all now u can represent differnt data using just a switch
 
Old 07-07-2005, 03:56 AM   #17
ddaas
Member
 
Registered: Oct 2004
Location: Romania
Distribution: Ubuntu server, FreeBsd
Posts: 474

Rep: Reputation: 30
Quote:
No it cannot. They have forensic specialist nowadays that are able to retrieve data from hard disks that have been wiped several dozen times and or even if the drive has been burned even..
So you say that those "secure erase Programs" are just publicity and nothing more?

What about secure erasing algorithms: Gutmann, US DoD 5220.22-M etc???

How could they recover data after a safe erase??
 
Old 07-08-2005, 03:31 AM   #18
ddaas
Member
 
Registered: Oct 2004
Location: Romania
Distribution: Ubuntu server, FreeBsd
Posts: 474

Rep: Reputation: 30
Could you please explain a little?
Quote:
quote: No it cannot. They have forensic specialist nowadays that are able to retrieve data from hard disks that have been wiped several dozen times and or even if the drive has been burned even..



The rm command deletes only the index note (i-node) of the file but not the content of the file.
There is the gnu shred utility which pretends to safe-erase a file. http://www.gnu.org/software/fileutil...d%20invocation
 
Old 07-08-2005, 03:52 AM   #19
Tinkster
Moderator
 
Registered: Apr 2002
Location: earth
Distribution: slackware by choice, others too :} ... android.
Posts: 23,067
Blog Entries: 11

Rep: Reputation: 928Reputation: 928Reputation: 928Reputation: 928Reputation: 928Reputation: 928Reputation: 928Reputation: 928
There's cryptographic and steganographic file-systems
around, with kernel 2.6 you can just set-up one large file via
crypto loop. The data is then going to be as safe as your
will to resist handing out your pass-phrase.



Cheers,
Tink
 
Old 07-08-2005, 08:58 AM   #20
Michael Johnson
Member
 
Registered: Jul 2005
Location: Wagga Wagga, Australia
Posts: 262

Rep: Reputation: 30
You create an encrypted file system within a file on your hard drive much like an iso image. You mount it through the loop mount system. You now have an encrypted file system on top of your current file system. I don't know the full details. Check "man mount".
 
Old 07-08-2005, 09:18 AM   #21
oneandoneis2
Senior Member
 
Registered: Nov 2003
Location: London, England
Distribution: Ubuntu
Posts: 1,460

Rep: Reputation: 48
http://archives.linuxfromscratch.org...ry/001528.html
 
Old 11-02-2005, 07:43 AM   #22
JZL240I-U
Senior Member
 
Registered: Apr 2003
Location: Germany
Distribution: openSuSE Tumbleweed-KDE, Mint 21, MX-21, Manjaro
Posts: 4,629

Original Poster
Rep: Reputation: Disabled
Quote:
Originally posted by Tinkster
There's cryptographic and steganographic file-systems
around, with kernel 2.6 you can just set-up one large file via
crypto loop. The data is then going to be as safe as your
will to resist handing out your pass-phrase.
Well, have a look here:

http://www.truecrypt.org/

"Main Features:
It can create a virtual encrypted disk within a file and mount it as a real disk.
It can encrypt an entire hard disk partition or a device, such as USB memory stick, floppy disk, etc.
Provides two levels of plausible deniability, in case an adversary forces you to reveal the password:[list=1][*]Hidden volume (more information may be found here).[*]No TrueCrypt volume can be identified (TrueCrypt volumes cannot be distinguished from random data).[/list=1]
Encryption algorithms: AES-256, Blowfish (448-bit key), CAST5, Serpent (256-bit key), Triple DES, and Twofish (256-bit key). Supports cascading (e.g., AES-Twofish-Serpent).
Based on Encryption for the Masses (E4M) 2.02a, which was conceived in 1997. "

That looks more like it ... I'll definitely have a look at this.

@Tinkster...seems life is beginning to provide the need after the question ... look at this: http://www.heise.de/newsticker/meldung/65649

Last edited by JZL240I-U; 11-02-2005 at 07:44 AM.
 
Old 11-02-2005, 04:12 PM   #23
tkedwards
Senior Member
 
Registered: Aug 2004
Location: Munich, Germany
Distribution: Opensuse 11.2
Posts: 1,549

Rep: Reputation: 52
Quote:
So you say that those "secure erase Programs" are just publicity and nothing more?

What about secure erasing algorithms: Gutmann, US DoD 5220.22-M etc???

How could they recover data after a safe erase??
A secure erase (ie. writing over the disk multiple times with a data generated by a good algorithm) is probably going to defeat most software attempts to recover data. However a properly equiped lab with equipment such as an electron microscope has a good chance of recovering data from the disk platters even after rewriting over it multiple times. Most government security agencies simply destroy hard disks instead of trying to wipe them - after all its probably quicker and cheaper anyway and its certainly more reliably secure.

Also yes most 'secure erase' programs are driven more by good marketing than anything else, especially windows ones. In the Linux world the KDE people have long since taken out the 'Shred' option in Konqueror to delete files because with everyone using journaled file systems (ext3 instead of ext2) it gives a false sense of security. See also the CAUTION section in `man shred` - with open source the authors are usually more honest about their program's capabilities than a lot of the over-hyped semi-junkware in the Windows world.

Last edited by tkedwards; 11-02-2005 at 04:18 PM.
 
Old 11-02-2005, 11:29 PM   #24
ahedler
Member
 
Registered: Oct 2005
Location: A safe distance from Detroit
Distribution: SuSE 10.0, Knoppix
Posts: 99

Rep: Reputation: 17
Here's a stupid simple one (maybe just stupid?) that many don't think of. It won't stand up to really careful scrutiny, but it's less than obvious to the casual observer, and I don't thnk you can actually get around it unless you can umount filesystems.

Put the stuff you want to hide in some directory.
Mount a filesystem on that directory.

The contents of the directory will be hidden by the mounted filesystem, and will not show up until the filesystem is umounted. If someone goes to the trouble of checking disk space used, there will probably be a discrepancy, but it won't be real obvious where the stuff is until the covering filesystem is umounted. Granted, it's not bulletproof, but it's simple and free. Security by obscurity. Let me know if you try it. I found it by accident (SUS - stupid user syndrome).

-Alan
 
Old 11-03-2005, 03:12 AM   #25
cs-cam
Senior Member
 
Registered: May 2004
Location: Australia
Distribution: Gentoo
Posts: 3,545

Rep: Reputation: 57
http://www.dfrws.org/2005/proceeding...in_journal.pdf

That might be of some use. Another possibility would be to create a backup of the disks partition table, create a partition to store your data. backup the new partition table and then restore the old one. Nobody will ever know the newest partition existed, it would appear as unpartitioned space. Then you could swap partition tables over (I think you'd also need to reboot as the kernel loads data into memory) and mount it and do whatever. I think there is even a way you could mount it without swapping the tables over if you know what cylinder it starts on etc, I've read about doing this somewhere before but I can't find the link anymore

Depends how serious you are about this, if it's just because of a nosy roommate, a cryptoloop will be more than ample to keep him/her away
 
Old 11-03-2005, 05:14 AM   #26
saikee
Senior Member
 
Registered: Sep 2005
Location: Newcastle upon Tyne UK
Distribution: Any free distro.
Posts: 3,398
Blog Entries: 1

Rep: Reputation: 113Reputation: 113
Many free downloadable software for repairing partition table can re-build the partition table by just going through the indexing systems of the files so just having a bogus partition table up front isn't much a security system to me.
 
Old 11-03-2005, 06:19 AM   #27
JZL240I-U
Senior Member
 
Registered: Apr 2003
Location: Germany
Distribution: openSuSE Tumbleweed-KDE, Mint 21, MX-21, Manjaro
Posts: 4,629

Original Poster
Rep: Reputation: Disabled
Well, did any of you go to the link I provided in post#22 and form your own opinion on their solution?

<edit>Btw. thanks for your link cs-cam .

Last edited by JZL240I-U; 11-03-2005 at 06:26 AM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Recoving Data from Other Partition PulsarSL *BSD 4 06-26-2005 01:37 PM
Can i resize my partition without loosing data? byen Linux - General 4 05-25-2005 07:39 PM
partition data recovery rlg Linux - Newbie 5 04-22-2005 12:27 AM
Data lost on other partition sonicspeedway Linux - Newbie 2 05-01-2004 02:49 PM
Data on Partition deleted rahulnsoni Linux - Newbie 5 05-01-2004 05:58 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - General

All times are GMT -5. The time now is 05:10 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration