GeneralThis forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I have always believed in driving a punch through the disk surface is better than a hammer. It will bend the disk beyond repair, and will never turn again.
You could try encrypting the file name before you delete the file. Thus any snoop would be unable to find any meaningful file names in a list of file names created by recovery software.
ecryptfs is an encryption program which has an option called ecryptfs_enable_filename_crypto=(y/n) to encrypt file names. The ecryptfs man page is at:
ecryptfs_enable_filename_crypto=(y/n)
Specify whether filename encryption should be enabled. If not,
the mount helper will not prompt the user for the filename
encryption key signature (default).
I have never used ecryptfs so I can't vouch for its effectiveness.
------------------------------------------------------------------------------------------
I do use ccrypt to shred files even though ccrypt is not designed to do so, but ccrypt will not encrypt a file name. The way to use ccrypt as a shredder is to encrypt a file. Then remove the .cpt extention that ccrypt adds to file names when it has encrypted a file. Then use ccrypt to encrypt the file a second time using a different key. The second encryption destroys the metadata containing the first encryption key so that you cannot ever decrypt the file even if you know both keys.
------------------------
Steve Stites
P.S. If you are anal you can repeat the encryption for several more layers.
That fried the electronics, but didn't hurt the data on the platters at all. That data would be totally recoverable by transplanting the spindle to a another drive of the same model.
You can never be 100% sure that the data on any storage device is "unrecoverably destroyed." There may be fragments or even complete copies of the data anywhere. The drive, itself, is "smart," and may keep additional copies in "spared" sectors.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.