Linux - HardwareThis forum is for Hardware issues.
Having trouble installing a piece of hardware? Want to know if that peripheral is compatible with Linux?
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Distribution: Debian Sid AMD64, Raspbian Wheezy, various VMs
Posts: 7,680
Rep:
Quote:
Originally Posted by l0f4r0
Maybe Brains refered to https://www.cs.auckland.ac.nz/~pgut0...ecure_del.html?
If true, I didn't read that paper very seriously but it seems that this research was biased (see *Epilogue parts) and only pure theory for obsolete technologies...
i take it that's the Gutmann paper (can't open the link right now)? If so, yes it's theory based upon obsolete technology and even at the time the author knew of no confirmed way to recover the data reliably.
i take it that's the Gutmann paper (can't open the link right now)?
Yes, well done
Quote:
Originally Posted by 273
If so, yes it's theory based upon obsolete technology and even at the time the author knew of no confirmed way to recover the data reliably.
Maybe, I didn't read it so much but it seems rather the author's point was mainly he didn't know of a confirmed way to *erase* the data reliably :
Quote:
it is effectively impossible to sanitise storage locations by simple overwriting them, no matter how many overwrite passes are made or what data patterns are written. However by using the relatively simple methods presented in this paper the task of an attacker can be made significantly more difficult, if not prohibitively expensive.
Distribution: Debian Sid AMD64, Raspbian Wheezy, various VMs
Posts: 7,680
Rep:
Quote:
Originally Posted by l0f4r0
Yes, well done
Maybe, I didn't read it so much but it seems rather the author's point was mainly he didn't know of a confirmed way to *erase* the data reliably :
Read around the subject -- within the paper he was suggesting a theoretical method that at that time and with that technology could, possibly, allow data recovery. Outside that paper he admitted that he knew of no way, even back then, for anybody to actually do that in practice.
It's an interesting paper and the DoD, and others, were right to take it seriously at the time but it is both theoretical and outdated and, as I've mentioned in another thread, if you're going against a state-run agency then you just do not, ever, store plaintext data anywhere so the destruction of said data is not an issue.
Again, I'm happy to be proven wrong though and would welcome some more reading on the subject.
Edit: I forgot, I watched this video the other day, addressing the subject. I've been reading around the subject ever since I became aware of the Gutmann paper but the video was a nice reminder.
I had a look at the Gutman paper … if you'd call it that.It's referencing 1980s technology
My first reaction was: "what are these people up to that they expect the Government, spies or police to come snooping on their HDs?" To do that we already presume that they have been incarcerated, and that unfriendly forces are looking for evidence to nail them to the wall. There is industrial espionage, but in most cases if your ideas are any good you'll have to ram them down someone's throat anyhow.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.