Linux - Hardware This forum is for Hardware issues.
Having trouble installing a piece of hardware? Want to know if that peripheral is compatible with Linux? |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
 |
|
05-21-2019, 08:55 AM
|
#16
|
LQ Addict
Registered: Dec 2011
Location: UK
Distribution: Debian Sid AMD64, Raspbian Wheezy, various VMs
Posts: 7,681
|
Quote:
Originally Posted by l0f4r0
|
i take it that's the Gutmann paper (can't open the link right now)? If so, yes it's theory based upon obsolete technology and even at the time the author knew of no confirmed way to recover the data reliably.
|
|
|
05-25-2019, 03:13 AM
|
#17
|
Member
Registered: Jul 2018
Location: Paris
Distribution: Debian
Posts: 900
Original Poster
|
Quote:
Originally Posted by 273
i take it that's the Gutmann paper (can't open the link right now)?
|
Yes, well done
Quote:
Originally Posted by 273
If so, yes it's theory based upon obsolete technology and even at the time the author knew of no confirmed way to recover the data reliably.
|
Maybe, I didn't read it so much but it seems rather the author's point was mainly he didn't know of a confirmed way to *erase* the data reliably :
Quote:
it is effectively impossible to sanitise storage locations by simple overwriting them, no matter how many overwrite passes are made or what data patterns are written. However by using the relatively simple methods presented in this paper the task of an attacker can be made significantly more difficult, if not prohibitively expensive.
|
|
|
|
05-25-2019, 03:41 AM
|
#18
|
LQ Addict
Registered: Dec 2011
Location: UK
Distribution: Debian Sid AMD64, Raspbian Wheezy, various VMs
Posts: 7,681
|
Quote:
Originally Posted by l0f4r0
Yes, well done
Maybe, I didn't read it so much but it seems rather the author's point was mainly he didn't know of a confirmed way to *erase* the data reliably :
|
Read around the subject -- within the paper he was suggesting a theoretical method that at that time and with that technology could, possibly, allow data recovery. Outside that paper he admitted that he knew of no way, even back then, for anybody to actually do that in practice.
It's an interesting paper and the DoD, and others, were right to take it seriously at the time but it is both theoretical and outdated and, as I've mentioned in another thread, if you're going against a state-run agency then you just do not, ever, store plaintext data anywhere so the destruction of said data is not an issue.
Again, I'm happy to be proven wrong though and would welcome some more reading on the subject.
Edit: I forgot, I watched this video the other day, addressing the subject. I've been reading around the subject ever since I became aware of the Gutmann paper but the video was a nice reminder.
Last edited by 273; 05-25-2019 at 03:03 PM.
|
|
|
05-26-2019, 04:39 AM
|
#19
|
LQ Guru
Registered: Jan 2006
Location: Ireland
Distribution: Slackware, Slarm64 & Android
Posts: 17,776
|
I had a look at the Gutman paper … if you'd call it that.It's referencing 1980s technology
My first reaction was: "what are these people up to that they expect the Government, spies or police to come snooping on their HDs?" To do that we already presume that they have been incarcerated, and that unfriendly forces are looking for evidence to nail them to the wall. There is industrial espionage, but in most cases if your ideas are any good you'll have to ram them down someone's throat anyhow.
|
|
|
05-26-2019, 06:13 PM
|
#20
|
LQ Addict
Registered: Dec 2011
Location: UK
Distribution: Debian Sid AMD64, Raspbian Wheezy, various VMs
Posts: 7,681
|
Quote:
Originally Posted by business_kid
I had a look at the Gutman paper … if you'd call it that.It's referencing 1980s technology
My first reaction was: "what are these people up to that they expect the Government, spies or police to come snooping on their HDs?" .
|
That is a good point. And, erm, encryption....
|
|
|
All times are GMT -5. The time now is 09:21 PM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|