LinuxQuestions.org
Help answer threads with 0 replies.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - News > Syndicated Linux News
User Name
Password
Syndicated Linux News This forum is for the discussion of Syndicated Linux News stories.

Notices


Reply
  Search this Thread
Old 11-09-2015, 01:21 PM   #1
LXer
LXer NewsBot
 
Registered: Dec 2005
Posts: 96,886

Rep: Reputation: 96
LXer: A usb for the Paranoid


Published at LXer:

Data security is the most concerning thing in the modern age, but would you destroy your machine just to keep data safe, many companies are popping up thinking you will.

Read More...
 
Old 11-09-2015, 02:01 PM   #2
maples
Member
 
Registered: Oct 2013
Location: IN, USA
Distribution: Arch, Debian Jessie
Posts: 813

Rep: Reputation: 264Reputation: 264Reputation: 264
So it's a device that fries your motherboard.

But the hard drive platters are still there, with all the data you had on them. If you were paranoid, you would have full-disk encryption, so all you would have to do is shut it down (or rip out the battery/power wire if you're desperate) and the encrypted partition(s) is/are no longer mounted and it's safe. If you're really, really paranoid, you'd be better off having a script that unmounts your encrypted partitions, overwrites the LUKS header with random data a few times, then begins wiping the whole drive.

But simply frying the motherboard is just a waste.

Just my
 
Old 11-09-2015, 02:15 PM   #3
Timothy Miller
Moderator
 
Registered: Feb 2003
Location: Arizona, USA
Distribution: Debian, Fedora, Arch, & GalliumOS.
Posts: 2,599

Rep: Reputation: 717Reputation: 717Reputation: 717Reputation: 717Reputation: 717Reputation: 717Reputation: 717
Quote:
Originally Posted by maples View Post
So it's a device that fries your motherboard.

But the hard drive platters are still there, with all the data you had on them. If you were paranoid, you would have full-disk encryption, so all you would have to do is shut it down (or rip out the battery/power wire if you're desperate) and the encrypted partition(s) is/are no longer mounted and it's safe. If you're really, really paranoid, you'd be better off having a script that unmounts your encrypted partitions, overwrites the LUKS header with random data a few times, then begins wiping the whole drive.

But simply frying the motherboard is just a waste.

Just my
Can't say I really disagree.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Tarsnap: On-line Backups for the Truly Paranoid LXer Syndicated Linux News 0 10-17-2012 01:00 AM
LXer: Linux Distro: Tails - You Can Never Be Too Paranoid LXer Syndicated Linux News 0 08-08-2011 09:30 PM
LXer: Linux Distro: Tales - You Can Never Be Too Paranoid LXer Syndicated Linux News 0 08-08-2011 11:00 AM
LXer: Ex-Sun man Bray takes on paranoid Android role at Google LXer Syndicated Linux News 0 03-15-2010 02:20 PM
LXer: Feeling Paranoid? Become Anonymous LXer Syndicated Linux News 0 11-13-2008 03:30 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - News > Syndicated Linux News

All times are GMT -5. The time now is 03:33 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration