* [gentoo-user] Securely deletion of an HDD
@ 2015-07-12 12:35 Marc Joliet
2015-07-12 12:48 ` Rich Freeman
` (3 more replies)
0 siblings, 4 replies; 30+ messages in thread
From: Marc Joliet @ 2015-07-12 12:35 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1065 bytes --]
Hi,
I have to failed drives that I want to give away for recycling purposes, but
want to be sure to properly clear them first. They used be part of a btrfs
RAID10 array, but needed to be replaced (with "btrfs replace"). (In the
meantime I converted the array to RAID1 with only two drives.)
My question is how precisely the disks should be cleared. From various sources
I know that overwriting them with random data a few times is enough to render
old versions of data unreadable. I'm guessing 3 times ought to be enough, but
maybe even that small amount is overly paranoid these days?
As to the actual command, I would suspect something like "dd if=/dev/urandom
of=/dev/sdx bs=4096" should suffice, and according to
https://wiki.archlinux.org/index.php/Random_number_generation#.2Fdev.2Furandom,
/dev/urandom ought to be random enough for this task. Or are cat/cp that much
faster?
Any thoughts?
Greetings
--
Marc Joliet
--
"People who think they know everything really annoy those of us who know we
don't" - Bjarne Stroustrup
[-- Attachment #2: Digitale Signatur von OpenPGP --]
[-- Type: application/pgp-signature, Size: 819 bytes --]
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Securely deletion of an HDD
2015-07-12 12:35 [gentoo-user] Securely deletion of an HDD Marc Joliet
@ 2015-07-12 12:48 ` Rich Freeman
2015-07-12 14:39 ` Marc Joliet
2015-07-12 13:00 ` [gentoo-user] " Mick
` (2 subsequent siblings)
3 siblings, 1 reply; 30+ messages in thread
From: Rich Freeman @ 2015-07-12 12:48 UTC (permalink / raw
To: gentoo-user
On Sun, Jul 12, 2015 at 8:35 AM, Marc Joliet <marcec@gmx.de> wrote:
>
> My question is how precisely the disks should be cleared. From various sources
> I know that overwriting them with random data a few times is enough to render
> old versions of data unreadable. I'm guessing 3 times ought to be enough, but
> maybe even that small amount is overly paranoid these days?
>
> As to the actual command, I would suspect something like "dd if=/dev/urandom
> of=/dev/sdx bs=4096" should suffice, and according to
> https://wiki.archlinux.org/index.php/Random_number_generation#.2Fdev.2Furandom,
> /dev/urandom ought to be random enough for this task. Or are cat/cp that much
> faster?
I'd probably just use a tool like shred/wipe, but you have the general idea.
I'd probably follow it up with an ATA secure erase - for an SSD it is
probably the only way to be sure (well, to the extent that you trust
the firmware authors).
If it weren't painful to set up and complicated for rescue attempts,
I'd just use full-disk encryption with a strong key on a flash drive
or similar. Then the disk is as good as wiped if separated from the
key already.
--
Rich
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Securely deletion of an HDD
2015-07-12 12:35 [gentoo-user] Securely deletion of an HDD Marc Joliet
2015-07-12 12:48 ` Rich Freeman
@ 2015-07-12 13:00 ` Mick
2015-07-12 13:22 ` Francisco Ares
2015-07-12 16:32 ` Volker Armin Hemmann
2015-07-13 9:53 ` Joerg Schilling
3 siblings, 1 reply; 30+ messages in thread
From: Mick @ 2015-07-12 13:00 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: Text/Plain, Size: 2175 bytes --]
On Sunday 12 Jul 2015 13:35:25 Marc Joliet wrote:
> Hi,
>
> I have to failed drives that I want to give away for recycling purposes,
> but want to be sure to properly clear them first. They used be part of a
> btrfs RAID10 array, but needed to be replaced (with "btrfs replace"). (In
> the meantime I converted the array to RAID1 with only two drives.)
>
> My question is how precisely the disks should be cleared. From various
> sources I know that overwriting them with random data a few times is
> enough to render old versions of data unreadable. I'm guessing 3 times
> ought to be enough, but maybe even that small amount is overly paranoid
> these days?
>
> As to the actual command, I would suspect something like "dd
> if=/dev/urandom of=/dev/sdx bs=4096" should suffice, and according to
> https://wiki.archlinux.org/index.php/Random_number_generation#.2Fdev.2Furan
> dom, /dev/urandom ought to be random enough for this task. Or are cat/cp
> that much faster?
>
> Any thoughts?
>
> Greetings
I use urandom a couple of times (3 to 5), because random takes too long and I
don't store state secrets on my disks. Then I dd onto it a final round of
/dev/zero. Finally, run hdparm to securely erase it for good measure.[1] All
of this could be an overkill, but do it out of habit these days.
It is worth saying that I use haveged to increase entropy:
[I] sys-apps/haveged
Available versions:
1.5
~ 1.7a
1.7a-r1
~ 1.9.1
Installed versions: 1.7a-r1(12:46:23 04/21/14)
Homepage: http://www.issihosts.com/haveged/
Description: A simple entropy daemon using the HAVEGE algorithm
I should clarify that disks which contained financial data are dealth with a
high speed angle grinder, after I remove the outer casing of the drive and don
a pair of goggles.[2] *Only then* do I recycle the bits left. ;-)
[1] https://ata.wiki.kernel.org/index.php/ATA_Secure_Erase
[2] You can also use a hammer, a drill, or any similar implement which will
completely break the physical disk platters to bits.
--
Regards,
Mick
[-- Attachment #2: This is a digitally signed message part. --]
[-- Type: application/pgp-signature, Size: 473 bytes --]
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Securely deletion of an HDD
2015-07-12 13:00 ` [gentoo-user] " Mick
@ 2015-07-12 13:22 ` Francisco Ares
0 siblings, 0 replies; 30+ messages in thread
From: Francisco Ares @ 2015-07-12 13:22 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 2466 bytes --]
Em 12/07/2015 10:03, "Mick" <michaelkintzios@gmail.com> escreveu:
>
> On Sunday 12 Jul 2015 13:35:25 Marc Joliet wrote:
> > Hi,
> >
> > I have to failed drives that I want to give away for recycling purposes,
> > but want to be sure to properly clear them first. They used be part of
a
> > btrfs RAID10 array, but needed to be replaced (with "btrfs replace").
(In
> > the meantime I converted the array to RAID1 with only two drives.)
> >
> > My question is how precisely the disks should be cleared. From various
> > sources I know that overwriting them with random data a few times is
> > enough to render old versions of data unreadable. I'm guessing 3 times
> > ought to be enough, but maybe even that small amount is overly paranoid
> > these days?
> >
> > As to the actual command, I would suspect something like "dd
> > if=/dev/urandom of=/dev/sdx bs=4096" should suffice, and according to
> >
https://wiki.archlinux.org/index.php/Random_number_generation#.2Fdev.2Furan
> > dom, /dev/urandom ought to be random enough for this task. Or are
cat/cp
> > that much faster?
> >
> > Any thoughts?
> >
> > Greetings
>
> I use urandom a couple of times (3 to 5), because random takes too long
and I
> don't store state secrets on my disks. Then I dd onto it a final round of
> /dev/zero. Finally, run hdparm to securely erase it for good
measure.[1] All
> of this could be an overkill, but do it out of habit these days.
>
> It is worth saying that I use haveged to increase entropy:
>
> [I] sys-apps/haveged
> Available versions:
> 1.5
> ~ 1.7a
> 1.7a-r1
> ~ 1.9.1
> Installed versions: 1.7a-r1(12:46:23 04/21/14)
> Homepage: http://www.issihosts.com/haveged/
> Description: A simple entropy daemon using the HAVEGE
algorithm
>
> I should clarify that disks which contained financial data are dealth
with a
> high speed angle grinder, after I remove the outer casing of the drive
and don
> a pair of goggles.[2] *Only then* do I recycle the bits left. ;-)
>
>
> [1] https://ata.wiki.kernel.org/index.php/ATA_Secure_Erase
>
> [2] You can also use a hammer, a drill, or any similar implement which
will
> completely break the physical disk platters to bits.
>
> --
> Regards,
> Mick
A physical damage is what I guess be the best choice for sensitive data.
I use to disassemble the HDD and rub a strong magnet over the disks'
surfaces.
Just my 2c.
Best regards,
Francisco
[-- Attachment #2: Type: text/html, Size: 3434 bytes --]
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Securely deletion of an HDD
2015-07-12 12:48 ` Rich Freeman
@ 2015-07-12 14:39 ` Marc Joliet
2015-07-12 19:21 ` Rich Freeman
2015-07-13 15:03 ` [gentoo-user] " Grant Edwards
0 siblings, 2 replies; 30+ messages in thread
From: Marc Joliet @ 2015-07-12 14:39 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 3595 bytes --]
(Thanks to everyone for the replies so far!)
Am Sun, 12 Jul 2015 08:48:48 -0400
schrieb Rich Freeman <rich0@gentoo.org>:
> On Sun, Jul 12, 2015 at 8:35 AM, Marc Joliet <marcec@gmx.de> wrote:
> >
> > My question is how precisely the disks should be cleared. From various sources
> > I know that overwriting them with random data a few times is enough to render
> > old versions of data unreadable. I'm guessing 3 times ought to be enough, but
> > maybe even that small amount is overly paranoid these days?
> >
> > As to the actual command, I would suspect something like "dd if=/dev/urandom
> > of=/dev/sdx bs=4096" should suffice, and according to
> > https://wiki.archlinux.org/index.php/Random_number_generation#.2Fdev.2Furandom,
> > /dev/urandom ought to be random enough for this task. Or are cat/cp that much
> > faster?
>
> I'd probably just use a tool like shred/wipe, but you have the general idea.
Ah, I overlooked that shred can operate on device files! Thanks. I especially
trust shred, since my main source was an article by its author
(https://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html).
With regards to the other replies: I think physical destruction is unnecessary,
and I don't really want to go through the trouble. The key bit in the above
article is:
"[...]. If these drives require sophisticated signal processing just to read
the most recently written data, reading overwritten layers is also
correspondingly more difficult. A good scrubbing with random data will do about
as well as can be expected."
And this was in 1996! Drives have only gotten denser since then (e.g.,
perpendicular recording), and the epilogues (which reiterate the above) suggest
that nothing has changed to make old data more recoverable. I noticed that the
info manual to shred even says:
"On modern disks, a single pass should be adequate, and it will take one third
the time of the default three-pass approach."
The Arch wiki also arrives at the same conclusion (see
https://wiki.archlinux.org/index.php/Securely_wipe_disk#Residual_magnetism),
and provides some additional references.
> I'd probably follow it up with an ATA secure erase - for an SSD it is
> probably the only way to be sure (well, to the extent that you trust
> the firmware authors).
Yeah, that sounds like a good idea. In the case of HDDs, even if I can't trust
the firmware, I've already wiped what I can. With regards to SSDs, I've been
meaning to read http://www.cypherpunks.to/~peter/usenix01.pdf.
So my intermediate summary is: I'll probably use shred with one pass, followed
by ATA (Enhanced) Secure Erase to erase the reallocated sectors (though I'll
have to fiddle with my BIOS to do that). I'll be sure to read
https://ata.wiki.kernel.org/index.php/ATA_Secure_Erase first.
> If it weren't painful to set up and complicated for rescue attempts,
> I'd just use full-disk encryption with a strong key on a flash drive
> or similar. Then the disk is as good as wiped if separated from the
> key already.
Plus you don't have to worry about reallocated sectors (which might only
contain single bit errors). Currently I'm planning on waiting for btrfs to
support it. Chris Mason recently mentioned that it's definitely something they
want to look at (https://youtu.be/W3QRWUfBua8?t=631), and it's not something
that is so important to me personally that I have to have it right this instant.
--
Marc Joliet
--
"People who think they know everything really annoy those of us who know we
don't" - Bjarne Stroustrup
[-- Attachment #2: Digitale Signatur von OpenPGP --]
[-- Type: application/pgp-signature, Size: 819 bytes --]
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Securely deletion of an HDD
2015-07-12 12:35 [gentoo-user] Securely deletion of an HDD Marc Joliet
2015-07-12 12:48 ` Rich Freeman
2015-07-12 13:00 ` [gentoo-user] " Mick
@ 2015-07-12 16:32 ` Volker Armin Hemmann
2015-07-12 19:14 ` Rich Freeman
2015-07-13 11:04 ` Marc Joliet
2015-07-13 9:53 ` Joerg Schilling
3 siblings, 2 replies; 30+ messages in thread
From: Volker Armin Hemmann @ 2015-07-12 16:32 UTC (permalink / raw
To: gentoo-user
Am 12.07.2015 um 14:35 schrieb Marc Joliet:
> Hi,
>
> I have to failed drives that I want to give away for recycling purposes, but
> want to be sure to properly clear them first. They used be part of a btrfs
> RAID10 array, but needed to be replaced (with "btrfs replace"). (In the
> meantime I converted the array to RAID1 with only two drives.)
>
> My question is how precisely the disks should be cleared. From various sources
> I know that overwriting them with random data a few times is enough to render
> old versions of data unreadable. I'm guessing 3 times ought to be enough, but
> maybe even that small amount is overly paranoid these days?
>
> As to the actual command, I would suspect something like "dd if=/dev/urandom
> of=/dev/sdx bs=4096" should suffice, and according to
> https://wiki.archlinux.org/index.php/Random_number_generation#.2Fdev.2Furandom,
> /dev/urandom ought to be random enough for this task. Or are cat/cp that much
> faster?
>
> Any thoughts?
>
> Greetings
actually 1 time is enough. With zeros. Or ones. Does not matter at all.
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Securely deletion of an HDD
2015-07-12 16:32 ` Volker Armin Hemmann
@ 2015-07-12 19:14 ` Rich Freeman
2015-07-12 20:43 ` Volker Armin Hemmann
2015-07-13 11:04 ` Marc Joliet
1 sibling, 1 reply; 30+ messages in thread
From: Rich Freeman @ 2015-07-12 19:14 UTC (permalink / raw
To: gentoo-user
On Sun, Jul 12, 2015 at 12:32 PM, Volker Armin Hemmann
<volkerarmin@googlemail.com> wrote:
>
> actually 1 time is enough. With zeros. Or ones. Does not matter at all.
>
That depends on your threat model.
If you're concerned about somebody reading the contents of the drive
using the standard ATA commands, then once with zeros is just fine.
Secure erase is probably easier/faster.
If you're concerned about somebody removing the disks from the drive
and reading them with specialized equipment then you really want
multiple rounds of complete overwrites with random data. Even then
you run the risk of relocation blocks and all that stuff, so the
secure erase at the end is still a wise move but it may or may not
completely do the job.
If you're concerned about somebody leaving the disks in the drive but
having access to directly manipulate the drive heads to possibly
access data not accessible using the standard ATA commands then one
pass is probably good enough, but I'd still use random data instead of
zeros. The reason is that a clever firmware (especially on an SSD)
might not actually record zeros to the regular disk space, but instead
just mark the block range as containing zeros, leaving the actual data
intact. For random data the drive has to actually store the contents
as it cannot be represented in any more concise way.
If I'm not in a rush I prefer to just do the multiple passes. Why
take a chance?
And of course full-disk encryption is the solution to all of the
above, as it defeats any kind of attack at the level of the drive and
is proactive in nature.
--
Rich
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Securely deletion of an HDD
2015-07-12 14:39 ` Marc Joliet
@ 2015-07-12 19:21 ` Rich Freeman
2015-07-12 19:42 ` Neil Bothwick
2015-07-13 15:03 ` [gentoo-user] " Grant Edwards
1 sibling, 1 reply; 30+ messages in thread
From: Rich Freeman @ 2015-07-12 19:21 UTC (permalink / raw
To: gentoo-user
On Sun, Jul 12, 2015 at 10:39 AM, Marc Joliet <marcec@gmx.de> wrote:
>
> Am Sun, 12 Jul 2015 08:48:48 -0400
> schrieb Rich Freeman <rich0@gentoo.org>:
>
>> If it weren't painful to set up and complicated for rescue attempts,
>> I'd just use full-disk encryption with a strong key on a flash drive
>> or similar. Then the disk is as good as wiped if separated from the
>> key already.
>
> Plus you don't have to worry about reallocated sectors (which might only
> contain single bit errors). Currently I'm planning on waiting for btrfs to
> support it. Chris Mason recently mentioned that it's definitely something they
> want to look at (https://youtu.be/W3QRWUfBua8?t=631), and it's not something
> that is so important to me personally that I have to have it right this instant.
>
While some kind of native support would be nice, and likely more
efficient in some ways, you could just layer btrfs on top of an
encrypted loopback device. The problem is you'll need various scripts
in your initramfs (or root partition if you don't bother to encrypt
it) to actually set that up. In the event of a recovery situation
you'll need to do all that setting up before you can run something
like fsck on the disks and so on. In the event of a power loss I'd
have to think through the failure modes, but I think you'd be fine as
long as everything respected barriers, and btrfs/zfs already do
checksuming.
The typical approach is to use many rounds of encryption using a
keyed-in password. That is a pretty good approach but obviously not
nearly as secure as just using a completely random key with the full
amount of entropy. A hand-keyed password with more entropy than the
cipher uses would also be fine, but that would be a very long password
(we're not just talking battery horse staple here). I guess you could
just use a USB drive as your boot partition with the keys on it and
keep a few copies of it, and with a decent grub setup on it that would
also work for rescue purposes.
--
Rich
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Securely deletion of an HDD
2015-07-12 19:21 ` Rich Freeman
@ 2015-07-12 19:42 ` Neil Bothwick
0 siblings, 0 replies; 30+ messages in thread
From: Neil Bothwick @ 2015-07-12 19:42 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 969 bytes --]
On Sun, 12 Jul 2015 15:21:41 -0400, Rich Freeman wrote:
> While some kind of native support would be nice, and likely more
> efficient in some ways, you could just layer btrfs on top of an
> encrypted loopback device.
The problem with that approach, if you use RAID, is that all writes must
be encrypted multiple times, once for each disk, unless you use MD RAID
between the disk and the encryption layer.
> The problem is you'll need various scripts
> in your initramfs (or root partition if you don't bother to encrypt
> it) to actually set that up.
With a single device, Dracut handles all this automatically. I have such
a setup on my laptop and used to use custom scripts to call cryptsetup at
boot time, until I got fed up with you and Canek banging on about Dracut
and decided to give it another go. With the right boot options, it just
works.
--
Neil Bothwick
Any sufficiently advanced bug is indistinguishable from a feature.
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 181 bytes --]
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Securely deletion of an HDD
2015-07-12 19:14 ` Rich Freeman
@ 2015-07-12 20:43 ` Volker Armin Hemmann
2015-07-12 21:10 ` Rich Freeman
2015-07-13 10:54 ` Marc Joliet
0 siblings, 2 replies; 30+ messages in thread
From: Volker Armin Hemmann @ 2015-07-12 20:43 UTC (permalink / raw
To: gentoo-user
Am 12.07.2015 um 21:14 schrieb Rich Freeman:
> On Sun, Jul 12, 2015 at 12:32 PM, Volker Armin Hemmann
> <volkerarmin@googlemail.com> wrote:
>> actually 1 time is enough. With zeros. Or ones. Does not matter at all.
>>
> That depends on your threat model.
nope. It doesn't.
You believe in some urban legend you never dared to question.
>
> If you're concerned about somebody reading the contents of the drive
> using the standard ATA commands, then once with zeros is just fine.
> Secure erase is probably easier/faster.
>
> If you're concerned about somebody removing the disks from the drive
> and reading them with specialized equipment then you really want
> multiple rounds of complete overwrites with random data. Even then
> you run the risk of relocation blocks and all that stuff, so the
> secure erase at the end is still a wise move but it may or may not
> completely do the job.
even then one time is enough. Links are below.
>
> If you're concerned about somebody leaving the disks in the drive but
> having access to directly manipulate the drive heads to possibly
> access data not accessible using the standard ATA commands then one
> pass is probably good enough, but I'd still use random data instead of
> zeros. The reason is that a clever firmware (especially on an SSD)
> might not actually record zeros to the regular disk space, but instead
> just mark the block range as containing zeros, leaving the actual data
> intact. For random data the drive has to actually store the contents
> as it cannot be represented in any more concise way.
>
> If I'm not in a rush I prefer to just do the multiple passes. Why
> take a chance?
if you do it, it is your problem, but recommending something stupid is
something else altogether.
>
> And of course full-disk encryption is the solution to all of the
> above, as it defeats any kind of attack at the level of the drive and
> is proactive in nature.
>
cute.
Unlike you, I read some stuff before posting. This is OLD NEWS:
http://www.howtogeek.com/115573/htg-explains-why-you-only-have-to-wipe-a-disk-once-to-erase-it/
http://www.vidarholen.net/~vidar/overwriting_hard_drive_data.pdf
to quote:
"
Resultantly, if there is less than a 1% chance of determining each
character to be
recovered correctly, the chance of a complete 5-character word being
recovered drops
exponentially to 8.463E-11 (or less on a used drive and who uses a new
raw drive
format). This results in a probability of less than 1 chance in 10Exp50
of recovering
any useful data. So close to zero for all intents and definitely not
within the realm of
use for forensic presentation to a court.
"
10^50. Think about that for a moment. And that is not 'all the data' but
'any useful data'.
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Securely deletion of an HDD
2015-07-12 20:43 ` Volker Armin Hemmann
@ 2015-07-12 21:10 ` Rich Freeman
2015-07-12 21:20 ` Volker Armin Hemmann
2015-07-12 22:22 ` R0b0t1
2015-07-13 10:54 ` Marc Joliet
1 sibling, 2 replies; 30+ messages in thread
From: Rich Freeman @ 2015-07-12 21:10 UTC (permalink / raw
To: gentoo-user
On Sun, Jul 12, 2015 at 4:43 PM, Volker Armin Hemmann
<volkerarmin@googlemail.com> wrote:
>
> Unlike you, I read some stuff before posting. This is OLD NEWS:
No need to be rude.
>
> http://www.howtogeek.com/115573/htg-explains-why-you-only-have-to-wipe-a-disk-once-to-erase-it/
>
> http://www.vidarholen.net/~vidar/overwriting_hard_drive_data.pdf
>
> to quote:
>
> "
> Resultantly, if there is less than a 1% chance of determining each
> character to be
> recovered correctly, the chance of a complete 5-character word being
> recovered drops
> exponentially to 8.463E-11 (or less on a used drive and who uses a new
> raw drive
> format). This results in a probability of less than 1 chance in 10Exp50
> of recovering
> any useful data. So close to zero for all intents and definitely not
> within the realm of
> use for forensic presentation to a court.
> "
>
> 10^50. Think about that for a moment. And that is not 'all the data' but
> 'any useful data'.
>
This really looks like a pragmatic argument, and not a theoretical
one. I see no arguments based on hard laws of physics. This argument
basically says that because this lab couldn't read the data with their
equipment/methods, it is impossible for anybody to do it at any time
in the future using any equipment.
I'd say Schneier's Law applies.
--
Rich
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Securely deletion of an HDD
2015-07-12 21:10 ` Rich Freeman
@ 2015-07-12 21:20 ` Volker Armin Hemmann
2015-07-12 21:30 ` Rich Freeman
2015-07-12 22:22 ` R0b0t1
1 sibling, 1 reply; 30+ messages in thread
From: Volker Armin Hemmann @ 2015-07-12 21:20 UTC (permalink / raw
To: gentoo-user
Am 12.07.2015 um 23:10 schrieb Rich Freeman:
> On Sun, Jul 12, 2015 at 4:43 PM, Volker Armin Hemmann
> <volkerarmin@googlemail.com> wrote:
>> Unlike you, I read some stuff before posting. This is OLD NEWS:
> No need to be rude.
>
>> http://www.howtogeek.com/115573/htg-explains-why-you-only-have-to-wipe-a-disk-once-to-erase-it/
>>
>> http://www.vidarholen.net/~vidar/overwriting_hard_drive_data.pdf
>>
>> to quote:
>>
>> "
>> Resultantly, if there is less than a 1% chance of determining each
>> character to be
>> recovered correctly, the chance of a complete 5-character word being
>> recovered drops
>> exponentially to 8.463E-11 (or less on a used drive and who uses a new
>> raw drive
>> format). This results in a probability of less than 1 chance in 10Exp50
>> of recovering
>> any useful data. So close to zero for all intents and definitely not
>> within the realm of
>> use for forensic presentation to a court.
>> "
>>
>> 10^50. Think about that for a moment. And that is not 'all the data' but
>> 'any useful data'.
>>
> This really looks like a pragmatic argument, and not a theoretical
> one. I see no arguments based on hard laws of physics. This argument
> basically says that because this lab couldn't read the data with their
> equipment/methods, it is impossible for anybody to do it at any time
> in the future using any equipment.
>
> I'd say Schneier's Law applies.
>
read the second link I provided.
And then google for yourself.
All that 'overwritte many times' crap came from people who never read
Guttman's original paper closely.
Back then it was very hard. Today it is impossible. You toss a coin for
every bit. And that is your chance to extract anything.
There are better chances to extract the key you used to encrypt your
data from RAM than to extract any useful data from a harddisk that was
overwritten once.
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Securely deletion of an HDD
2015-07-12 21:20 ` Volker Armin Hemmann
@ 2015-07-12 21:30 ` Rich Freeman
2015-07-13 8:05 ` Volker Armin Hemmann
0 siblings, 1 reply; 30+ messages in thread
From: Rich Freeman @ 2015-07-12 21:30 UTC (permalink / raw
To: gentoo-user
On Sun, Jul 12, 2015 at 5:20 PM, Volker Armin Hemmann
<volkerarmin@googlemail.com> wrote:
> read the second link I provided.
>
I did. It contains no theoretical arguments against the possibility
of data recovery. Theoretical limits would be ones like the
uncertainty principle. If a given amount of matter could only store a
certain number of bits, and that number of bits is already being
stored, then it would be clearly impossible to recover more.
> And then google for yourself.
For what?
>
> Back then it was very hard. Today it is impossible. You toss a coin for
> every bit. And that is your chance to extract anything.
>
Impossible is a pretty bold claim. You need proof, not evidence that
a particular recovery technique didn't work. I can demonstrate very
clearly that I'm unable to crack DES, but that doesn't make it secure.
--
Rich
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Securely deletion of an HDD
2015-07-12 21:10 ` Rich Freeman
2015-07-12 21:20 ` Volker Armin Hemmann
@ 2015-07-12 22:22 ` R0b0t1
2015-07-13 0:18 ` Rich Freeman
1 sibling, 1 reply; 30+ messages in thread
From: R0b0t1 @ 2015-07-12 22:22 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1393 bytes --]
@topic: I would strongly suggest using a hardware key that also utilizes a
passphrase. To delete, remove the key and/or don't tell anyone the
passphrase. If you need to destroy a platter drive take it apart and sand
the platters (probably the easiest). If it's solid state heat the drive
over 150C-250C for an extended period of time or mechanically destroy the
chips.
>It contains no theoretical arguments against the possibility of data
recovery.
The superparmagnetic limit sets the upper bound for storage density. It is
impossible to store information inside the grain of a metal because it acts
as if the magnetic moment is the sum of all of the atoms in the grain. At
this size, the polarity of the magnet can randomly flip directions
depending on the temperature. For ~2005 drives that was about 1Tbit/in^2
with ~850Gbit/in^2 used. Newer drives continue to have higher numbers but
unless the efficiency drops there is not enough room to shadow all the data
(you will need to calculate or find these numbers for each drive you are
interested in). At best you could hope to recover some portion of it with
magnetic force microscopy, which you can/should assume will read back at
the maximum density available on the medium.
But, simpler: if you combine a random stream of data with what is on the
drive, the result looks just like random data. You need only overwrite the
drive once.
[-- Attachment #2: Type: text/html, Size: 1484 bytes --]
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Securely deletion of an HDD
2015-07-12 22:22 ` R0b0t1
@ 2015-07-13 0:18 ` Rich Freeman
2015-07-13 1:50 ` Thomas Mueller
2015-07-14 22:21 ` R0b0t1
0 siblings, 2 replies; 30+ messages in thread
From: Rich Freeman @ 2015-07-13 0:18 UTC (permalink / raw
To: gentoo-user
On Sun, Jul 12, 2015 at 6:22 PM, R0b0t1 <r030t1@gmail.com> wrote:
>
> But, simpler: if you combine a random stream of data with what is on the
> drive, the result looks just like random data. You need only overwrite the
> drive once.
I think that assumes that the two get averaged together in some way
and cannot be separated. If you could determine the orientation of
individual magnetic domains it is possible that you might be able to
determine which ones are which. For example, if in a given location
you found 90% of the grains had one orientation, and 10% had another,
you might be able to infer that the 10% was the previous value of that
location.
That probably isn't practical with current technology, but I see no
reason that it should be impossible.
--
Rich
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Securely deletion of an HDD
2015-07-13 0:18 ` Rich Freeman
@ 2015-07-13 1:50 ` Thomas Mueller
2015-07-13 8:09 ` Volker Armin Hemmann
2015-07-13 10:58 ` Marc Joliet
2015-07-14 22:21 ` R0b0t1
1 sibling, 2 replies; 30+ messages in thread
From: Thomas Mueller @ 2015-07-13 1:50 UTC (permalink / raw
To: gentoo-user
All that has been said on this thread supposes that the hard drive is still readable and writable.
But the original post stated this was a failed drive.
Then you might not be able to dd if=/dev/zero of=/dev/sdx .. or whatever else.
You would be stopped by bad sectors.
Or a hard drive might not be accessible at all through the computer interface.
I heard something that sounded like a modem dialing, but had no such modem.
Going around with my eyes and ears led me to determine that it was a hard drive whining in an external eSATA enclosure, no longer recognized or accessible from the computer.
That was a Western Digital Green 3 TB hard drive that replaced, under warranty, a WD Green 3 TB hard drive that developed bad sectors.
Fortunately I had no confidential data on that hard drive.
So everything in this thread says nothing about if the hard drive failed due to a mechanical problem.
Then the data could not be overwritten by ordinary means, but could still be read by techniques such as used by Drive Savers.
Tom
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Securely deletion of an HDD
2015-07-12 21:30 ` Rich Freeman
@ 2015-07-13 8:05 ` Volker Armin Hemmann
2015-07-13 11:03 ` Rich Freeman
0 siblings, 1 reply; 30+ messages in thread
From: Volker Armin Hemmann @ 2015-07-13 8:05 UTC (permalink / raw
To: gentoo-user
Am 12.07.2015 um 23:30 schrieb Rich Freeman:
> On Sun, Jul 12, 2015 at 5:20 PM, Volker Armin Hemmann
> <volkerarmin@googlemail.com> wrote:
>> read the second link I provided.
>>
> I did. It contains no theoretical arguments against the possibility
yes it does.
> of data recovery. Theoretical limits would be ones like the
> uncertainty principle. If a given amount of matter could only store a
> certain number of bits, and that number of bits is already being
> stored, then it would be clearly impossible to recover more.
>
>> And then google for yourself.
> For what?
>
>> Back then it was very hard. Today it is impossible. You toss a coin for
>> every bit. And that is your chance to extract anything.
>>
> Impossible is a pretty bold claim. You need proof, not evidence that
> a particular recovery technique didn't work. I can demonstrate very
> clearly that I'm unable to crack DES, but that doesn't make it secure.
>
they gave you the prove. Others have found the same. If you are unable
to understand what they wrote, just say so.
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Securely deletion of an HDD
2015-07-13 1:50 ` Thomas Mueller
@ 2015-07-13 8:09 ` Volker Armin Hemmann
2015-07-13 10:58 ` Marc Joliet
1 sibling, 0 replies; 30+ messages in thread
From: Volker Armin Hemmann @ 2015-07-13 8:09 UTC (permalink / raw
To: gentoo-user
Am 13.07.2015 um 03:50 schrieb Thomas Mueller:
> All that has been said on this thread supposes that the hard drive is still readable and writable.
>
> But the original post stated this was a failed drive.
>
> Then you might not be able to dd if=/dev/zero of=/dev/sdx .. or whatever else.
>
> You would be stopped by bad sectors.
>
> Or a hard drive might not be accessible at all through the computer interface.
>
> I heard something that sounded like a modem dialing, but had no such modem.
>
> Going around with my eyes and ears led me to determine that it was a hard drive whining in an external eSATA enclosure, no longer recognized or accessible from the computer.
>
> That was a Western Digital Green 3 TB hard drive that replaced, under warranty, a WD Green 3 TB hard drive that developed bad sectors.
>
> Fortunately I had no confidential data on that hard drive.
>
> So everything in this thread says nothing about if the hard drive failed due to a mechanical problem.
>
> Then the data could not be overwritten by ordinary means, but could still be read by techniques such as used by Drive Savers.
in case of mechanical failure: open case, rub platters on the carpet. Done.
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Securely deletion of an HDD
2015-07-12 12:35 [gentoo-user] Securely deletion of an HDD Marc Joliet
` (2 preceding siblings ...)
2015-07-12 16:32 ` Volker Armin Hemmann
@ 2015-07-13 9:53 ` Joerg Schilling
3 siblings, 0 replies; 30+ messages in thread
From: Joerg Schilling @ 2015-07-13 9:53 UTC (permalink / raw
To: gentoo-user
Marc Joliet <marcec@gmx.de> wrote:
> Hi,
>
> I have to failed drives that I want to give away for recycling purposes, but
> want to be sure to properly clear them first. They used be part of a btrfs
The test patterns used on Solaris and marked with "federal requirements" are:
int purge_patterns[]= { /* patterns to be written */
0xaaaaaaaa, /* 10101010... */
0x55555555, /* 01010101... == UUUU... */
0xaaaaaaaa, /* 10101010... */
0xaaaaaaaa, /* 10101010... */
}
Jörg
--
EMail:joerg@schily.net (home) Jörg Schilling D-13353 Berlin
joerg.schilling@fokus.fraunhofer.de (work) Blog: http://schily.blogspot.com/
URL: http://cdrecord.org/private/ http://sourceforge.net/projects/schilytools/files/'
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Securely deletion of an HDD
2015-07-12 20:43 ` Volker Armin Hemmann
2015-07-12 21:10 ` Rich Freeman
@ 2015-07-13 10:54 ` Marc Joliet
1 sibling, 0 replies; 30+ messages in thread
From: Marc Joliet @ 2015-07-13 10:54 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1613 bytes --]
Am Sun, 12 Jul 2015 22:43:44 +0200
schrieb Volker Armin Hemmann <volkerarmin@googlemail.com>:
> http://www.howtogeek.com/115573/htg-explains-why-you-only-have-to-wipe-a-disk-once-to-erase-it/
Yeah, that was linked from the Arch wiki I looked at.
> http://www.vidarholen.net/~vidar/overwriting_hard_drive_data.pdf
FWIW, Peter Gutmann doesn't have much good to say about that article
(specifically, he wrote about the related blog article at [0] in his "Further
Epilogue" at [1]). Regardless, the summary still seems to be: with
modern high-density drives, there is *no* wiggle room outside for remnants of
data to stick around after overwriting it, outside of some potential future
method that is probably a) far enough away into the future that the data on the
drive is uninteresting by then (if it ever was interesting to begin with!) and
b) prohibitively expensive (at least at the start), which pushes the earliest
time someone might ever look at my old hard drives even further back. This
assumes that anybody is interested in developing something like that, if it's
even possible.
I can't help but wonder what the situation is like with tape, which still
commonly used for backups. ISTR that huge densities are also the norm there, but
that's about all I know.
[0]
https://web.archive.org/web/20090722235051/http://sansforensics.wordpress.com/2009/01/15/overwriting-hard-drive-data
[1] https://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
--
Marc Joliet
--
"People who think they know everything really annoy those of us who know we
don't" - Bjarne Stroustrup
[-- Attachment #2: Digitale Signatur von OpenPGP --]
[-- Type: application/pgp-signature, Size: 819 bytes --]
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Securely deletion of an HDD
2015-07-13 1:50 ` Thomas Mueller
2015-07-13 8:09 ` Volker Armin Hemmann
@ 2015-07-13 10:58 ` Marc Joliet
1 sibling, 0 replies; 30+ messages in thread
From: Marc Joliet @ 2015-07-13 10:58 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 745 bytes --]
Am Mon, 13 Jul 2015 01:50:57 +0000
schrieb "Thomas Mueller" <mueller6726@bellsouth.net>:
> All that has been said on this thread supposes that the hard drive is still readable and writable.
>
> But the original post stated this was a failed drive.
>
> Then you might not be able to dd if=/dev/zero of=/dev/sdx .. or whatever else.
>
> You would be stopped by bad sectors.
The two drives I'm referring to here failed in the sense that they have no more
reallocation sectors available. Perhaps that will make it difficult to wipe them
properly, but they were fine mechanically when I removed them.
--
Marc Joliet
--
"People who think they know everything really annoy those of us who know we
don't" - Bjarne Stroustrup
[-- Attachment #2: Digitale Signatur von OpenPGP --]
[-- Type: application/pgp-signature, Size: 819 bytes --]
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Securely deletion of an HDD
2015-07-13 8:05 ` Volker Armin Hemmann
@ 2015-07-13 11:03 ` Rich Freeman
0 siblings, 0 replies; 30+ messages in thread
From: Rich Freeman @ 2015-07-13 11:03 UTC (permalink / raw
To: gentoo-user
On Mon, Jul 13, 2015 at 4:05 AM, Volker Armin Hemmann
<volkerarmin@googlemail.com> wrote:
> Am 12.07.2015 um 23:30 schrieb Rich Freeman:
>> Impossible is a pretty bold claim. You need proof, not evidence that
>> a particular recovery technique didn't work. I can demonstrate very
>> clearly that I'm unable to crack DES, but that doesn't make it secure.
>>
>
> they gave you the prove. Others have found the same. If you are unable
> to understand what they wrote, just say so.
>
By all means point out more specifically where you think they made a
theoretical argument. I see lots of talk of measurements and lots of
empirical-looking numbers. Theoretical arguments tend to involve lots
of h-bars over pis and such.
As far as others finding the same goes, that also tends to
characterize this as an experimental/practical argument. You
generally don't tend to have publications of reproductions of
theoretical arguments since about all you can do is either point out
an error in the math or extend it.
Such experiments are useful, but they're not airtight. It is the
difference between AES and a one-time pad. The former has no known
method of circumvention and seems really hard to attack, the latter is
theoretically impossible to attack if correctly implemented, but
probably impossible to truly implement correctly. I don't worry about
using AES, but I'm not under any illusions that it is completely
unbreakable.
--
Rich
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Securely deletion of an HDD
2015-07-12 16:32 ` Volker Armin Hemmann
2015-07-12 19:14 ` Rich Freeman
@ 2015-07-13 11:04 ` Marc Joliet
1 sibling, 0 replies; 30+ messages in thread
From: Marc Joliet @ 2015-07-13 11:04 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1539 bytes --]
Am Sun, 12 Jul 2015 18:32:39 +0200
schrieb Volker Armin Hemmann <volkerarmin@googlemail.com>:
> Am 12.07.2015 um 14:35 schrieb Marc Joliet:
> > Hi,
> >
> > I have to failed drives that I want to give away for recycling purposes, but
> > want to be sure to properly clear them first. They used be part of a btrfs
> > RAID10 array, but needed to be replaced (with "btrfs replace"). (In the
> > meantime I converted the array to RAID1 with only two drives.)
> >
> > My question is how precisely the disks should be cleared. From various sources
> > I know that overwriting them with random data a few times is enough to render
> > old versions of data unreadable. I'm guessing 3 times ought to be enough, but
> > maybe even that small amount is overly paranoid these days?
> >
> > As to the actual command, I would suspect something like "dd if=/dev/urandom
> > of=/dev/sdx bs=4096" should suffice, and according to
> > https://wiki.archlinux.org/index.php/Random_number_generation#.2Fdev.2Furandom,
> > /dev/urandom ought to be random enough for this task. Or are cat/cp that much
> > faster?
> >
> > Any thoughts?
> >
> > Greetings
>
> actually 1 time is enough. With zeros. Or ones. Does not matter at all.
If you look at my initial response to Rich, I already concluded that "one time
is enough", although I'm going to stick with whatever random data shred(1)
produces.
--
Marc Joliet
--
"People who think they know everything really annoy those of us who know we
don't" - Bjarne Stroustrup
[-- Attachment #2: Digitale Signatur von OpenPGP --]
[-- Type: application/pgp-signature, Size: 819 bytes --]
^ permalink raw reply [flat|nested] 30+ messages in thread
* [gentoo-user] Re: Securely deletion of an HDD
2015-07-12 14:39 ` Marc Joliet
2015-07-12 19:21 ` Rich Freeman
@ 2015-07-13 15:03 ` Grant Edwards
2015-07-13 17:20 ` Marc Joliet
1 sibling, 1 reply; 30+ messages in thread
From: Grant Edwards @ 2015-07-13 15:03 UTC (permalink / raw
To: gentoo-user
On 2015-07-12, Marc Joliet <marcec@gmx.de> wrote:
> With regards to the other replies: I think physical destruction is
> unnecessary, and I don't really want to go through the trouble.
If it's "trouble" rather than "fun", then you're doing it wrong. :)
There's thermite:
http://hackaday.com/2008/09/16/how-to-thermite-based-hard-drive-anti-forensic-destruction/
And mechanical shredding:
http://www.youtube.com/watch?v=AZdZGKyu9hc
Others favor a high-powered rifle or an 8lb sledge.
--
Grant Edwards grant.b.edwards Yow! Sometime in 1993
at NANCY SINATRA will lead a
gmail.com BLOODLESS COUP on GUAM!!
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Re: Securely deletion of an HDD
2015-07-13 15:03 ` [gentoo-user] " Grant Edwards
@ 2015-07-13 17:20 ` Marc Joliet
0 siblings, 0 replies; 30+ messages in thread
From: Marc Joliet @ 2015-07-13 17:20 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 1066 bytes --]
Am Mon, 13 Jul 2015 15:03:10 +0000 (UTC)
schrieb Grant Edwards <grant.b.edwards@gmail.com>:
> On 2015-07-12, Marc Joliet <marcec@gmx.de> wrote:
>
> > With regards to the other replies: I think physical destruction is
> > unnecessary, and I don't really want to go through the trouble.
>
> If it's "trouble" rather than "fun", then you're doing it wrong. :)
OK, you have a point ;-) .
> There's thermite:
>
> http://hackaday.com/2008/09/16/how-to-thermite-based-hard-drive-anti-forensic-destruction/
>
> And mechanical shredding:
>
> http://www.youtube.com/watch?v=AZdZGKyu9hc
>
> Others favor a high-powered rifle or an 8lb sledge.
That does look fun! However, I meant along the lines of destroying the disk
surface, because I want to give the HDDs away for recycling (a computer chain I
occasionally buy from collects old hardware for this purpose). Good for the
environment and all that :-) .
--
Marc Joliet
--
"People who think they know everything really annoy those of us who know we
don't" - Bjarne Stroustrup
[-- Attachment #2: Digitale Signatur von OpenPGP --]
[-- Type: application/pgp-signature, Size: 819 bytes --]
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Securely deletion of an HDD
2015-07-13 0:18 ` Rich Freeman
2015-07-13 1:50 ` Thomas Mueller
@ 2015-07-14 22:21 ` R0b0t1
2015-07-15 12:29 ` Rich Freeman
1 sibling, 1 reply; 30+ messages in thread
From: R0b0t1 @ 2015-07-14 22:21 UTC (permalink / raw
To: gentoo-user
On Sun, Jul 12, 2015 at 7:18 PM, Rich Freeman <rich0@gentoo.org> wrote:
>I think that assumes that the two get averaged together in some way
>and cannot be separated. If you could determine the orientation of
>individual magnetic domains it is possible that you might be able to
>determine which ones are which. For example, if in a given location
>you found 90% of the grains had one orientation, and 10% had another,
>you might be able to infer that the 10% was the previous value of that
>location.
Every bit on the disk will have this ghost inverse behind it. If you
flip bits at random - what overwriting the drive with random data
effectively does - then it's impossible to tell which ones were
flipped recently and which ones were flipped before the last write.
>That probably isn't practical with current technology, but I see no
>reason that it should be impossible.
Magnetic force microscopy has a resolution fine enough to read any
disk that can be created - they're just really expensive.
On Sun, Jul 12, 2015 at 8:50 PM, Thomas Mueller
<mueller6726@bellsouth.net> wrote:
>All that has been said on this thread supposes that the hard drive is still readable and writable.
On Sun, Jul 12, 2015 at 6:22 PM, R0b0t1 <r030t1@gmail.com> wrote:
>If you need to destroy a platter drive take it apart and sand the platters (probably the easiest). If it's solid state heat the drive over 150C-250C for an extended period of time or mechanically destroy the chips.
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Securely deletion of an HDD
2015-07-14 22:21 ` R0b0t1
@ 2015-07-15 12:29 ` Rich Freeman
0 siblings, 0 replies; 30+ messages in thread
From: Rich Freeman @ 2015-07-15 12:29 UTC (permalink / raw
To: gentoo-user
On Tue, Jul 14, 2015 at 6:21 PM, R0b0t1 <r030t1@gmail.com> wrote:
>
> On Sun, Jul 12, 2015 at 7:18 PM, Rich Freeman <rich0@gentoo.org> wrote:
> >I think that assumes that the two get averaged together in some way
> >and cannot be separated. If you could determine the orientation of
> >individual magnetic domains it is possible that you might be able to
> >determine which ones are which. For example, if in a given location
> >you found 90% of the grains had one orientation, and 10% had another,
> >you might be able to infer that the 10% was the previous value of that
> >location.
>
> Every bit on the disk will have this ghost inverse behind it. If you
> flip bits at random - what overwriting the drive with random data
> effectively does - then it's impossible to tell which ones were
> flipped recently and which ones were flipped before the last write.
If a disk head moves across a track and lays down a pattern of
magnetic fields, I imagine that the intensity of those fields will
vary with distance from the head. If the head makes a second pass
writing a different pattern of magnetic fields following a path not
identical to the first, I imagine that those field intensities will
also vary with distance from the head, but particles on ones die of
the track will probably retain more of the former pattern and
particles on the other side of the track would tend to retain more of
the second pattern.
I'm just not seeing anything that suggests that such an attack is
physically impossible. It might be impractical today. It might be
impractical forever. However, impossible is a very high bar to clear.
Whether somebody with a technical capability so advanced that it is so
debatable today fits within your threat model is a different story.
Clearly these techniques are not available commercially/etc. If
you're afraid of the NSA and you have unencrypted data on a disk in
the first place they've probably already defeated your security in 100
different ways already. So, I'll agree there is a practical argument
to be made.
However, I can't really agree that something is physically impossible
unless you can prove it from first principles.
--
Rich
^ permalink raw reply [flat|nested] 30+ messages in thread
* Re: [gentoo-user] Re: Securely deletion of an HDD
[not found] ` <pLNwK-6AP-35@gated-at.bofh.it>
@ 2015-07-15 18:28 ` wireless
2015-07-15 19:45 ` Grant Edwards
0 siblings, 1 reply; 30+ messages in thread
From: wireless @ 2015-07-15 18:28 UTC (permalink / raw
To: gentoo-user
On 07/13/2015 10:10 AM, Grant Edwards wrote:
>> With regards to the other replies: I think physical destruction is
>> unnecessary, and I don't really want to go through the trouble.
> If it's "trouble" rather than "fun", then you're doing it wrong. :)
Brilliant statement::
> Others favor a high-powered rifle or an 8lb sledge.
In my impetuous youth, The first time I got to work under an old
AT&T unix license, we had several heated debates with nerds from DC
and Jersey..... turns out I was right; you could kill an "phone switch"
with a single shot (and old at&t 3Bx series).
I took out a .338 with a questionable round and one shot turned off
3 out of 4 drives and most of the processors. The a_holes went back
to their agency; and I lost some very valuable potential clients.
But Grant is most correct!; if it ain't fun why fork with it?
I did become great friends with some folks from the jersey labs......
cheers!
James
^ permalink raw reply [flat|nested] 30+ messages in thread
* [gentoo-user] Re: Securely deletion of an HDD
2015-07-15 18:28 ` [gentoo-user] " wireless
@ 2015-07-15 19:45 ` Grant Edwards
2015-07-15 21:07 ` James
0 siblings, 1 reply; 30+ messages in thread
From: Grant Edwards @ 2015-07-15 19:45 UTC (permalink / raw
To: gentoo-user
On 2015-07-15, wireless@tampabay.rr.com <wireless@tampabay.rr.com> wrote:
> In my impetuous youth, The first time I got to work under an old
> AT&T unix license, we had several heated debates with nerds from DC
> and Jersey..... turns out I was right; you could kill an "phone switch"
> with a single shot (and old at&t 3Bx series).
Back in the 80s I worked for a company that made/sold radio-telephony
mobile and base station equipment (which is basically a PBX connected
to a bank of radio transceivers instead of phone sets). They had more
than a few systems installed in various Central and South American
countries during the 60s and 70s (the worse the standard copper
infrastructure, the more important mobile phones tended to be).
The field service guys told me that a not uncommon failure mode for
the base station equipment was bullet holes.
It turns out that one of the first things you do during a coup in a
small central/south american county is take over or disable the
radio-telphone base stations. [Back then the base stations were much
higher power and covered much larger areas than a cellular base
station does these days.]
--
Grant Edwards grant.b.edwards Yow! Is something VIOLENT
at going to happen to a
gmail.com GARBAGE CAN?
^ permalink raw reply [flat|nested] 30+ messages in thread
* [gentoo-user] Re: Securely deletion of an HDD
2015-07-15 19:45 ` Grant Edwards
@ 2015-07-15 21:07 ` James
0 siblings, 0 replies; 30+ messages in thread
From: James @ 2015-07-15 21:07 UTC (permalink / raw
To: gentoo-user
Grant Edwards <grant.b.edwards <at> gmail.com> writes:
> It turns out that one of the first things you do during a coup in a
> small central/south american county is take over or disable the
> radio-telphone base stations. [Back then the base stations were much
> higher power and covered much larger areas than a cellular base
> station does these days.]
Yep:: Then when I got my first research lab, guess what was our first
'Big Donation' ? A semi trailer full of every make of those old at&t
unix systems; from 3B2's own up the ladder to working switchgear.
We wiped them clean and put Mt. Xinu unix (BSD) on them just to tick
off the at&t folks.... Funny thing was they just kept giving us more and
more equipment...
Kids now a days do not get to play with the 'toys' we did in college.
At poker flats [1] we got to shoot off rockets into the ionosphere. Try
that one today.... The father of the modern rocket [2] taught my son
Multi-Variable Calculus.... Small world when you get down to it....
Want to see the latest in Mach 7 guns?
cheers!
James
[1] http://www.pfrr.alaska.edu/
[2]
http://motherboard.vice.com/blog/lebanons-forgotten-space-race-in-1961-manoug-manougian-aimed-the-middle-east-at-the-stars
^ permalink raw reply [flat|nested] 30+ messages in thread
end of thread, other threads:[~2015-07-15 21:08 UTC | newest]
Thread overview: 30+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-07-12 12:35 [gentoo-user] Securely deletion of an HDD Marc Joliet
2015-07-12 12:48 ` Rich Freeman
2015-07-12 14:39 ` Marc Joliet
2015-07-12 19:21 ` Rich Freeman
2015-07-12 19:42 ` Neil Bothwick
2015-07-13 15:03 ` [gentoo-user] " Grant Edwards
2015-07-13 17:20 ` Marc Joliet
2015-07-12 13:00 ` [gentoo-user] " Mick
2015-07-12 13:22 ` Francisco Ares
2015-07-12 16:32 ` Volker Armin Hemmann
2015-07-12 19:14 ` Rich Freeman
2015-07-12 20:43 ` Volker Armin Hemmann
2015-07-12 21:10 ` Rich Freeman
2015-07-12 21:20 ` Volker Armin Hemmann
2015-07-12 21:30 ` Rich Freeman
2015-07-13 8:05 ` Volker Armin Hemmann
2015-07-13 11:03 ` Rich Freeman
2015-07-12 22:22 ` R0b0t1
2015-07-13 0:18 ` Rich Freeman
2015-07-13 1:50 ` Thomas Mueller
2015-07-13 8:09 ` Volker Armin Hemmann
2015-07-13 10:58 ` Marc Joliet
2015-07-14 22:21 ` R0b0t1
2015-07-15 12:29 ` Rich Freeman
2015-07-13 10:54 ` Marc Joliet
2015-07-13 11:04 ` Marc Joliet
2015-07-13 9:53 ` Joerg Schilling
[not found] <pLoI2-8eV-1@gated-at.bofh.it>
[not found] ` <pLoRI-8hZ-5@gated-at.bofh.it>
[not found] ` <pLqJQ-Y0-19@gated-at.bofh.it>
[not found] ` <pLNwK-6AP-35@gated-at.bofh.it>
2015-07-15 18:28 ` [gentoo-user] " wireless
2015-07-15 19:45 ` Grant Edwards
2015-07-15 21:07 ` James
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox