On Tuesday, May 28, 2002, at 05:27 , Jonathan E. Paton wrote:
[..]
>   Never rely totally on software based security.  There is no point
>   installing/writing lots of security software if your system admin is
>   a KGB agent, or your cleaner can access your computer system.
>
>   EVERY computer can be cracked with physical access.
[..]

Just to stomp the last bit out of this thread. Since I
think in the main jonathan has done an excellent layout.

IF you are really planning 'secure computing' - then
you already have read the tempest guide. You also know
that you will be shredding the hard drives before the
leave the facility.... along with the memory chips...

for those of you who have never tossed things into an
FM-10 Diesel powered shredder[1] - trust me - the data is
not recoverable - just make sure that you are not in
the way if the grinder blades do a kick back - that's why
there are those 'dings' in the bulk head....

oh sorry - you just meant to do multiple writes of
random data with a highly improved probability that
the reuse of datablock allocations from the underlying
device have sufficiently scrambled the data set so as
not to be recoverable.

The problem of course is IF there is a 'journaling' FS -
that is making multiple backup layers...

ciao
drieux

---

[1] FM-10's were what we used to power diesel
submarines - trust me you can kiss your hard drive
good by after one of these puppies 'eats your data'.

ps: remember to bring raw meat for the marines
doing guard mount - they will be easier to relate to.


-- 
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to