Paul Menzel <pm.deb...@googlemail.com> writes: > Am Mittwoch, den 11.03.2009, 11:08 +0100 schrieb Goswin von Brederlow: >> Matt Taggart <tagg...@debian.org> writes: >> >> >> Well this assumption (to encrypt the disc afterward) is not necessarily >> >> valid. A company is giving away computers to a school or for use for >> >> children, where no encryption is needed. They require you to wipe the >> >> drive. (Ok, they should do it themselves to be on the safe side of >> >> things, but in reality things are different.) >> > >> > BTW something like "Dan's Boot and Nuke" is an option for this case too. >> > But like I said in a previous mail it would be convenient if d-i could do >> > this as I usually have d-i disks laying around :) >> >> Switch to the second console. >> >> cat </dev/null >/dev/sda >> >> Go get lunch. > > Well that is not sufficient. Doing this the date can still be > reconstructed.
There have been multiple challenges to data reconstructing firms to actualy demonstrate they can reconstruct a disk after a single overwrite. None of them have been answered ttbom. So your claim remains theoretical. If you really are that paranoid then use /dev/(u)random multiple times. >> >> If such a udeb exists and the additional option is too much work, could >> >> you please point me to a howto where the handling of udeb-files is >> >> described, so I can unpack it manually. >> > >> > BTW, not a udeb but I did publish instructions on how to use shred >> > >> > http://lackof.org/taggart/hacking/d-i-tricks/#shred > > > Thanks, > > Paul MfG Goswin -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org