On Aug 21, 2008, at 5:08 PM, Faramir wrote:
Chris De Young escribió:
Robert J. Hansen wrote:
Faramir wrote:
lets say I just want to avoid recovery software like "get data
back"
being able to recover a file. Is there a reliable way to do it
without going to "extreme" solutions?
No.
It's not clear to me why this is the case; it seems to me that if
you're only
worried about access that uses the drive's own process for getting
bits off the
platters, then a simple overwrite (and only once) would be
sufficient. If you're
going to try to read the drive using the drive's own read/write
heads and
firmware (which all of these software applications do, right?), the
most
recently written bits are the only ones that should be available.
That's is what I am no longer sure I can do, I mean, it seems I can
tell the disk "overwrite that file", and the disk can write somewhere
else, not over the sectors containing the file I want to "destroy" (at
least, that is what I have understood from this thread). But maybe
there
is some app capable of telling the disk "write this random patter
right
over the place where the original file is, and not in other places".
That's exactly the problem - given modern disks, and modern
filesystems, there is not a perfect guarantee that you'll hit the same
disk blocks that the original file landed on. The disk could
invisibly remap a block out from under you at any time (it does this
automatically when the disk firmware detects a bad block), the
filesystem could be doing journaling games, etc, etc. A program
running on the computer the disk is attached to can't really do much
about disk block remapping since it doesn't see this. It always asks
for (for example) block 100. If the file was written when block 100
pointed to block 100, but by the time the overwrite happens, block 100
has become 12345, then the computer doesn't know it needs to overwrite
both 100 and 12345 to get all traces of the file.
Well, the original question did not include any context (and I was
not the one making the question), so it was very reasonable to talk
about physical destruction of the drive, but since I am sure some
people
is not concerned about NSA or KGB trying to recover the info, just
about
low budget people, I added that context... something like "I want to
be
sure my room mate won't be able to recover the picture portraying my
girlfriend naked, which I just deleted" (it is just an imaginary
context, I don't have that problem).
Let's simplify things this way: you have regular people and forensics
lab people. You have single file shredding, and whole-disk
shredding. Regular people only have access to the disk that a
computer can have. That is, they are reading the disk using the disk
interface. Forensics labs can do things like remove the platters and
go for the electron microscopes. Single file shredding is just that -
you pick a particular file on the disk and shred it. Other files are
not affected. Whole-disk shredding shreds the whole disk at a block
level, and the entire contents of the disk are lost. The disk would
need a reformat / re-mkfs before using it again. This is a
simplification, of course, but it's a reasonable one.
We've discussed forensics lab stuff elsewhere in this thread, so I'll
skip it here. That leaves only two cases:
Regular people + single file shred: This may or may not be safe
depending on whether the filesystem you are using overwrites in place
or not. Many modern filesystems (Reiser, XFS) do not necessarily
overwrite in place. More primitive filesystems (like the FAT FS that
is used on many external disks) do overwrite in place. Linux systems
most commonly use ext3, and that may or may not overwrite in place,
depending on how it is configured. Then there is the fact that many
programs create temp files here and there which wouldn't get
shredded. On top of that there is the fact that many programs save
files in ways that can defeat shredding. Bottom line: it can be safe,
but you have to really know details of your OS and what programs
generate the files you want to shred. In practice, it's a little iffy.
Regular people + whole disk: This is pretty safe. The disk might be
doing magic underneath you, but given that the attacker is only able
to read the disk via the disk interface itself, the magic is not
visible (or rather, it is equally visible or invisible to both you and
your attacker). Any temp files are blown away just like everything
else is.
Bottom line is, yes, you can protect yourself from your roommate with
shredding (assuming your roommate doesn't work for a computer
forensics lab). Of course, you'd better make sure your shred program
is a good one. I've seen some pretty silly bugs that make some of
them not actually protect you particularly well...
David
_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users