If you want to be super paranoid about things, use properly implemented full disk encryption from the get go. Once you are ready to wipe the disk, use what is standard for most Government/Business use: overwrite with random data 7 times. If you want to be super aggressive about things (yet for some reason refuse to just destroy the disk) you can do 14 runs alternating between random data and zeros.

In my opinion, this is overkill and just silly, if you're really that concerned about the contents of your drive being discovered, full disk encryption would make that concern largely irrelevant. After 7 disk wipes with dd, no ones getting your data back off that drive, not for all the tea in China.


On 01/12/18 02:27, Etienne wrote:
On 11/01/18 14:45, Andreas Thulin wrote:
in order to achieve paranoid disk-wiping?

I don't have a solution to offer for existing disks, but that made me just think that it would be probably easy to create two partitions on a disk, one that will be a keydisk (https://www.openbsd.org/faq/faq14.html#softraidFDEkeydisk) and one that would be the real partition holding the data, and the day you need to wipe the disk, the only thing you need to wipe (a few times if you're paranoid) is the keydisk partition, and the data will be unrecoverable.

Does that sound sensible, or am I missing something?


Reply via email to