On Tue Apr 27, 2021 at 10:49 AM BST, Janne Johansson wrote:
> Regardless of OS, the "easiest" setup is where you encrypt the drives
> and wipe by "forgetting" the keys. Then you can dd the disks if it
> makes someone else happy but having FDE and changing the key to
> something random that you don't store, and then doing a normal wipe in
> the simplest of terms would cover a lot of the practical attacks.
>
> For the ones concerned with theoretical and imaginary enemies,
> PXE-booting into a DBAN.iso or similar wiping solutions is probably
> the next step. Also OS-independent.

Thanks Janne. Certainly those are two useful methods for ensuring that
the disk is wipe or the contents are not accessible. The scenario I am
thinking about is say a laptop is left in a suspended state, and
forgotten on a train somewhere. The contents of the drive would be
recoverable in that state unless something remote was to lock it down or
wipe the disk

--
Oliver Leaver-Smith
TZ=Europe/London

Reply via email to