2009/10/28 Noah Pugsley :
> Can I interest you in a pair of steganograpanties? Or for cooler weather,
> steganograpantaloons?
The problem with steganograpanties is that residual images of my ass
are present *underneath* the panties - therfore if the offending
Germans were to use high technology pa
On 29 October 2009 c. 15:34:42 Jacob Yocom-Piatt wrote:
> Noah Pugsley wrote:
> > Can I interest you in a pair of steganograpanties? Or for cooler
> > weather, steganograpantaloons?
>
> are you suggesting there are messages hidden in pictures of beck's
> ass?
>
> the russians will be very upset. yo
Noah Pugsley wrote:
Can I interest you in a pair of steganograpanties? Or for cooler
weather, steganograpantaloons?
are you suggesting there are messages hidden in pictures of beck's ass?
the russians will be very upset. you should have taken thermite to those
disks...
Marco Peereboom wr
2009/10/28 Marco Peereboom :
> They'll use it as torture material during the next krieg.
I never thought that an OBSD dev ass could be so destructive!
Can I interest you in a pair of steganograpanties? Or for cooler
weather, steganograpantaloons?
Marco Peereboom wrote:
They'll use it as torture material during the next krieg.
On Wed, Oct 28, 2009 at 04:48:28PM -0600, Bob Beck wrote:
What, you have pictures of my ass too?
Obviously I must ma
They'll use it as torture material during the next krieg.
On Wed, Oct 28, 2009 at 04:48:28PM -0600, Bob Beck wrote:
> > What, you have pictures of my ass too?
>
> Obviously I must make something to write a random pattern over my
> entire ass so that It won't be recognized if some germans steal it
2009/10/28 Henning Brauer :
> * Bob Beck [2009-10-28 20:57]:
>> > I would rather my family photos
>>
>> Yeah, but I hike with bastards who take pictures of my ass and put it
>> up on the internet for all to see.. So how can I delete the data
>> from his web server? Is there some kind of remo
> What, you have pictures of my ass too?
Obviously I must make something to write a random pattern over my
entire ass so that It won't be recognized if some germans steal it.
* Bob Beck [2009-10-28 20:57]:
> > I would rather my family photos
>
> Yeah, but I hike with bastards who take pictures of my ass and put it
> up on the internet for all to see.. So how can I delete the data
> from his web server? Is there some kind of remote bioctl --de-assify I
> could ru
Then the question asked should be "How do I keep my data safe if it's
stolen?", not "How do I overwrote data on my not-stolen hard drive?"
But if somebody would actually be able to sell your family photos to
the highest bidder, I'm extremely jealous. My family is not nearly so
interesting.
On We
On Wed, Oct 28, 2009 at 4:22 PM, Marco Peereboom wrote:
> What in the world do stolen disks have to do with over writing the
> content on it?
The thread suggested svnd, softraid and cfs as a counter measure. An
encrypted disk with no key is effectively an over written disk. How is
that point lost
What in the world do stolen disks have to do with over writing the
content on it?
On Wed, Oct 28, 2009 at 03:34:07PM -0400, Brad Tilley wrote:
> On Wed, Oct 28, 2009 at 2:27 PM, Marco Peereboom wrote:
> > or you should realize that you and your data really aren't that important.
>
> It's an issu
On Wed, Oct 28, 2009 at 3:44 PM, Bob Beck wrote:
>Is there some kind of remote bioctl --de-assify I could run?
I'm not sure you can be de-assified.
On Wed, Oct 28, 2009 at 01:44:00PM -0600, Bob Beck wrote:
> > I would rather my family photos
>
> Yeah, but I hike with bastards who take pictures of my ass and put it
> up on the internet for all to see.. So how can I delete the data
> from his web server? Is there some kind of remote bioct
> I would rather my family photos
Yeah, but I hike with bastards who take pictures of my ass and put it
up on the internet for all to see.. So how can I delete the data
from his web server? Is there some kind of remote bioctl --de-assify I
could run?
On Wed, Oct 28, 2009 at 2:27 PM, Marco Peereboom wrote:
> or you should realize that you and your data really aren't that important.
It's an issue about privacy, not self-importance. Pawn shops are full
of stolen computers with other people's data. That's the *only* reason
I overwrite and/or encr
or you should realize that you and your data really aren't that important.
2009/10/28 Joachim Schipper :
> On Wed, Oct 28, 2009 at 08:52:20AM -0300, Gonzalo Lionel Rodriguez wrote:
>> 2009/10/28 Jan Stary :
>> > On Oct 27 16:12:54, Jordi Espasa Clofent wrote:
>> > Could we please stop this thread now and never bring it back? Thank
you.
>> >
>> > (1) Your data is not that
Jordi Espasa Clofent wrote:
Hi all,
The subject is auto-descriptive ;)
After reading a while about wiping [1] I think there's not a unique
way to do it. Finally I've chosen a simple double-step method:
First,
$ dd if=/dev/urandom of=
and next
$ dd if=/deb/zero of=
?Do you think is it safe
On Wed, Oct 28, 2009 at 08:52:20AM -0300, Gonzalo Lionel Rodriguez wrote:
> 2009/10/28 Jan Stary :
> > On Oct 27 16:12:54, Jordi Espasa Clofent wrote:
> > Could we please stop this thread now and never bring it back? Thank you.
> >
> > (1) Your data is not that interesteing to anyone. (...)
> > (2
Put the sensitive files in a pseudo-device vnd and then delete it.
2009/10/28 Jan Stary :
> On Oct 27 16:12:54, Jordi Espasa Clofent wrote:
>> $ dd if=/dev/urandom of=
>> $ dd if=/deb/zero of=
>> ?Do you think is it safe enough? I mean ?is it enough against the common
>> recovery low-level data to
On Oct 27 16:12:54, Jordi Espasa Clofent wrote:
> $ dd if=/dev/urandom of=
> $ dd if=/deb/zero of=
> ?Do you think is it safe enough? I mean ?is it enough against the common
> recovery low-level data tools?
Could we please stop this thread now and never bring it back? Thank you.
(1) Your data
A paper has been published about the claim that you can recover data
with an electron microscope
(http://www.springerlink.com/content/408263ql11460147/).
Unfortunately the paper is not available for free, but the summary is
that after overwriting it 1 time you can't recover data anymore with
ha
Another route to securely "erasing" information is encryption. OpenBSD
includes at least 3 systems for disk encryption (svnd, softraid, and
cfs (ports)). I've personally used cfs and svnd, and as is usually
the case on OpenBSD, both work nicely once you RTFM. (I should really
write an undeadly a
On Tuesday 27 October 2009 15:47:37 Josh Grosse wrote:
> On Tue, 27 Oct 2009 15:25:51 -0400, STeve Andre' wrote
>
> > ...The real danger today are
> > sectors that got mapped out which are bad, but could contain
> > interesting or embaressing data; 512 bytes could hold a lot of stuff,
> > like
/dev/zero is like a bazillion times faster, and just as secure.
-B
p.s. Why do I have deja vu?
http://archives.neohapsis.com/archives/openbsd/2008-09/1453.html
http://archives.neohapsis.com/archives/openbsd/2008-09/thread.html#1215
On Tue, Oct 27, 2009 at 8:12 AM, Jordi Espasa Clofent
wrote:
On Tue, 27 Oct 2009 15:25:51 -0400, STeve Andre' wrote
> ...The real danger today are
> sectors that got mapped out which are bad, but could contain
> interesting or embaressing data; 512 bytes could hold a lot of stuff,
> like passwords.
Perhaps what I already noted, in this thread, suggestin
On Tuesday 27 October 2009 14:12:56 Brad Tilley wrote:
> On Tue, Oct 27, 2009 at 11:12 AM, Jordi Espasa Clofent
> wrote:
> > $ dd if=/deb/zero of=
> >
> > ?Do you think is it safe enough? I mean ?is it enough against the common
> > recovery low-level data tools?
>
> There is no evidence of over-w
Jordi Espasa Clofent wrote:
...
$ dd if=/deb/zero of=
?Do you think is it safe enough? I mean ?is it enough against the common
recovery low-level data tools?
Do just this, and no software-based recovery tool will ever see all your
data again. You might get some pay-dirt if you can release t
On Tue, Oct 27, 2009 at 11:12 AM, Jordi Espasa Clofent
wrote:
> After reading a while about wiping [1] I think there's not a unique way to
> do it. Finally I've chosen a simple double-step method:
You take the hard drive out, you melt it, then you put a new one in.
If your data isn't worth a $100
On Tue, Oct 27, 2009 at 11:12 AM, Jordi Espasa Clofent
wrote:
> $ dd if=/deb/zero of=
>
> ?Do you think is it safe enough? I mean ?is it enough against the common
> recovery low-level data tools?
There is no evidence of over-written data *ever* being recovered.
There is some theory in research pa
On Tue, Oct 27, 2009 at 04:12:54PM +0100, Jordi Espasa Clofent wrote:
> to do it. Finally I've chosen a simple double-step method:
>
> First,
>
> $ dd if=/dev/urandom of=
>
> and next
>
> $ dd if=/deb/zero of=
I overwrite the disk 7 times with arandom, using the following command
for x in `jot -
On Tue, 27 Oct 2009 17:14:52 +0100, Rene Maroufi wrote
> Last year, I talked with a employee of a data recovery company about
> this. My question to him was: Is it enough to overwrite a partition
> or harddisk only once, or must i do this many times. His answer was:
> On all modern harddisk its
It may not erase all data if the device can do block relocation and you
don't have direct access to phisical blocks. But if data remains on
hidden or discarted blocks it is still hard to someone else recover it.
Jordi Espasa Clofent wrote:
Hi all,
The subject is auto-descriptive ;)
After read
On Tue, Oct 27, 2009 at 04:12:54PM +0100, Jordi Espasa Clofent wrote:
> Hi all,
>
> The subject is auto-descriptive ;)
> After reading a while about wiping [1] I think there's not a unique way
> to do it. Finally I've chosen a simple double-step method:
>
> First,
>
> $ dd if=/dev/urandom of=
>
Jordi Espasa Clofent wrote:
Hi all,
The subject is auto-descriptive ;)
After reading a while about wiping [1] I think there's not a unique way
to do it. Finally I've chosen a simple double-step method:
First,
$ dd if=/dev/urandom of=
and next
$ dd if=/deb/zero of=
?Do you think is it safe
Hi all,
The subject is auto-descriptive ;)
After reading a while about wiping [1] I think there's not a unique way
to do it. Finally I've chosen a simple double-step method:
First,
$ dd if=/dev/urandom of=
and next
$ dd if=/deb/zero of=
?Do you think is it safe enough? I mean ?is it enough
37 matches
Mail list logo