too bad it's not an old spnner... just leave it on your speaker magnet
overnight. reformat in the morning.

:P
Fred

On Sun, Jan 27, 2019 at 3:24 PM Patrick O'Callaghan <pocallag...@gmail.com>
wrote:

> On Sun, 2019-01-27 at 15:06 -0800, Gordon Messmer wrote:
> > On 1/27/19 2:44 PM, Patrick O'Callaghan wrote:
> > > If it's not being read and rewritten, it's not being encrypted. It's as
> > > simple as that. A cryptosystem that doesn't read the plaintext? How
> > > does that work?
> >
> > The suggestion you're replying to didn't encrypt the drive in place.  It
> > read a stream of zeros from /dev/zero, encrypted that stream, and wrote
> > that stream to the disk.  Thus, nothing needed to be read from any disk.
>
> I think the writer *thought* it was encrypting the disk. I may be
> wrong, but that's what I was responding to rather than the minutiae of
> the actual command.
>
> Regardless, writing a bunch of encrypted zeroes is no better than
> writing plain zeroes or writing random noise, if it's just a single
> pass. I think the various answers here are actually addressing slightly
> different questions. In my case I'm talking about defence against
> physical-level analysis of the disk.
>
> > However, this whole thread is questionable.  It is predicated on the
> > assumption that your CPU can encrypt a stream of zeros faster than it
> > can generate random data, and also that it can write to its disk faster
> > than it can generate random data.  If either of those things is not
> > true, then using an encrypted volume to "wipe" a drive will be slower
> > and more complex, for no benefit.
> >
> > On my Dell XPS 13, I can read from /dev/urandom at almost exactly the
> > same speed that I can write to a dm-crypt block device, so there would
> > be no reason to use dm-crypt over simply dd if=/dev/urandom to the drive.
>
> Of course.
>
> > (But the point that I was making when I replied to this thread to begin
> > with is that if you are concerned with wiping your data from drives, it
> > should never have been written to the drive in an unencrypted form to
> > begin with.  Encrypt your disks.  When you want to get rid of them,
> > they're already as secure as your passphrase, and you can irrecoverably
> > wipe them by simply wiping the key header.  It's nearly instantaneous.)
>
> Again, I agree, but that's not what the OP asked. Telling him "you
> should have started with an encrypted disk" is like telling a traveller
> who's asking the way to Podunk "start from somewhere else".
>
> poc
> _______________________________________________
> users mailing list -- users@lists.fedoraproject.org
> To unsubscribe send an email to users-le...@lists.fedoraproject.org
> Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
>
_______________________________________________
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org

Reply via email to