Re: secure erasure of files?

From: Jesse Pollard (pollard@tomcat.admin.navo.hpc.mil)
Date: Tue Feb 19 2002 - 11:19:23 EST


--------- Received message begins Here ---------

>
> >I would strongly encourage somebody with fluent Norsk/English skills
> >to do a translation and post it to the list.
>
> I'll do my very best ...
>
> (translated by Roy Sigurd Karlsbakk - please don't spam me in case of bad
> speling :)
>
> With permission from the leader of Research and Deveopment department, I
> quote his complete answer:
>
> I'll try to answer your questions:
>
> The short answer is: No. It is not possible to read data that are (really)
> physically overwritten.

[snip]

In the non-destructive read case - true.

HOWEVER: forensic specialists can:

        http://www.cs.auckland.ac.nz/~pgut001/secure_del.html
or (same paper)
        http://www.usenix.org/publications/library/proceedings/sec96/full_papers/gutmann/

>
> Addition:
>
> Still, it should be said that this is being argued upon between the
> 'wise' ones. This is - there are people that mean it is possible
> to read/recover overwritten data. But we have, as mentioned above,
> not found any scientific documentation or decriptions of how this
> can be done.

See the paper referenced above. There may be more recent documents, but
this one is quite clear on the limitations of erasure using the standard
drive electronics.

-------------------------------------------------------------------------
Jesse I Pollard, II
Email: pollard@navo.hpc.mil

Any opinions expressed are solely my own.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Sat Feb 23 2002 - 21:00:20 EST