In message <200601281623530975.3A404C18 at 10.0.0.252>
"Chuck Guzis" <cclist at sydex.com> wrote:
As I recall, it's a long hard process. I'm
trying to recall the original
paper by some guy in Switzerland using a modified STM. I think he said he
could retrieve about 1000 overwritten bits per hour.
Neat, but I doubt any TLA has that much time to burn on the recovery of a
HDD.
I've seen a few crypto apps turn up with "plausible deniability" type
features. You basically encrypt two different versions of the file with two
different encryption keys. One key gets you, say, a shopping list or a photo
of a family pet while the other gets you some leaked source code or other
incriminating stuff. The theory is, you can't tell that the "hidden" file
is
in there unless you have the key that goes with it. Well, in theory at least.
--
Phil. | Acorn RiscPC600 SA220 64MB+6GB 100baseT
philpem at
dsl.pipex.com | Athlon64 3200+ A8VDeluxe R2 512MB+100GB
http://www.philpem.me.uk/ | Panasonic CF-25 Mk.2 Toughbook
... A seminar on Time Travel will be held two weeks ago