On Thursday 27 October 2005 16:23, Chuck Guzis wrote:
On 10/27/2005 at 9:47 PM Gordon JC Pearce wrote:
Ah, but what if the $THREE_LETTER_AGENCY has a
device that can
reassemble the drive fragments and read them? I read somewhere that
they can do that, these days...
I don't know if the Christians in Action actually have the equipment
in-house to do this, but as I recall, it requires something like a
STM and is very very very slow (something like 1 Kbit/hr). Wasn't
there some work on this published by a guy at ETH a few years back?
IAC, stories like this just give the naysaying manager more ammo.
You know, there's easier ways for government agencies, etc, to get a
hold of the data than to try and recover it off of an erased disk,
like, social engineering, or court orders, for example. It's probably
cheaper to bribe someone to give you the data than to recover it via
technological means. Your boss should be more worried about his
employees selling off sensitive company data (or even someone breaking
in and getting it off of a live machine) than recovering it from a
well-erased disk.
By well-erased, I mean requiring more than just some software on a
computer to recover the data... dd'ing /dev/zero to a drive *is* good
enough, where just mkfs/newfs'ing the disk isn't.
Pat
--
Purdue University Research Computing ---
http://www.rcac.purdue.edu/
The Computer Refuge ---
http://computer-refuge.org