[144379] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Destroying confidential information from database

daemon@ATHENA.MIT.EDU (Sandy Harris)
Thu Apr 30 19:30:17 2009

In-Reply-To: <49B5286B.6040803@lsitec.org.br>
Date: Fri, 1 May 2009 07:07:47 +0800
From: Sandy Harris <sandyinchina@gmail.com>
To: Cryptography <cryptography@metzdowd.com>

On Mon, Mar 9, 2009 at 10:32 PM, Mads <mads@lsitec.org.br> wrote:

> I know of procedures and programs to erase files securely from disks,
> Guttman did a paper on that....

Yes, but that paper is over ten years old. In the meanwhile, disk
designs and perhaps encoding schemes have changed, journaling
file systems have become much more common and, for all I
know the attack technology may have changed too.

Is there a more recent analysis or is Guttman still the
best reference?

-- 
Sandy Harris,
Quanzhou, Fujian, China

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post