Why 'rm -R star' Isn't Enough 396
zdburke writes: "Short but interesting article in the New York Times (free reg req'd) about how difficult it is to cover your digital tracks because electronic documents are so well distributed -- on your lap top, on your workstation, on the server... Yes there are tools to thoroughly delete files on your computer, rather than just unlinking them when they're put in the trash, but it's the distributed nature of content these days that poses a special problem to the Ollie North's of the world."
Not a problem... (Score:5, Funny)
:)
Re:Not a problem... (Score:2, Informative)
-- Tim
Re:Not a problem... (Score:3, Interesting)
The answer, of course, remains not "several passes from dev/random" but rather, several swipes past a BFM.
Re:Not a problem... (Score:4, Informative)
Nope. The longer data is on the disk the "wider" it gets. A large number of
This is why the Govt requires that any disk that ever contained classified data must be INCINERATED.
-
Re:Not a problem... (Score:3, Interesting)
I second this advise. I used to work for a defence contractor back in the 80's and had the job of ensuring disk security on damaged drives. This consisted of taking a chisel to the disk platters and removing all trace of oxide from them and then sending the oxide off to be incinerated on-site and the blank aluminium platters off-site for recycling. This was taken very seriously and techniques for extracting data from disks can only have improved enormously in the intervening 20 years.
Don't just delete (Score:3, Informative)
Repeate 4 or 5 times, and good luch recovering anything...
Mirrors (Score:4, Insightful)
Sometimes when a problem gets high tech, it's time for a low-tech approach.
Re:Mirrors (Score:2, Informative)
This method does not ensure that any of your data is actually overwritten because the operating system is free to decide where on the disk it locates a file (or portions of it). Even though the filesystems references to that file name are destroyed by this method, the user has no guarantees that the data in the original file is overwritten. This is especially true in the case of remotely mounted filesystems which may not even implement the type of filesystem they appear to (e.g. Samba on Linux looks like it implements a MS filesystem).
This is the major shortcoming in most of the "secure delete" tools I have looked at.
Re:Mirrors (Score:3, Informative)
Russian Pencils (Score:2)
Re:Mirrors (Score:4, Interesting)
addition (Score:2, Informative)
That good enough for ya?
Re:addition (Score:2, Informative)
The only thing -f does is delete files without asking. That's good for getting rid of large numbers of files, but it won't overwrite any of the data.
If you're using a BSD box (MacOS X included), you can use -P. On Linux you can use srm [sourceforge.net].
Undeleting files on *nix (Score:5, Informative)
Looking for an undelete? Take a look at the coroners toolkit [http]. There's even instructions on how to recover files from a unix partition (any unix). It's one of those ones which you'd _really_ need to recover the data because it's hard work and a pain, but it is possible.
I don't recall seeing and 'write with zeros' program for Unix. I guess there must be some out there, since at a guess it's fairly trivial. (would dding
Of course, there's always disk analysis with an electron microscope, which I've always heard was possible but it's not one I've ever had substantiated.
Re:Undeleting files on *nix (Score:4, Informative)
Re:Undeleting files on *nix (Score:2, Informative)
Re:Undeleting files on *nix (Score:5, Informative)
NAME
shred - delete a file securely, first overwriting it to
hide its contents
SYNOPSIS
shred [OPTIONS] FILE [...]
Re:Undeleting files on *nix (Score:2, Informative)
electron microscopes, etc. (Score:2)
I can recall the nervousness of some folks dropping off their computer at a repair shop, because the machine had failed before they had a chance to destroy their pron collection and they had slightly exotic tastes. Things like that are always usefule to a legal team.
Re:Undeleting files on *nix (Score:3, Informative)
It had troubles with the 2.0.x series, where only the first few blocks could be recovered, but as of 2.1.x & upwards, it works like a charm on ext2.
I'm sure there would be other utilities capable of this for other platforms. There was also this old program for Solaris (whose name I've forgotten) that'd do just what you'd said to restore deleted files.
Nitpicking (Score:2, Informative)
Norton has nothing to do with Midnight Commander.
Undelete on various operating systems (Score:3, Interesting)
I ask this since there are unerase utils in windows, could they be using a vfs? If they are, wouldn't they have to stay resident forever monitoring all content?
DOS 6.x had an undelete.exe TSR that patched the DOS call to remove a file. It had two modes: Delete Tracker (remember deleted directory entries) and the stronger Delete Sentry (similar to the Mac's trash can and to the forthcoming Windows 9x's recycle bin). When using the Delete Tracker or non-TSR mode, it would look at the directory entry of the deleted file (from the directory in non-TSR or from a database in Delete Tracker) and then follow the FAT chain to retrieve as much of the file as it could. Delete Sentry simply moved files into a folder C:\SENTRY, no matter what program deleted them, ignoring *.tmp and a few other file types.
Mac OS 7 or later and Windows 4 or later, on the other hand, have two separate delete calls (for discussion, call them unlink() and ShellDelete()). The unlink() call actually deletes a file and should be used on tmp files, in uninstallers, etc. ShellDelete(), on the other hand, moves a file to a folder called vol:Trash (on Mac) or vol:\Recycled (on Windows); the shell (Finder or Explorer) provides a command Empty Trash... to do what is essentially an rm -rf on the Trash folder.
In UNIX systems and their clones, merely make a shell command alias that maps a command to move the file to the ~/.trash folder.
Re:Undeleting files on *nix (Score:4, Informative)
Also included (which is why this reply is relevant) is the bcwipe utility, which does Department of Defense recommended (5200.28-STD) deletion.
It isn't "free-as-in-speech" but it does have a "free-as-in-beer" evaluation copy.
Check out:
http://freshmeat.net/projects/bestcrypt/ [freshmeat.net]
and
http://www.jetico.com/linux.html [jetico.com]
Re:Undeleting files on *nix (Score:4, Funny)
1) Put
2) Use lilo etc., to set the machine to boot off a kernel image
3) rm the kernel file
4) reboot the machine
Because nothing in
Obviously, Don't Try this out unless you know what you're doing - and even then try it with a spare kernel, not your only one.
Dunstan
Use GnuPG (Score:3, Informative)
Presumably PGP runs on unix?
PGP 6.5.8 [pgpi.org], the last freeware version
GnuPG 1.0.6 [gnupg.org], the GNU Privacy Guard, is a free implementation of the OpenPGP spec.
Wrong approach (Score:3, Interesting)
Also, it's the internet. Make up shit. The only thing you really can't lie about is online purchases with a credit card (well...), anything else is open territory for your imagination!
It's you that controls distribution... (Score:5, Funny)
Ensure that the other person gives your data to no one. Do a thorough background check on him and his closest 50 living relatives. After he is done processing the information; shoot him.
No need to worry about any information getting anywhere.
Re:It's you that controls distribution... (Score:2, Insightful)
Remember the car that parked in front of your house while you copied the data to the floppy disk?
In the car, someone intercepted the electromagnetic waves coming from your computer and reconstructed the data from them. He then made a million copies of the data and distributed them to hidden places all over the world.
Re:It's you that controls distribution... (Score:2)
Re:It's you that controls distribution... (Score:2)
Re:It's you that controls distribution... (Score:2)
I'm afriad that isn't enough. Analysis of the glia and neuron patterns will also reveal the information. You should also cut his head off and burn it with lighter fluid.
Re:Like Vince Foster, eh? NYT = communist rag. (Score:3, Funny)
That's because they knew how. Murder was part of it.
Gotta get one of them thar modern computers (Score:4, Funny)
Gee...what a stride. Too bad we didn't have technology like this in the 80's. A company like Norton could have made a killing making tools to relink the file table with these sectors, almost as if they were UNDELETEing the file.
I just love expressions like "modern computers" used in this way, when the reporter meant to say "Well...this is new to me, must be new to the computer too." Of course, we all know that it is the computer that has this behaviour - not the OS sitting on top of it
IIRC, DOS used to just replace the first character name of a file with a ? in the FAT when you deleted it, so to undelete it, you just supplied a letter to "rename" the file as.
Re:Gotta get one of them thar modern computers (Score:2)
Er, it also marked the blocks free in the FAT. Putting the first char back lets you read the file, but it won't prevent random blocks from getting overwritten with other data!
Re:Gotta get one of them thar modern computers (Score:2)
I do remember the "don't even breath until I run undelete" kinda panics. Sadly, not even undelete will save you when you accidentally open a file for w instead of a or r mode
Re:Gotta get one of them thar modern computers (Score:2)
Yeah, but FFS-snapshots will (if you make them frequently enough). I expect Linux will get a similar thing sooner or later...
Hmmm, that reminds me, another delete problem is snapshots on things like the NetApp NFS toaster, and the BSD FFS-snapshot stuff. Not only do you have to wait for the snapshot to go away before a delete happens, you can't overwrite the file in any easy way since the modifyed blocks are saved off.
The other peoblem with snapshots is if you notice a bad permision and fix it people can still look in the snapshots for quite some time and find the stuff! That could be a real problem for Plan 9 style systems that do one snapshot a day and keep them forever...
Does anyone really have a problem with this? (Score:3, Interesting)
Re:Does anyone really have a problem with this? (Score:3, Interesting)
Criminal masterminds are pretty few and far between. Mostly criminals are kinda dim. Plus if people have been caught cheating on their wives/husbands (not illegal as far as I know, but not a stunningly good idea) by looking at their supermarket club records (catching them buying wine or condoms are the wrong shopping market, that were not used with their spouse)...well, I can imagine you could look at their palm desktop app and find a record for their hot date!
Re:Does anyone really have a problem with this? (Score:4, Informative)
Foucalt was a 60's "post-modern" French philospher who studied how systems of control are used to keep a Power in place. One of his most interesting insights was the more you can observe something the more the you can label it, quantify it, and more important the easier it becomes to define a Norm. Once you have a defined a norm, you know have the means to control the subject you were initally just merely observing.
I think this is a case of being able to keep something from observation, ie keep it away from ouside powers
anyway, thanks
Re:Does anyone really have a problem with this? (Score:2)
Re:Does anyone really have a problem with this? (Score:2)
From my experience, even intermediate computer users are still pretty unclear on the notion of where exactly their data resides. The folks at my office, for example, are perfectly productive computer users with all the tools they need to get their jobs done and download MP3s and such, but at least half of them don't realize their personal directories are really space on a server (so that they get backed up every night), even though I've explained it several times.
Heck, there are plenty of professional web development people I've run across who aren't real clear on the file location thing, they just know that they check in and check out files and something happens...
PGP (Score:5, Informative)
Although encryption is, in theory, breakable, the resources to do so don't exist (unless the NSA has some quantum computers squirreled away somewhere), your files will be safe.
In short, if you want to keep files private, use PGP, and use it wisely. If you don't make more of an attempt, other than "well, if I tell Windows to delete it, it's gone", to keep files hidden/gone for good, you deserve to have your data recovered.
Gawyn
PGP wipe does a very poor job. (See this link) (Score:5, Interesting)
PGP [pgpi.org] is a brillient tool for encryption (esp. e-mail) and PGP disk [pgpi.org] or Scramdisk [clara.net] are great for secure archiving on windoze machines. However the PGP wipe isn't very good. This link [mccune.cc] explains why and gives good alterantives for windoze users.
Linux users already have encrypted filesystems and secure file wipeing as standard in all(?) common distro's. (I know that SuSE even lets you overwite the wiped files with zeros to hide its very existance)
Re:PGP (Score:3, Insightful)
While its probably a silly movie, its kind of like in the soon to be released Nicholas Cage movie Windtalkers. For those not familiar, in WW2 the US used Navajo Indians to communicate because the Japaneese would never be able to figure out hte language. Nicholas Cage is a marine with orders to protect one of them. He also has orders to kill him rather than be captured. Your encryption is only as safe as your key and through drugs or violence i'm pretty certain just about any key can be extracted from someone.
Re:PGP attacks (Score:3, Interesting)
While the resources probably don't exist to directly attack PGP, this makes certain assumptions
Even if those are true, there are other attacks possible - Most people don't use a sufficient passphrase, so that becomes the easiest attack.
After that, you have to worry about things like "Magic Lantern" and black bag jobs
How paranoid do you want to get?
Re:PGP attacks (Score:2)
Re:PGP (Score:2)
Re:PGP (Score:2)
Worse, you may well have multiple copies of the plaintext on your drive, because every time you open that encrypted file, a decrypted temporary file must be created. (And if you never open it, why are you keeping it?)
The solution of course is to use a program that physically overwrites the data. Do that once, and you are safe as far as someone sniffing with Norton Utilities is concerned. The data could still be recovered by electron microscope or something, but how many of us really have secrets worth (1) physically removing the drive, (2) taking it apart, and (3) paying some lab 5 or 6 figures for the electron-microscope work?
Re:PGP (Score:2)
That's why I own (Score:3, Interesting)
Degauss the disk and it's gone for good.
Accually, does anyone else remember the movie Blue Thunder?
The video tape jackets had electromagnets build into them, and thus could delete any tape that the bad guys wanted.[1]
I wonder when IBM or someone will build a HD with a self delete 'fail safe' system. When the drive powers down without a password, wipe.
[1] There is some ironny here somewhere folks. Just can't think of a witty remark.
Re:That's why I own (Score:2, Funny)
Re:That's why I own (Score:4, Funny)
They have, the 75GXP [slashdot.org].
Re:That's why I own (Score:3, Informative)
Degauss the disk and it's gone for good
Could you describe this big 'old electromagnet?
I've tried this with speaker magnets and bulk tape erasers like Radio Shack sells and they didn't erase floppies, zip disks or hard drives. In fact, it didn't seem to do squat to them. If you have a electromagnet that will, I'd like to know how it's made.
Electron Microscope (Score:3, Interesting)
I monitor the forensics list on securityfocus, and there was discussion that this might be mostly a myth.
Re:Electron Microscope (Score:3, Informative)
Re:Electron Microscope (Score:2)
Re:Electron Microscope (Score:4, Interesting)
First, it's difficult. It involves removing the platters from the drive and mounting them in a machine designed to read from that platter density.
Then, the machine can read from 0 to N generations of older data. This is dependent on the quality of the medium (I guess, better drives are less secure in this fashion) and the repeatability of the data used for overwrites.
If you overwrite something with all zeros (or ones), it's almost guaranteed to still be there later because all you did was weaken (strengthen) the signal, the variation between two signals with the same current value represents the original value.
This is why the idea is many secure overwrites. Perhaps all zeros once or twice, but interspersed with "secure" random noise. As soon as they lose track of layer N, they can't get N+1.
However, the task usually doesn't depend on getting the contents of the whole disk back, usually they can still read the meta data and know what to concentrate on (and if they can't, they know where the meta data sits, so they concentrate on that) and then they go after certain files likely to be the most useful.
Most common "secure delete" utils use low-grade PRNGs and non-random seeds. If you can figure out the output of these and then deduce the seed, you can figure out the data used for any portion of the overwrite and from that, have a pretty good chance of recovering the data.
Now, this is what I've heard, from people in the field, so don't take it as gospel. The one thing they all agreed upon though is that this level of analysis is hideously expensive. Not $500 / hour like "normal" data recovery, more like $500k up front and then $5k / hour... It involves cryptanalysis to crack the "random" overwrites and a host of other professionals. It also wouldn't be used to bust a kiddy pornographer (is that a kid who makes porn, or
It's almost always destructive analysis too; they destroy the media getting the data and they don't get 100% so they can't put it on a new drive and put it back in the computer. If this happens you're gonna know it, at best they'd substitute a different drive to make it look like yours crashed. (Maybe that's why so many potential spies were sold the IBM 75GXP series drives - plausible crashes...
On the opposite side on the coin (Score:5, Informative)
Well, I don't think any OS has ever been short of undeletion tools [uprm.edu] - in unix, one can grep the inodes on a disk for a particular known string of a file and recover it fron a known template. Tools like gpart [uni-hannover.de] (a partition guesser) also easily recover those vital 512 bytes of your hard disk.
Where Unix has been lacking, behind most other systems, is the opposite - a good, reliable, trashcan. It might be interesting to note that there's now a reliable trashcan for Linux, BSD and other glibc systems th simply preloads and wraps unlink, `move and a couple of other system calls.
Since glibc is a part of the Linux Standard base, it works along with every LSB standard app. Even better, it doesn't matter whether you delete the file from KDE, GNOME, shittyunixtoolkitforhellcirca1980something or a terminal.
Anyway, check out Libtrash [m-arriaga.net]. And if you're a GNOME or KDE hacker, I'll give you a big hug if you use this as the default trashcan or your next release.
Re:On the opposite side on the coin (Score:2)
(This wasn't the only obvious and useful utility that was missing although it would only take someone who knew their way around the DOS source a few hours to write it. I have to figure that MS programmers either didn't use DOS much, or else didn't release the tools they used themselves when working in it.)
Link for non-registered users (Score:2, Informative)
Syncronize with a file encrypted version (Score:2, Interesting)
Easy (Score:2, Funny)
repeat until satisfied
Re:Easy (Score:2)
Re:Easy (Score:2)
rm -RP * on *BSD systems (Score:4, Informative)
Re:rm -RP * on *BSD systems (Score:2)
Hence, GNU shred from fileutils,standard on GNU OS (Score:5, Informative)
From the GNU shred info node:
shred overwrites devices or files, to help prevent even very expensive hardware from recovering the data.
Ordinarily when you remove a file (*note rm invocation::), the data is not actually destroyed. Only the index listing where the file is stored is destroyed, and the storage is made available for reuse. There are undelete utilities that will attempt to reconstruct the index and can bring the file back if the parts were not reused.
GNU shred is very featerful, as costumary in GNU utils, and has many flags to modify the behaviour.
BSD ppl are always praising the 'Unix Way' of small utilities that do a very defined job and nothing more, and hate the extended features that GNU utils provide; in this case it's BSD rm that is doing something that could be done by another tool by adding a flag! Horror!
Seriously, GNU shred is a good tool, and it can receive some interesting flags that a simple rm -P doesn't support.
cheers,
fsmunoz
of course its not enough (Score:2, Funny)
... you need '-f'!
Yeah, thats better.
Answer was in earlier /. story (Score:2, Funny)
Use shred Instead (Score:2, Informative)
It kill DATA DEAD
Re:Use shred Instead (Score:5, Informative)
CAUTION: Note that shred relies on a very important assumption: that the filesystem
overwrites data in place. This is the traditional way to do things, but many mod
ern filesystem designs do not satisfy this assumption. The following are examples
of filesystems on which shred is not effective:
* log-structured or journaled filesystems, such as those supplied with
AIX and Solaris (and JFS, ReiserFS, XFS, etc.)
Using shred on ext3 does not seem to be a good idea. I use srm instead. srm overwrites the data 30+ different times using bit patterns and random patterns. The high number of overwrites is supposed not only to allow for slight deviations in alignment betweeen the drive heads and track on the platter, but also meets some very high (you might say "federal") standards, short of (or in some cases, followed by) incinerating the disk.
Re:Use shred Instead (Score:3, Informative)
There are a few other caveats, but that's the important one for me, given that I upgraded my machine at the weekend and only yesterday reinstalled Mandrake 8.1 with reiserfs for both my / and
Cheers,
Tim
Re:Use shred Instead (Score:2)
GNU shred (Score:3, Informative)
I was hired to recover files once (Score:5, Funny)
Doh! (Score:5, Funny)
Was it the orange stains on his hands and the faint odor of cheese that gave him away?
Easy Solution... (Score:5, Funny)
Some old BugTRAQ posts on this subject (Score:4, Interesting)
There's a Part 2, and some other stuff over there too. yeah, the site needs to be updated desperately. Wait till feb.
There's one piece of information that's very new and very, very cool: Apparently, some company has been going around the WTC crash site, picking out hard drives from crushed servers, and (though I can't imagine this) actually recovering data from the drives through all the crush damage and dust. I mean, yes, the concept that a non-portable, super expensive, very labor intensive read head would be able to recover significantly more data redundancy than some mass produced mag-head is unsurprising, but...damn.
--Dan
US Government Outlaws File Deletion (Score:4, Funny)
Re:US Government Outlaws File Deletion (Score:2)
>
>We interviewed one expert who explained how: "One simple way to make sure your data is wiped clean, is remove the hard drive from your computer, and place it in a furnace for 15-20 minutes." the interview was cut short, when government agents stormed the building and arrested the expert for "discussing circumnavigation devices for data deletion".
All charges were dropped and Hilary Rosen was released later that afternoon.
A spokesperson for Ms. Rosen was later quoted as saying "We are pleased the government clearly recognizes that the First Amendment guarantees our legitimate corporate interest in constructing new and innovative digital rights management schemes."
shred (Score:2, Interesting)
Delete a file securely, first overwriting it to hide its contents.
By default it overwrites it 25 times, IIRC DoD standard is 7 times so it should be enough.
FreeBSD has rm -P (Score:5, Informative)
man rm
<snip>
-P Overwrite regular files before deleting them. Files are overwritten
three times, first with the byte pattern 0xff, then 0x00, and then 0xff
again, before they are deleted.
</snip>
You can just put "alias rm rm -P" in your login script to make this the default.
Try using "obliterate" (Score:3, Informative)
If I understand correctly, it open the file for writing multiple times first. First it writes 0s, then 1s, then alternate beginning 0s and 1s, then 1s and 0s, then patterns of 1s and 0s of all descriptions, then several passes from
The upshot is that even if you find the inode and relink to the data, it's been overwritten so many times than you really can't possibly recover it even using forensic methods.
Killbots (Score:2)
In a book I read a while back (by Tom Clancy and Steve Pieczenik) in a series called 'Net Force' a super-geek (described as a brilliant genius) apparently had a bad childhood that caused him to want to wipe out any informational link to his family that might exist. The book is set in a time where the Internet is far more expansive than it is now, where all information is stored online and all communications take place online and search engines are all powerful. In this setting, the author introduces what he terms a 'killbot' - a small application or scriptlet whose purpose is to literally 'kill' information.
The way it is described, these 'killbots' are illegal (big surprise). They apparently work by hacking into information sources turned up by search engines and removing the relevant information from the source's databases. While all very fictional, I wonder how far we are from something of this nature. Information may want to be free, but if someone wants to remove information by any means necessary, this may not be far off.
Just a thought.
Other Technological Solutions (Score:2, Interesting)
These guys have a cunning method [coincidencedesign.com] to make sure their data can't be read:
"sensitive data is stored on hard disks which are hard-wired to physically self-destruct when tampered with"
If you're lucky it might take out the investigating officer too...
Largely Irrelevant (Score:5, Informative)
1. Typical deletion. Files are unlinked with their directories, so your OS does not "see" them and has more space available to write with. If the information is not sensitive, or you don't fear intrusion, this is the fastest, and also best, method of deletion. It simply changes the first character of a file name do something that your OS doesn't recognize -- a very fast process. The Advantage: data is recoverable via a data-recovery utility. The Disadvantage: the data has not been securely eliminated.
2. Simple once-sweep wipe-over deletion. Either random 1s and 0s, or wholly 1s, or wholly 0s, are written over an entire file. Use this for data that is sensitive, or where you fear cyber-intrusion by hackers. The Advantage: data is securely eliminated, beyond the reach of anyone who hacks into your computer. The Disadvantage: data is irrecoverable to you, should you realize you made a mistake, and this process is slower.
3. A multi-sweep wipe. Same as above, but many sweeps are performed, enough to make typical electron-microscopy methods of data-recovery inviable. This method effectively makes data irrecoverable by any means. Electron microscopes can detect "old zeros" by ghost-patterns, a slight trace. But if data has been written over many times, the older data is impossible to recover even by those methods. The Advantage: this method securely removes the data, beyond the reach of any technological means. The Disadvantage: this method is very slow, and again, data is irrecoverable should you learn you made a mistake.
It should be noted that whenever you want to securely delete data, not only do you need to wipe the file, but you also need to wipe your swap files and your temporary files.
So, let me summarize when each of the methods of "data-removal" should be used, starting with the strongest method (a multi-sweep wipe), and ending with the weakest method (the renaming of the first filename character to something unrecognizable):
1. A multi-sweep wipe. Use this when you have data on your computer that could be used against you in a lawsuit or prosecution. For example, certain kinds of pornography, copyrighted files, warez, and other various information that's been deemed "illegal" by the Information Police in the MPAA, RIAA, MS, and the US Gov't.
2. A single-sweep wipe. Use this for information that is sensitive, but that you need not fear should the government get ahold of. For exmaple, financial files, files containing credit-card information, etc -- anything you'd want to protect from online-hackers using data-recovery programs. The government, though draconian, has not been known to steal people's credit cards using electron-microscopy. Similarly, hackers have not the resources to use electron-microscopy to acquire your credit cards -- nor would it be worth it. However, if your a high-tech company selling your computer equipment to another company, a multi-sweep delete of your files may be necessary to protect your information from competing companies, who may have bought your machinery through another company as a front.
3. A deletion that dissociates the file from the directory (renames the 1st character). Use this for non-sensitive data. For example, stories you've written, calendars, lists, ideas, old programs, pictures, etc etc.
Hope this has been helpful -- and please, remember, if you want to securely remove sensitive data either by a single-sweep wipe (to protect it from hackers) or a multi-sweep wipe (to protect it from the government), please remember to also securely remove swap files and temporary files as well!
It's a real commercial problem (Score:2, Interesting)
It's not that hard to delete copies from your hard disk, shred the hard copies, and remember to "really delete" it all from your source code control system.
But who, in the real world, goes through their backup tapes, CDs, whatever, trying to erase individual files? or even parts of files? whilst not destroying other data - it just can't be done.
Deleting the actual file is not enough... (Score:2)
Anyhow, blasting the actual file is not enough. When you go to clean stuff off, make sure that chunk of hard drive (virtual ram) is flushed out as well - both *nix and windows. RAM drives go a long way here, if you were lucky enough to pick up a stack of 512M sticks when they were cheap.
When you're done with a big job, always wipe. (Score:3, Insightful)
# dd if=/dev/random of=/dev/hda
This is assuming, of course, that if your root partition is on
Using random data as opposed to zeroes is more secure because writing zeroes may leave a readable residual magnetic signature on the media whereas random data tends to obscure the mag sig.
this ought to fix you up (Score:2, Insightful)
Use whatever is appropriate instead of
You can also overwrite files with zeros (such as the ones that come from
hth
dd if=/dev/zero of=/dev/hda (Score:2, Interesting)
My Exercises in Paranoia (Score:3, Interesting)
Continually write cruft to hard drive: Run a batch script that continually loops through: 1) dd from /dev/zero to a dummy file on partition; 2) delete when drive fills; 3) dd from dev/urandom to same file; delete file. As the drive will have many writes to it, it would make things very tough to recover. This never had much performance impact on the machine.
I wish I could find a utility that cleans out inode information, much like the dos/win utils that scrub deleted filenames from the FAT.
Edit documents and browse web from a virtual machine on an encrypted device:
I use the loopback patches (/pub/linux/kernel/people/hvr at your local kernel mirror) to run an encrypted device. I then use VMWare (though bochs, plex86, or User Mode Linux should work) to run Linux and Windows for browsing and email writing. Note that VMWare has a nice "undoable" disk feature, in which you can "commit" or "discard" changes to the virtual disk. So I have a pristine Win95 VM, which I log into to do my stuff, and then I discard the changes, thereby removing cached macterial, cookies, etc.
Note that this doesn't thwart traffic analysis or "rubber hose" tactics. In fact, once the loopback devices are mounted, you can perform standard file/data recovery techniques on them.
Use file encryption for email and sensitive files. I use GnuPG for this.
Why no discussion of file slack space? (Score:5, Insightful)
I learned about this while preparing to publish a program commercially, and discovered that (at least at the time) files I copied to the distribution media master sometimes contained sensitive data, such as the source code, from my own hard drive. Basically, DOS wasn't very picky about copying a few extra bytes along with the actual file length, as long as the extra bytes didn't go past the end of the destination sector. The answer? I used a slack wiping program on the master disk before sending it for duplication.
You have to press 'y' too many times (Score:4, Funny)
(I know
Time required to erase a 20 GB drive (Score:3, Informative)
Considering most systems come with 15-60gig drives now, it would take a long time to actually write over all the sectors used for that file in its entire lifetime.
No longer than a couple defrags. Simply open thousands of multimegabyte files, and then in each file, write a layer of 0's, a layer of 1's, and a couple layers of random data, and you're pretty safe. Five passes on a 20 GB partition shouldn't take more than a few hours depending on the transfer rate from computer to drive.
Re:Time required to erase a 20 GB drive (Score:2)
Real Importance (Score:3, Insightful)
Don't be so certain of that. Open up your wallet, and you'll see much of importance. No credit cards? That's not the most important thing you have. Take a close look at your driver's license, or any ID you have. That's of great value to many people, and whether or not you trust it to a computer most state governments will. Leaving something as simple as your name in a computer proves that a person by your name exists, which can be used for profit or to complete an agenda.
Virg
Re:All you need to do is... (Score:3, Informative)
Contrary to conventional wisdom, "volatile" semiconductor memory does not entirely lose its contents when power is removed. Both static (SRAM) and dynamic (DRAM) memory retains some information on the data stored in it while power was still applied. SRAM is particularly susceptible to this problem, as storing the same data in it over a long period of time has the effect of altering the preferred power-up state to the state which was stored when power was removed. Older SRAM chips could often "remember" the previously held state for several days. In fact, it is possible to manufacture SRAM's which always have a certain state on power-up, but which can be overwritten later on - a kind of "writeable ROM".
This is from Peter Gutmann's paper Secure Deletion of Data from Magnetic and Solid-State Memory [auckland.ac.nz]
Re:Q: wiping on ReiserFS (Score:2)
a bucket of 98% sulfuric acid.
or maybe an acetylene torch.
//rdj
The Solution (Score:3, Funny)
1.) Take the HD out of your machine, take it to your clean room, and crack it open.
2.) Pull the platters, one by one, run them under your magnetometer, and use the programming in your magnetometer to develop a magnetic wave map of your drive. Store this image in your workstation.
3.) Run the analyser over the waveform to get a datamap of the drive. Be sure to save the layers as separate images.
4.) Pan back through the resulting images, and find the one that corresponds to the drive topology at the time you want (the time when the file/data still existed in readable format).
5.) Create a disk image file from that waveform.
6.) Mount the resulting image, and copy your file to a more secure location.
See? Quick and easy.
Virg