A perspective is that if the information is valuable enough to expend significant resources in trying to recover it, then physicalI can understand that... :) Richard's going to let me take his bulk eraser to MD, and Dale has said he thinks that will do the job... :)I read that that's unnecessary now, though let me reiterate
the importance of physical destruction of the media.
destruction is absolutely necessary. However, that would usually involve stuff like top secret or nuclear related information. Collections of old
bank statements and old collections of recipes on floppy disks is not of
such vital importance that it would require the dedication of
significant resources to recover that information if a triple-wipe
protocol were used on the media. From what I have read, even a
single overwrite is sufficient.
The theory is that the read/write heads can move slightly as a drive
ages. That means that the erase may not quite overwrite the information.
Does that mean that someone can then plop in some software program and recover a wiped disk? No. The process would involve some pretty
specialized hardware, something the average person is unlikely to have.
Now someone merely deleted files, then recovery of those files is very
easy as deleting just marks the space as free in the disk's directory
and does not overwrite the space. If a program such as testdisk/photorec
is used, it will search for deleted entries and recover them even if it
can't recover the file name. Only if the disk had subsequently been used
and the file space was overwritten with new files would this recovery procedure fail for those files that had been already overwritten.
Wipedrive, Shred, or the now infamous Bleachbit are all ways to force overwriting of the drive's file space. The Secure Erase feature of newer drives will use the drive's built-in procedures for overwriting every
space on a disk. Look up SATA secure erase for more information. DBAN (Darik's Boot and Nuke) is a program to wipe disks where one can specify
a particular disk or using an "autonuke" function to boot and overwrite
all connected drives.
I think Dale could verify that this is accurate information. Total
security is to destroy the media, even after wiping. Wiping may be
adequate for most media though.
On 10-31-18 16:58, Michael Loo <=-
spoke to Stephen Haffly about 487 was trading stamps <=-
My take on it was that Dale's disks had information of
potential commercial if not security value. Of course,
Sysop: | sneaky |
---|---|
Location: | Ashburton,NZ |
Users: | 31 |
Nodes: | 8 (0 / 8) |
Uptime: | 193:41:44 |
Calls: | 2,083 |
Calls today: | 1 |
Files: | 11,137 |
Messages: | 947,750 |