Is there a good state of the art documentation which part of "wipe your HD x times with superspecial military grade algorithm foo" is bullshit and why?
-
-
well, there are wikipedia pages like that https://en.wikipedia.org/wiki/BCWipe and I just wonder...
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Many people & orgs have HDs that should be wiped prior to changing security levels (donation, repurpose, third-party destruction) Seminal work is Gordon Hughes' research on track density and wiping: https://cmrr.ucsd.edu/resources/secure-erase.html … More refs here: https://www.techsolvency.com/pub/bin/erasing-storage/ …
-
Here's one quote (from Hughes' FAQ) that touches on the track-density issue.pic.twitter.com/5K1XBHkbeO
- 1 more reply
New conversation -
-
-
I wonder, do some FDE setups keep multiple copies of the master encryption key and metadata on disk? IIRC LUKS has only one copy right in the header.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Should we trust ATA secure erase alone after the Bitlocker hardware fiasco?!? Multiple writes to SSD with FDE seems keen, I'm seen revised erasure advice from some groups & vendors. Starting encrypted seems to be the favoured "don't start from here" advice.
-
NB: Wear leveling & bad blocks getting swapped out.
End of conversation
New conversation -
-
-
ATA secure erase has no security properties. Hardware "FDE" is not FDE, and software FDE is hardly ubiquitous (lowish but nontrivial performance cost, and makes backups, which most people neglect, a lot more critical).
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
