Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Re: Secure Delete for Windows
From: Valdis.Kletnieks () vt edu
Date: Tue, 17 Jan 2006 17:15:55 -0500

On Tue, 17 Jan 2006 22:12:38 +0100, GroundZero Security said:

Our application has not only the DOD wiping standard, but also peter gutmanns algorythm 
with 38 random overwrites, which is the most secure wiping methode we know of.

Or as Peter Gutmann says himself:

  "In the time since this paper was published, some people have treated the
  35-pass overwrite technique described in it more as a kind of voodoo
  incantation to banish evil spirits than the result of a technical analysis of
  drive encoding techniques. As a result, they advocate applying the voodoo to
  PRML and EPRML drives even though it will have no more effect than a simple
  scrubbing with random data. In fact performing the full 35-pass overwrite is
  pointless for any drive since it targets a blend of scenarios involving all
  types of (normally-used) encoding technology, which covers everything back to
  30+-year-old MFM methods (if you don't understand that statement, re-read the
  paper). If you're using a drive which uses encoding technology X, you only need
  to perform the passes specific to X, and you never need to perform all 35
  passes. For any modern PRML/EPRML drive, a few passes of random scrubbing is
  the best you can do. As the paper says, "A good scrubbing with random data will
  do about as well as can be expected". This was true in 1996, and is still true


Attachment: _bin

Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]