Re: test disk from cgsecurity versus data security

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Peter_22@xxxxxx wrote:
> Hi!
> 
> Just today I saw "test disk" from http://www.cgsecurity.org/ while being at
> work.
> I didn´t run it at home on my own disc but my question might be a serious
> concern.
> As "test disk" is able to restore overwritten/shredded (dev/urandom) or
> erased (dev/zero) partitions, how secure is encrypted root as aespipe reads
> data from one partition, pipes it through aes and writes it back to the same
> partition?
> In case you can restore a shredded partition with such a tool, what can you
> do with data encrypted by aespipe???
> This has nothing to do with watermark or code attacks. It´s just the fear
> that someone could recover all data in a state *before* it was piped through
> aespipe.
> Is this a real problem or just neglectable?

You read the description wrong.

It can't do what you wrote. Any SOFTWARE can only read what the harddrive
deliveres.

When you have overriden a sector there is NO WAY for SOFTWARE to get the
old contents(*).

If you have overriden it, it's overriden POINT.

You need MUCH MUCH money to get old contents and specialized HARDWARE.



*:
There are some theorical cases that i see as "not relevant".

-- 
Real Programmers consider "what you see is what you get" to be just as
bad a concept in Text Editors as it is in women. No, the Real Programmer
wants a "you asked for it, you got it" text editor -- complicated,
cryptic, powerful, unforgiving, dangerous.


-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux