Peter_22@xxxxxx wrote: > Hi! > > Just today I saw "test disk" from http://www.cgsecurity.org/ while being at > work. > I didn´t run it at home on my own disc but my question might be a serious > concern. > As "test disk" is able to restore overwritten/shredded (dev/urandom) or > erased (dev/zero) partitions, how secure is encrypted root as aespipe reads > data from one partition, pipes it through aes and writes it back to the same > partition? > In case you can restore a shredded partition with such a tool, what can you > do with data encrypted by aespipe??? > This has nothing to do with watermark or code attacks. It´s just the fear > that someone could recover all data in a state *before* it was piped through > aespipe. > Is this a real problem or just neglectable? You read the description wrong. It can't do what you wrote. Any SOFTWARE can only read what the harddrive deliveres. When you have overriden a sector there is NO WAY for SOFTWARE to get the old contents(*). If you have overriden it, it's overriden POINT. You need MUCH MUCH money to get old contents and specialized HARDWARE. *: There are some theorical cases that i see as "not relevant". -- Real Programmers consider "what you see is what you get" to be just as bad a concept in Text Editors as it is in women. No, the Real Programmer wants a "you asked for it, you got it" text editor -- complicated, cryptic, powerful, unforgiving, dangerous. - Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/