Re: test disk from cgsecurity versus data security

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Jari Ruusu wrote:
Peter_22@xxxxxx wrote:

Just today I saw "test disk" from http://www.cgsecurity.org/ while being
at work. I didn´t run it at home on my own disc but my question might be a
serious concern. As "test disk" is able to restore overwritten/shredded
(dev/urandom) or erased (dev/zero) partitions, how secure is encrypted
root as aespipe reads data from one partition, pipes it through aes and
writes it back to the same partition?

Where does it say that it can recover overwritten sectors?

That's what i interpreted into (or out of) the original question.

Especially the "overwritten/shredded"-keyword let me jump to that conclusion. But i have to confess that i only did a quick scan of the referred page, i hadn't read it.

Matthias Schniedermeyer wrote:

When you have overriden a sector there is NO WAY for SOFTWARE to get the
old contents(*).

Uploading new customized DSP firmware to the disk controller may be able to
recover earlier sector data. Data recovery companies doing that probably
have to sign very restrictive non-disclosure agreements to get firmware
sources from disk manufacturers. Distributing such sources under GPL... no
chance.

That's one of the cases i was refering to with the star.

Another would be e.g. a relocated "bad" sector where you had to have a patched firmware to get the contents of the original sector. Assuming there is/are (a) bad sector(s) and that they are readable at all.

For Joe User it is just out of leage.

So let's just say:
As long as you don't have enemies with large enough amounts of money to spare, the stored data beeing very valuable or you beeing a criminal you shouldn't be worried too much. :-)




Bis denn

--
Real Programmers consider "what you see is what you get" to be just as
bad a concept in Text Editors as it is in women. No, the Real Programmer
wants a "you asked for it, you got it" text editor -- complicated,
cryptic, powerful, unforgiving, dangerous.


-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux