* Phil Grundig <wdef200@xxxxxxxxxxx> > Ok so you're saying it is about plausible deniability concerning the > likelihood of there being encrypted data there, not about trying to uncover > anything actually usable about the encrypted plaintext. Looks like you are out for a larger discussion on this point. First, I have no information on aes being broken. Second, I´m not making a guess on how long a brute force attack on one of the encrypted blocks might take. The idea behind the advice to shred/overwrite a complete disk is simply not to leave files from previous installations/unencrypted behind. Formatted disks can still leak files, so simply overwrite the disk completely and you are done. Kind regards, Peter -- Neu: GMX FreeDSL Komplettanschluss mit DSL 6.000 Flatrate + Telefonanschluss für nur 17,95 Euro/mtl.!* http://portal.gmx.net/de/go/dsl02 - Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/