Re: Necessity for device overwriting?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



* Phil Grundig <wdef200@xxxxxxxxxxx> 
> Ok so you're saying it is about plausible deniability concerning the
> likelihood of there being encrypted data there, not about trying to uncover
> anything actually usable about the encrypted plaintext.   

Looks like you are out for a larger discussion on this point. First, I have no information on aes being broken. Second, I´m not making a guess on how long a brute force attack on one of the encrypted blocks might take.

The idea behind the advice to shred/overwrite a complete disk is simply not to leave files from previous installations/unencrypted behind. Formatted disks can still leak files, so simply overwrite the disk completely and you are done.

Kind regards,
Peter
-- 
Neu: GMX FreeDSL Komplettanschluss mit DSL 6.000 Flatrate + Telefonanschluss für nur 17,95 Euro/mtl.!* http://portal.gmx.net/de/go/dsl02

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux