[nflug] Wiping hard drive sensitive personal data

anthonyriga torrodimerda at yahoo.com
Thu Jul 20 10:11:13 EDT 2006


These drives are just redeployed internally with the
same level of confidentiality. A chisel might work
too.! 

--- Brad Bartram <brad.bartram at gmail.com> wrote:

> As with everything, it comes down to a cost /
> benefit analysis.  What is the
> maximum amount that data is worth in comparison to
> the price it would cost
> to recover?  Is it worth enough to have a specific
> data recovery company, or
> well equipped independent take a serious interest in
> it?  Is it somthing
> that the government would be interested in tracking
> down as part of an
> anti-terrorism investigation where the budget goes
> beyond what we have as
> mere mortals?
> 
> The ultimate question comes down to the disposition
> of the drive once you're
> done.  If you are trying to reuse the drive after
> securely removing the
> data, then appropriate measures of data destruction
> should be taken.
> Example, if the systems will be redeployed
> internally within the same
> organization and at the same level of
> confidentiality, then use whatever
> methods you are most comfortable.  If the systems
> are to be wiped and
> redeployed to a level of lesser trust, then use a
> stronger wipe.  If the
> system is going to be taken completely out of
> service, then depending on the
> data whether it be customer information or trade
> secrets or whatever, you
> have to decide whether to wipe the drive and hope
> for the best or destroy
> the drive safely.
> 
> The only way to be certain that the data on a hard
> drive is truly wiped is
> to disassemble the drive, chisel the coating from
> the platters, remove the
> controller from the drive, and burn the case,
> platters, platter dust, and
> controllers in seperate incinerators.  But then that
> just gets a little
> paranoid.  Then again, never underestimate the
> abilities of well funded
> organizations to recover data, even when you think
> it's destroyed.
> 
> brad
> 
> On 7/20/06, Darin Perusich
> <Darin.Perusich at cognigencorp.com> wrote:
> >
> > i believe it depends on the type of wiping method
> you use. if you use
> > the Canadian RCPM and American DoD standard
> methods the data is pertty
> > much irrecoverable.
> >
> > eric wrote:
> > > Can Sleuth Kit recover data after using one or
> many of the methods DBAN
> > > has to offer?
> > >
> >
> > --
> > Darin Perusich
> > Unix Systems Administrator
> > Cognigen Corporation
> > 395 Youngs Rd.
> > Williamsville, NY 14221
> > darinper at cognigencorp.com
> > _______________________________________________
> > nflug mailing list
> > nflug at nflug.org
> > http://www.nflug.org/mailman/listinfo/nflug
> >
> > _______________________________________________
> nflug mailing list
> nflug at nflug.org
> http://www.nflug.org/mailman/listinfo/nflug
> 


__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 
_______________________________________________
nflug mailing list
nflug at nflug.org
http://www.nflug.org/mailman/listinfo/nflug



More information about the nflug mailing list