The Following 2 Users Say Thank You to 9000 For This Useful Post: | ||
|
2011-02-09
, 02:02
|
Posts: 889 |
Thanked: 537 times |
Joined on Mar 2010
@ scotland
|
#42
|
|
2011-02-09
, 02:14
|
Posts: 889 |
Thanked: 537 times |
Joined on Mar 2010
@ scotland
|
#43
|
Mr. A. Anderson, who goes by the hacker alias festivalnut, and are guilty of virtually every computer prank we have a law for. By posting here you're automatically put on the watchlist, so I fully understand the level of emergency you're now facing.
I tell you what, merely rm -f is not enough to protective your hard-earned data from law-enforcing agents. Encrypted data is also out of question, as they've all the method to make you spew out the passcodes, along with your blood.
P.S. Be honest, you just want to keep your secret from your wife do you? In this case running that dd command above once is okay, unless she's working for DoD or FBI.
|
2011-02-09
, 02:34
|
Posts: 840 |
Thanked: 823 times |
Joined on Nov 2009
|
#44
|
first to backup and second to restore i presume? awesome! i may be a lot more willing to break stuff in future!
The Following User Says Thank You to Cue For This Useful Post: | ||
|
2011-02-09
, 06:49
|
Posts: 136 |
Thanked: 150 times |
Joined on Dec 2010
@ Finland
|
#45
|
The Following 2 Users Say Thank You to mooglez For This Useful Post: | ||
|
2011-04-07
, 13:23
|
Posts: 121 |
Thanked: 53 times |
Joined on Aug 2006
@ Alexandria, VA, USA
|
#46
|
What you need is to overwrite /dev/mmcblk0p1 with careful selected pattern algorithms that are compliant with DoD 5520.22-M or NNSA NAP-14.x, for at least 7 times. Failing to do so, your erased data can be recovered with very simple forensic data recovery equipment in just 5 minutes.
|
2011-04-07
, 14:06
|
Posts: 235 |
Thanked: 86 times |
Joined on Dec 2010
|
#47
|
That might not be sufficient for flash memory. The "Data on Solid State Drives" section of Wikipedia article about
data remanence explains it.
I tell you what, merely rm -f is not enough to protective your hard-earned data from law-enforcing agents. Encrypted data is also out of question, as they've all the method to make you spew out the passcodes, along with your blood.
What you need is to overwrite /dev/mmcblk0p1 with careful selected pattern algorithms that are compliant with DoD 5520.22-M or NNSA NAP-14.x, for at least 7 times. Failing to do so, your erased data can be recovered with very simple forensic data recovery equipment in just 5 minutes.
There's a opensource program called scrub which is implemented with the necessary algorithm to safely erase your data. However, at time of speak the officially scrub download area seems to be removed from public viewing. I'm afraid somebody is onto you.
So now you need a quick script for the emergency:
Hope this helps.
P.S. Be honest, you just want to keep your secret from your wife do you? In this case running that dd command above once is okay, unless she's working for DoD or FBI.
Last edited by 9000; 2011-02-09 at 02:03.