Edgar Friendly wrote:
> I was re-reading the paper "Secure Deletion of Data from Magnetic and
> Solid-State Memory"[1], and this section caught my attention.
>
>> The most practical solution to the problem of DRAM data retention is
>> therefore to constantly flip the bits in memory to ensure that a
>> memory cell never holds a charge long enough for it to be
>> "remembered". While not practical for general use, it is possible to
>> do this for small amounts of very sensitive data such as encryption
>> keys. This is particularly advisable where keys are stored in the
>> same memory location for long periods of time and control access to
>> large amounts of information, such as keys used for transparent
>> encryption of files on disk drives. The bit-flipping also has the
>> convenient side-effect of keeping the page containing the encryption
>> keys at the top of the queue maintained by the system's paging
>> mechanism, greatly reducing the chances of it being paged to disk at
>> some point.
>
> Don't put this any higher than very low priority, but a non-toad could
> do this easily. I just wanted it in the list archives before I forgot
> about it.
>
> Thelema
>
> [1] http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
Well, if we are getting paranoid already. How about rather than deleting temp
files/blocks
from the datastore we allow to move them to another directory on the same hard
disk. Then
the scheduled task can be set up to wipe those files.
- Volodya
--
Hi! I am a .SIG virus! Copy me to your SIG so that I can spread!
http://freedom.libsyn.com/ Voice of Freedom, Radical Podcast
http://www.whengendarmesleeps.org/ When Gendarme Sleeps, Anarchy's Zine of
Poetry
========================
"None of us are free until all of us are free."
~ Mihail Bakunin