Yes. There was a discussion on bugtraq (or focus-linux?) a while back, I believe. Essentially, the best way to delete your data is to never store it unencrypted, and make sure to use a good crypto algorithm. You could always piece together a shattered hard drive and then read that, whereas brute forcing the encrypted data is mathematically just not going to happen.
Of course, they could still conceivably read your RAM, so you'll need to physically destroy/hide that, too. And your crypto key! Breaking into your house and stealing that hidden USB key is a serious issue... -DMZ On Wed, 2005-11-02 at 12:06 -0500, Ritchie, Josiah S. wrote: > I assume this would have to be done from the start of creation of data > that concerns you though? > > JSR/ > > -----Original Message----- > From: UM Linux User's Group [mailto:[EMAIL PROTECTED] On Behalf > Of Don Schmadel > Sent: Wednesday, November 02, 2005 11:56 AM > To: [email protected] > Subject: Re: [UM-LINUX] "Secure File Deletion" > > Another approach is to encrypt the drive or partition and use a serious > password. Then complete erasure is unimportant. > > -Don > >
