On 05/11/2012 09:32 AM, Darth Borehd wrote: > We need a fast way to securely wipe hard drives.
As you might imagine the faster the less secure. Are you trying to protect against: * A determined attacker with a $10M budget? * An expert willing to do disk surgery? * Someone that wants 99% of the drive? * Someone that wants even just a few 100 bits? * Joe Random running some undelete/recovery tool? The knee in the curve is to use the ATA Secure Erase or a single pass random overwrite. > Is there really any way to recover data after doing 1 pass writing zeros to > every sector? (This is what we are doing now using the free version of > Active Killbits, but it takes over an hour per hard drive.) Yeah, zillions of ways to do that. Linux dd will happily do this as well. Keep in mind that an overwrite will NOT overwrite any sectors marked bad. Secure erase should make it much harder to read those sectors marked bad. The only secure way to instantly securely erase a drive are physical means (destruction) or to use a strong password in the first place (and make sure the attacker doesn't have said password). > If we repartition and reformat Windows NTFS drives as Ext3, is there any > way to recover data from them? (We found this method is faster, but are > not sure if it is as secure as the above.) Yeah, that's will stop only the most casual of attacks. Someone even moderately curious about the used computer/drive they bought used might well run a partition/file recovery tool and easily get close to 100% of your data back. > The company will not pay for a degausser. > > Safety requirements prevent us from doing physical destruction of the > "sledge-o-matic" variety. > > We use a computer recycler, but do not trust them 100% to destroy our > data. We know for a fact that equipment they get from us sit unguarded in > a warehouse for months before destruction. Within your constraints I think you already have the best solution. > Interested in hearing opinions on this. Keep in mind that Peter Gutmann did design a series of 35 patterns for overwriting, but he also does NOT advocate overwriting 35 times. A quote: In the time since this paper was published, some people have treated the 35-pass overwrite technique described in it more as a kind of voodoo incantation to banish evil spirits than the result of a technical analysis of drive encoding techniques. As a result, they advocate applying the voodoo to PRML and EPRML drives even though it will have no more effect than a simple scrubbing with random data. So while theoretically someone could recover some bits from a drive overwritten once, the labor required to make a VERY high resolution magnetic image (this takes a LONG time on a very expensive machine) it's not a practical attack. Someone's more likely to throw large bundles of cash at your janitor before attempting such extreme measures. So in cases where serious cases of espionage at the corporate of government level physical destruction is the standard. But if you are just trying to protect the random personal information a single overwrite should be plenty. Granted random numbers (or pseudo random) is likely to be somewhat better that zeros. _______________________________________________ vox-tech mailing list vox-tech@lists.lugod.org http://lists.lugod.org/mailman/listinfo/vox-tech