From mboxrd@z Thu Jan 1 00:00:00 1970 From: Al Viro Subject: Re: [PATCH 1/5] WIP: Add syscall unlinkat_s (currently x86* only) Date: Tue, 3 Feb 2015 08:10:19 +0000 Message-ID: <20150203081018.GB29656@ZenIV.linux.org.uk> References: <1422896713-25367-1-git-send-email-holler@ahsoftware.de> <1422896713-25367-2-git-send-email-holler@ahsoftware.de> <20150203060542.GZ29656@ZenIV.linux.org.uk> <54D071AA.1030302@ahsoftware.de> <20150203075616.GA29656@ZenIV.linux.org.uk> <54D08060.7070504@ahsoftware.de> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org To: Alexander Holler Return-path: Content-Disposition: inline In-Reply-To: <54D08060.7070504@ahsoftware.de> Sender: linux-kernel-owner@vger.kernel.org List-Id: linux-fsdevel.vger.kernel.org On Tue, Feb 03, 2015 at 09:01:36AM +0100, Alexander Holler wrote: > Am 03.02.2015 um 08:56 schrieb Al Viro: > > >While we are at it, "overwrite with zeroes" is too weak if the attacker > >might get hold of the actual hardware. Google for details - it's far too > >long story for l-k posting. Look for data recovery and secure data erasure... > > You might read > > http://link.springer.com/chapter/10.1007/978-3-540-89862-7_21 > > Here is an article in german about that: > > http://www.heise.de/security/meldung/Sicheres-Loeschen-Einmal-ueberschreiben-genuegt-198816.html > > In short, it's enough to overwrite it once with zeros, Regardless of the media used? How does that work on e.g. flash?