public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* Re: secure erasure of files?
@ 2002-02-19 16:19 Jesse Pollard
  0 siblings, 0 replies; 28+ messages in thread
From: Jesse Pollard @ 2002-02-19 16:19 UTC (permalink / raw)
  To: roy, Jens Schmidt, linux-kernel, j.schmidt

---------  Received message begins Here  ---------

> 
> >I would strongly encourage somebody with fluent Norsk/English skills
> >to do a translation and post it to the list.
> 
> I'll do my very best ...
> 
> (translated by Roy Sigurd Karlsbakk - please don't spam me in case of bad
> speling :)
> 
> With permission from the leader of Research and Deveopment department, I
> quote his complete answer:
> 
> I'll try to answer your questions:
> 
> The short answer is: No. It is not possible to read data that are (really)
> physically overwritten.

[snip]

In the non-destructive read case - true.

HOWEVER: forensic specialists can:

	http://www.cs.auckland.ac.nz/~pgut001/secure_del.html
or (same paper)
	http://www.usenix.org/publications/library/proceedings/sec96/full_papers/gutmann/

> 
> Addition:
> 
> Still, it should be said that this is being argued upon between the
> 'wise' ones. This is - there are people that mean it is possible
> to read/recover overwritten data. But we have, as mentioned above,
> not found any scientific documentation or decriptions of how this
> can be done.

See the paper referenced above. There may be more recent documents, but
this one is quite clear on the limitations of erasure using the standard
drive electronics.

-------------------------------------------------------------------------
Jesse I Pollard, II
Email: pollard@navo.hpc.mil

Any opinions expressed are solely my own.

^ permalink raw reply	[flat|nested] 28+ messages in thread
* Re: secure erasure of files?
@ 2002-02-19 14:48 Roy Sigurd Karlsbakk
  2002-02-19 17:32 ` Rogier Wolff
  2002-02-19 23:13 ` Roy Sigurd Karlsbakk
  0 siblings, 2 replies; 28+ messages in thread
From: Roy Sigurd Karlsbakk @ 2002-02-19 14:48 UTC (permalink / raw)
  To: Jens Schmidt, linux-kernel, j.schmidt

>I would strongly encourage somebody with fluent Norsk/English skills
>to do a translation and post it to the list.

I'll do my very best ...

(translated by Roy Sigurd Karlsbakk - please don't spam me in case of bad
speling :)

With permission from the leader of Research and Deveopment department, I
quote his complete answer:

I'll try to answer your questions:

The short answer is: No. It is not possible to read data that are (really)
physically overwritten.

Still, the reason to this is is a little different than what you are describing.
To speak reasonably about this, we firstly need some basic understanding of how
data is stored on a harddisk. A harddisk does not manipulate individual bits, but
flux change. Simply explained is 'flux direction' however the magnetic field points
clockwise or counter-clockwise. Thus, a 'flux change' is where the flux changes from
CCW to CW or the other way around. The mapping between flux changes is not
one-to-one.
This means that we DO NOT use CW=0, CCW=1, but rather have each flux
change
giving the origin pf 2.5 to 3 bits in addition to the disks sequence detection.
This means that it does not attempt to detect each bit isolated, but rather decodes
a sequence at a time (typically 4096 bit = 1 sector).

This sequence detection is quite the same as a human reading a bad
fax. If we try to read the fax letter by letter, we may for instance
mistake an 'a' with an 'o'. If this letter is part of the word 'bank',
and we read it letter by letter, we'll end up with 'bonk. However, if we
look at the whole word (the sequence of letters), we can probably see
the most probable word is 'bank'.

After data is overwritten, we can measure how strong the (field of the)
old data is compared to the new ones. This means that all 'old' signals
never really disappear. Still, our investigation shows that there is no
officially documented way of how to change these (old) signals back to
the origial data-

It may seem this will demand trail-breaking discoveries in many different
fields: Non-linear analysis and modelling, low-noice electronics (cryo-
electronics), computer technology (super-fast number-chrunchers)

This was the long (complicated) answer :)

What is sure: Ibas does not know any documented methods, scientific
environments or commercial services that do or demonstrate reading
of overwritten data.

--
Thor Arne Johansen
Avdelingssjef FoU, Ibas AS

Addition:

Still, it should be said that this is being argued upon between the
'wise' ones. This is - there are people that mean it is possible
to read/recover overwritten data. But we have, as mentioned above,
not found any scientific documentation or decriptions of how this
can be done.

-----------------------------------------------------------------------------
--
--
Roy Sigurd Karlsbakk, MCSE, MCNE, CLS, LCA

Computers are like air conditioners.
They stop working when you open Windows.




^ permalink raw reply	[flat|nested] 28+ messages in thread
* RE: secure erasure of files?
@ 2002-02-12 21:14 Torrey Hoffman
  0 siblings, 0 replies; 28+ messages in thread
From: Torrey Hoffman @ 2002-02-12 21:14 UTC (permalink / raw)
  To: Roy Sigurd Karlsbakk, Denis Vlasenko; +Cc: linux-kernel

IIRC, last time this topic came up, the best answer was:

Given modern disk hardware (block remapping) and operating 
system behavior, no, there is no way to securely delete files 
regardless of OS or filesystem.  

(AFAIK, the transparent hardware block remapping cannot be
detected or worked around in software - any software - but 
perhaps the IDE experts here know otherwise. )

If you don't want a sufficiently determined attacker to be
able to read your data from the disk, don't write it.

The solution is to use encryption and make sure your data is 
never, ever written to disk unencrypted.  In particular, use 
encrypted swap and encrypted loopback filesystems.

Torrey


^ permalink raw reply	[flat|nested] 28+ messages in thread
* secure erasure of files?
@ 2002-02-12 13:12 Roy Sigurd Karlsbakk
  2002-02-12 13:41 ` Davidovac Zoran
                   ` (2 more replies)
  0 siblings, 3 replies; 28+ messages in thread
From: Roy Sigurd Karlsbakk @ 2002-02-12 13:12 UTC (permalink / raw)
  To: linux-kernel

hi all

Does anyone know if it'll be hard to enable a <em>secure</em> deletion of
files? What I mean is not merely overwriting it with NULLs, but rather
using a more sophisticated overwrite, like the IBAS ExpertEraser software
(http://www.ibas.com/erasure/)

Is this hard/possible/doable?

roy

--
Roy Sigurd Karlsbakk, MCSE, MCNE, CLS, LCA

Computers are like air conditioners.
They stop working when you open Windows.


^ permalink raw reply	[flat|nested] 28+ messages in thread

end of thread, other threads:[~2002-02-26  3:40 UTC | newest]

Thread overview: 28+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
     [not found] <200202121326.g1CDQct12086@Port.imtp.ilyichevsk.odessa.ua>
2002-02-12 13:33 ` secure erasure of files? Roy Sigurd Karlsbakk
2002-02-17 21:19   ` Jan-Frode Myklebust
2002-02-19 12:54     ` Jens Schmidt
2002-02-19 14:24       ` Richard B. Johnson
2002-02-21  2:56         ` Petro
2002-02-21  3:20           ` M. Edward Borasky
2002-02-21 17:01             ` Holger Lubitz
2002-02-26  3:39             ` Petro
2002-02-19 16:19 Jesse Pollard
  -- strict thread matches above, loose matches on Subject: below --
2002-02-19 14:48 Roy Sigurd Karlsbakk
2002-02-19 17:32 ` Rogier Wolff
2002-02-19 17:59   ` Martin J. Bligh
2002-02-19 18:48     ` Rogier Wolff
2002-02-19 20:01       ` Andreas Dilger
2002-02-19 23:13 ` Roy Sigurd Karlsbakk
2002-02-12 21:14 Torrey Hoffman
2002-02-12 13:12 Roy Sigurd Karlsbakk
2002-02-12 13:41 ` Davidovac Zoran
2002-02-12 14:03   ` Padraig Brady
2002-02-12 15:55   ` Andreas Ferber
2002-02-12 19:47     ` Jan Hudec
2002-02-12 20:25       ` Andrew Morton
2002-02-13  0:03         ` Jeff Garzik
2002-02-13  9:33     ` Helge Hafting
2002-02-13 18:27       ` Mike Fedyk
2002-02-13  0:36 ` Tom Vier
2002-02-13  0:45   ` Jeff Garzik
2002-02-20 15:34 ` Bill Davidsen

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox