Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 20 Jul 2012 17:57:49 +0200
From:      "C. P. Ghost" <cpghost@cordula.ws>
To:        Robert Bonomi <bonomi@mail.r-bonomi.com>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: fsck on FAT32 filesystem?
Message-ID:  <CADGWnjU5Seuovn7d9pRPgwcCdeC98oKa3gBxL2D6ARMqUz9viA@mail.gmail.com>
In-Reply-To: <201207190253.q6J2r3p0070058@mail.r-bonomi.com>
References:  <201207181558.q6IFwM7f033708@fire.js.berklix.net> <201207190253.q6J2r3p0070058@mail.r-bonomi.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Jul 19, 2012 at 4:53 AM, Robert Bonomi <bonomi@mail.r-bonomi.com> wrote:
> All I'm going to say is:
>   1) There's a _reason_ the gov't requires hard drives with anthing higher
>      than 'somewhat' classified data on them to be =physically= destroyed
>      before leving the secure area.

Speaking from experience, I confirm that it's true. However,
regulations have been tightened further recently as to mandate
sector-level encryption of the hard disks as well, just to be on the
sure(rer) side. At least in certain particularly sensitive areas.

>   2) As of 2007, 'over-writing' data (regardless of how many times) is *not*
>      sufficient, any more, for _any_ military purposes.

Yes. With enough resources, it is possible to read lower magnetic
layers of HDDs, at least partially. And with SDDs, it's trivial to locate
the old sectors, because their firmware doesn't overwrite the same
physical spots for obvious reasons.

That's why sector-level disk encryption is paramount nowadays.
And that opens a whole new Pandora's box of key management
issues and vulnerabilities. ;-)

-cpghost.

-- 
Cordula's Web. http://www.cordula.ws/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CADGWnjU5Seuovn7d9pRPgwcCdeC98oKa3gBxL2D6ARMqUz9viA>