Date: Fri, 20 Jul 2012 17:57:49 +0200 From: "C. P. Ghost" <cpghost@cordula.ws> To: Robert Bonomi <bonomi@mail.r-bonomi.com> Cc: freebsd-questions@freebsd.org Subject: Re: fsck on FAT32 filesystem? Message-ID: <CADGWnjU5Seuovn7d9pRPgwcCdeC98oKa3gBxL2D6ARMqUz9viA@mail.gmail.com> In-Reply-To: <201207190253.q6J2r3p0070058@mail.r-bonomi.com> References: <201207181558.q6IFwM7f033708@fire.js.berklix.net> <201207190253.q6J2r3p0070058@mail.r-bonomi.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Jul 19, 2012 at 4:53 AM, Robert Bonomi <bonomi@mail.r-bonomi.com> wrote: > All I'm going to say is: > 1) There's a _reason_ the gov't requires hard drives with anthing higher > than 'somewhat' classified data on them to be =physically= destroyed > before leving the secure area. Speaking from experience, I confirm that it's true. However, regulations have been tightened further recently as to mandate sector-level encryption of the hard disks as well, just to be on the sure(rer) side. At least in certain particularly sensitive areas. > 2) As of 2007, 'over-writing' data (regardless of how many times) is *not* > sufficient, any more, for _any_ military purposes. Yes. With enough resources, it is possible to read lower magnetic layers of HDDs, at least partially. And with SDDs, it's trivial to locate the old sectors, because their firmware doesn't overwrite the same physical spots for obvious reasons. That's why sector-level disk encryption is paramount nowadays. And that opens a whole new Pandora's box of key management issues and vulnerabilities. ;-) -cpghost. -- Cordula's Web. http://www.cordula.ws/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CADGWnjU5Seuovn7d9pRPgwcCdeC98oKa3gBxL2D6ARMqUz9viA>