New Tech In Data Retrieval 124
Johnath writes: "Story over at Science News about magnetoresistive microscopy, which allows very high-res inspection of magnetic media. The article is touting it primarily as a forensic tool, and gets me thinking -- how many passes of write-over-with-random-data are now required to securely delete a file?"
data destruction (Score:1)
{shhhhh... the froggies are asleep.}
spam-proofing?
Nixon unplugged? (Score:1)
How long is a piece of string? (Score:1)
"Officially" (Score:3)
Still, the equipment necessary to recover a 7 times read/write-over pass is probably out of the price range of all but the most well-funded groups; I wouldn't worry too much about it, especially if you use an encrypted file system and encrypted swap files.
been around for a bit (Score:2)
At any rate, the one true way to prevent anyone from seeing what's on your disk is to encrypt it- even if they recover the data, there's not much that can be done with it!
Well, I'm not a scientist... (Score:1)
But that's just my seriously uninformed guess.
--Perianwyr Stormcrow
Burn it (Score:1)
Re:been around for a bit (Score:1)
Time for new "erase" methods? (Score:1)
Technology like this may provoke new erase technologies that erase and attempt to obscure the original information. One way to obscure something is to write "similar" information over it so it becomes difficult to tell what is part of what.
A demonstration of this technique is the write something in pen on paper. You cannot erase this easily and if you try to darken the words with more ink, a careful eye can still find the pattern of the letters. To really "erase" the words without destroying the paper, write other letters/numbers over the original letters/numbers. If you do enough of these it becomes impossible to read the original words.
The same technique would work for digital and analog recordings. Until now however, such steps would have seemed pointless.
Re: How many times... (Score:1)
Just my 0x2a yen.
Re:data destruction (Score:1)
...or that acid you used to get rid of bodies
Secure deletion paper (Score:5)
Briefly, the main problems are the "ghost" of the old data, track misalignment leaving part of the old data on the side of a track, and bad sectors which are marked off by the drive electronics. There are also issues with drives that promise to write the data to the store immeditately, but in fact just cache it.
The only thing you can do is overwrite with random data several times in the hope that this will be enough.
Paul.
Heavy duty paper shredders (Score:1)
Kate
Re:"Officially" (Score:2)
{shhhhh... the froggies are asleep.}
spam-proofing?
Re:Destroying data (Score:1)
Your disk will get full in a couple of minutes or hours (depends on your /dev/urandom), and data in /your/secret/file will be most likely overwritten only once.
Burn the media (Score:1)
H Cl Re:data destruction (Score:2)
Re:been around for a bit (Score:1)
Actually, do *NOT* use random passes... (Score:5)
The DOD standard you and others mention specifies a specific set of patterns to be used for each pass, in order to maximize the chances of making the data unrecoverable. It's specified in DOD 5220.22-M and generally referred to as "DOD standard 7-pass extended character rotation wiping," which is quite a mouthful.
Sami Tolvanen has done some excellent research into the area, however, and at
http://www.tolvanen.com/eraser/
he goes into specifics, including scientific papers and providing links to the actual text of the DOD standard. He also provides a Windows binary for download and *GPL'd SOURCE CODE*, for a program he wrote called Eraser which is probably the best file shredding util out there. He concludes, based in part on a scientific paper at
http://www.cs.auckland.ac.nz/~pgut001/secure_de
that the DOD standard is outdated, and that the best answer is to use 35-pass "Gutmann shredding" using passes of specific characters as suggested by Dr. Gutmann in his paper linked above.
Maybe some people should start porting Eraser to Linux, nudge-nudge wink-wink hint-hint.
you missed the point (Score:1)
So if you hit your hard drive with a hammer, your just destroying the drive mechanism, not the data on the disks, and the FBI will still get you. If you smash the plates into small pieces, they'll reconstruct them (If your worth the chase). I believe that the standard for passing a erase head over data to erase it beyond recoverability is 12 times. That's what the FBI says. I wouldn't be surprised if they can still recover stuff after this though and you just don't know it. So I suggest 20 times if you have the patience. BTW, a nice wind0ze utility that does this very thing is "file shredder" included with McAfee's nuts and bolts utilities. What's the Linux equivalent?
It might be a good idea to do something like this to your financial/personal data on your old computer before you sell it. It's amazing what people leave on their hard drives when they dump their old computers. I'm wondering why we haven't heard more horror stories.
Sand Blast (Score:1)
I think that would just about do it!
Boxic
Re:Heavy duty paper shredders (Score:1)
Re:H Cl Re:data destruction (Score:1)
Yes, but if he had read the article, he wouldn't have gotten firsties. It's a question of priority. :)
---------///----------
ramfs (Score:1)
Securing Data (Score:5)
1. Big Magnets... For only 19.95, we'll ship you a super powerful magnet capable of realigning the entire hard disk. This device takes some time, and is best used over a couple days. Please note that while large, and heavy, this is NOT a SPEAKER MAGNET!!!! We purchase ours before they ever reach the speaker manufacturer.
2. Thermite Charges... Yes folks, you now have the ability to not only corrupt every single peice of data on your hard-drive, with our magnesium hotmelt system, we can even guarantee you fragging the computer it is in!!! These hard drive modifications are somewhat difficult to accomplish, so please send your hard drive, along with 200.00 (non-refundable) to our own technical explosives specialist, three fingers McCoy.
3. Gravity/Kinetic Data sentry: 79.00... Our Data sentry gives it's best when and where it counts... Simply mount this item near your computer for a "just in case" emergency, and when the feds come pounding on your door, just begin actuating, and deactuating the Data Sentry to pulverize the hard disk. This Data Sentry, superior to others available, not only comes with a completely waterproof fiberglass handle, it also comes with an instruction manual. The solid core mettallic head has a patent on it for it's balled shape, which distributes tremendous kinetic energy into a very small location, (more PSI per use than comparable DATA SENTRIES!!!) Can also be used to hang pictures, pound nails, straightening metal, etc.
4. And finally, we would like to give you one of the finest data security measures we have to offer. The cost is 5.00 for the item, and 25.00 shipping and handling. This item utilizes new space age non-kilned ceramo-limestone material to create a heavy, yet durable and portable security measure. When the need is there, simply lift our destructo bloc about 4 feet in the air, and let it fall on your hard disk. This item guarantees hard disk breakage on the first impact, or your money back. (Shipping and handling costs not included). Item can also be thrown at incoming agents to buy time with the "DATA SENTRY". Caution: Do not drop on foot, on Glass, or on Pets. This product is in no way related to an ordinary concrete block, although you can disguise it as one if you think you are being watched!!!
krystal_blade
Re:How OSM Was Freed: Chapter One (Score:1)
--Shoeboy
A one-pass wiping method (Score:1)
In case of imminent security breach, the room featured axes, as well as special magnesium based devices at the tops of the computer racks. The magnesium, once ignited, was supposed to burn through the computers in the racks.
That was at least 5 years ago. Sounds like the old methods are still best
Re:Actually, do *NOT* use random passes... (Score:2)
I'm not a data recovery expert, but wouldn't a random sequence of bits written between each step of writing the specified sequential pattern of bits make it harder to establish physical patterns during data recovery? Because if I'm right, this would act like the normal process of read/write and throw in confusion while the analyzing a drive under the microscope.
Oh well, at least this piece of news gives the OS/disk encryption camp one more point.
Re:Destroying data (Score:1)
while true; do dd if=/dev/urandom of=/my/secret/file bs=`ls -l
That should do it. Be careful, though, 'cause it could take a while to go through each repetition. Fiddle with your mouse and hit some random keys to help it along. It also might chew up a fair amount of CPU or I/O on slower machines.
data destruction made... easy? (Score:1)
1) Cook data container (floppy disk, cd-rom, hd, etc) in microwave/oven for 20 minutes @ 400 degrees.
2) Take container and pour into vat of hydrochloric acid (good enough for government work!). Let sit for 24 hours.
3) Pour the new solution into 10 different beakers.
4) Take beakers to 10 different landfills and fling 1 per location into rubble.
Of course, this is a bit of overkill, but how else are you going to keep your forensic data recovery specialist girlfriend from finding your jpegs of Natalie Portman?
love,
br4dh4x0r
Peter Gutmann's deletion algo is in GNU fileutils (Score:5)
"This uses many overwrite passes, with the data patterns chosen to maximize the damage they do to the old data. While this will work on floppies, the patterns are designed for best effect on hard drives. For more details, see the source code and Peter Gutmann's paper `Secure Deletion of Data from Magnetic and Solid-State Memory', from the
proceedings of the Sixth USENIX Security Symposium (San Jose, California, 22-25 July, 1996)."
Mission Impossible Hardware (Score:3)
1) -Triggering of a super strong electro-magnet, followed by,
2) -An instantaneous release of acid that would eat away at the surface of the disk.
These ideas may seem stupid to most, but you must realize that by opening a harddrive, you are ruining it anyway. I got this idea from the Guinness Tall Boy cans which have a Nitrogen Booster that gets released as soon as you open the can. The drives would have to be manufactured in such a way that these mechanisms could not be interjected before opening the case. This kind of hardware would not be targeted to the average consumer, but to those who may feel a little paranoid about the MAN getting a hold of their data.
Re:"Officially" (Score:1)
More info at NIST (Score:3)
I don't think this press release is referenced at the Science News article.
Re:Heavy duty paper shredders (Score:1)
GNU method for erasing data securely. (Score:1)
I hear that's how they do it at TransMeta so it's gotta be a Good Thing (tm)... : )
You need:
--
"No se rinde el gallo rojo, sólo cuando ya está muerto."
Re:Heavy duty paper shredders (Score:1)
Hah-hah! Obfuscate! (Score:2)
Answer: Assume that security via obliteration will be ineffective. Instead, use non-random data. Use something so nasty, atrocious, and baiting that those that pry go for the lure rather than the information beneath the palimpsest.
Security through what-they-want-ifiscation.
Mojotoad
Think About It This Way... (Score:3)
> each step of writing the specified sequential pattern of bits make it harder to
> establish physical patterns during data recovery?
The point of using specified patterns when wiping is so that those patterns will have the combined effect of completely obliterating the magnetic signature of any stored data. That's why certain patterns are mathematically thought to have a much more useful effect in the secure deletion of files than just using random data.
Think about it this way; the following parallel isn't accurate as to the exact process, but should illustrate the same methodology: You have a few lines of text written on a sheet of paper, and you wish to render them unreadable even to very close examination. (Obviously you'd burn the paper, but for the sake of example assume we have to keep the paper.) Now, what would be most effective in destroying your writing, randomly scribbling over each character, or carefully writing successive patterns of other letters over the existing ones in order to methodically obliterate them? A simplistic analogy, but that's the easiest way to grok it. I doubt 100 passes of random data could be as effective as 35-pass Guttmann wiping.
Re:Burn the media (Score:2)
Cool, Now Linux Users Know What to Use (Score:1)
Encrypting data (Score:1)
If you need security then encrypting the data is your best bet.
Chapte r 10 - Encrypting files and drives in Linux, BSD, and other Unices [securityportal.com]
and
Chapte r 9 - Encrypting files and drives in Windows 95, 98, NT and 2000. [securityportal.com]
As well I have 2+ gigs of OpenSource cryptographic software at CryptoArchive [cryptoarchive.net]
Re:Heavy duty paper shredders (Score:1)
It is. It won't damage the shredder at all. The fool may not be shredder proof, but thats his responsibility.
Re:Good question (Score:1)
Re:Heavy duty paper shredders (Score:1)
Re:H Cl Re:data destruction (Score:2)
Think About It This Way... (Score:1)
Same for magnetic media - as we know how each pass alters state of the media, knowing all the patterns we could try to invert the operation.
Obviously signal to noice ratio would decrease with each pass, but introducing some randomness (artificial noise) into patterns will make this process more controllable and faster.
I think the best solution is a special random patterns: one should have a [mathematical] set of optimal patterns and choose one of them at random every time.
Every secretary using MSWord wastes enough resources
Program based on this paper (Score:3)
- da Lawn
Possible applications of this technology? (Score:2)
As the sample moves back and forth, the head detects the strength and direction of the magnetic field at millions of points. A computer then can make a topographic image from the data or interpret the data directly-into sound, for instance.
Imagine the possibilities: you could record sound onto a piece of magnetic material - a loop of tape coated with powdered iron oxide, for example - and this advanced computer technology would allow you to play back that sound at will! The gramophone will be a thing of the past! I predict that in ten years' time room-sized devices based on this technology will be available, making it possible to listen to music anywhere there is access to a 24 kW power supply (required to run the computer). Now if only we could find a smaller, less power-hungry replacement for vacuum tubes...
$ cat < /dev/mouse
The answer is _zero_ (Score:1)
Re:How OSM Was Freed: Chapter One (Score:1)
Are you man enough?
--Shoeboy
Another effective way to kill data (Score:2)
Anyways, this should destroy just about anything.. work as an emergency device for the paranoid.
In Honor of Douglas Adams... (Score:1)
Star Trek anyone? (Score:2)
larger storage space, more like (Score:2)
> thinking -- how many passes of write-over-with
> random-data are now required to securely delete
> a file?"
the more interesting aspect is that if you've got such a great method of recovering partially deleted data, you can easily pack more data onto the medium by just writing more data over it.
Retrieval will be *really* slow but this might change in the future.
Da Warez D00d
Re:"Officially" (Score:1)
> matter how many times the data is written over,
> there is still a discernable and recoverable
> trace of the original information,
nope. I suggest you read up on Heisenberg's Uncertainty Principle [adnc.com]. After a while the signal will be so faint that just reading the medium will destroy the data. This might take many more passes than 7 of course, but it's definetely not infinite!
Da Warez D00d
Missing the point... (Score:2)
Point being, 99% of the time, if you want to get rid of all of the data on a hard drive... you'd probably like to be able to use that drive again in the future. The security of my data is not worth the $200 that I payed for my drive (I have nothing important), however if I can protect myself by writing over the data x times, in pattern y, then I am interested.
--
Re:been around for a bit (Score:2)
First make a ROT13 FS, and then make should all the important files on it are also ROT13ed..
Yet another reason why encryption is important (Score:3)
Obviously, encryption.
Big brother is watching, if you want to keep anything secret you better use something that will at least be hard for "them" to penetrate. Encryption is the only known last defense.
Hmmm, let's see if I can get Echelon to take notice of this post. Nuclear weapons grade plutonium uranium kryptonite terrorism attack make the infidels pay bomb blood killing death www.terrorists.org DEATH TO THE UNBELIEVERS! allah'u akbar muhammad purple monkey dishwasher.
possible problem with newer large HDDs (Score:2)
Anyone know any more about this?
Fun with audio tapes. (Score:1)
Don't Destroy The Archives [waves.com] is an interesting page which suggests things that could be done to restore old audio tape recordings. I like the idea about correcting wow and flutter using the bias signal. I wonder if this technology comes close to making this sort of restoration possible?
Molly.
Re:data destruction (Score:1)
you forgot the blow torch (Score:1)
Re:Securing Data (Score:1)
Couldnt you store more info this way? (Score:1)
the neal stephenson method (Score:1)
Well, back in the '70s... (Score:3)
My dad was working for Controll Data Corporation back in the '70s, which was then a big comptuer company. (Cray designed their systems before starting his own company).
They had drum drives. Like a normal harddrive, but instead of a platter it was a drum (like a big tin can). The department of defense bought on of these units, which turned out to be defective. After a few days of operation it broke, and deformed the drum. There was now no machine that could read it. They DOD sent it back to the factory for replacement - with two armed gaurds. Those gaurds were with the machine at all times until technitions opened the case. Then they took rags, rubed the magnetic coating off the drum, and burned the rags.
Re:Another effective way -- not good enough (Score:2)
Re:Another effective way to kill data (Score:1)
Put all your servers in a room with one entrance - a corridor down to a single door. Around the door frame (and behind the plaster) wrap lots of turns of wire, and pass mains electricty through it. Anything in the room is find. Anything outside the room is fine. As soon as any material on magnetic media goes through the doorway, (such as your harddisk which is being removed by government agents) it all goes 'pfft' in a puff of electrons. To get any information to the box directly, you'll need to do it via non-magnetic media (e.g. CD-ROM), or you could just up/down load stuff remotely.
But as soon as the [insert relevant government agency operatives] come along to relocate your equipment for evidence purposes, their act of removing it (and passing it through an alternating magnetic field) causes it to be useless to them.
tada!
Truth is Stranger then Slashdot (Score:3)
The military actually uses these things. One of the neater James Bond devices I've seen is what appears (at first glance) to be two thick hanging file folders. One at the front of the drawer, one at the back. Then you notice the wires attached to them. They're shaped explosive charges, designed to completely destroy the contents of a file cabinate or safe quicky. For use in the event of "imminent compromise" of security by enemy forces.
Re:H Cl Re:data destruction (Score:1)
A cone 10 or 11 kiln should do the job - melts the platter, which really randomizes the data.
Yes, "out-of-band" storage is a problem (Score:2)
Yes, most any hard drive made past 1990 or so will have "spare sectors", which are used to replace sectors the drive detects are going bad. This is considered a problem for the DoD, which is why you are required to either (1) use drives certified not to do that or (2) physically destroy the drive before you can call it "clean".
Re:"Officially" (Score:2)
really had something to hide, you shouldn't be such a cheepskate, and just shell out for a few extra dimms.
For the really paranoid, even that isn't enough. It seems that DIMMS develop a bias towards the information they hold. When powered up, statistically, the bits are more likely to take on their biased value. With several powerup/read cycles, the biased pattern can be recovered fully. ECC memory makes the process even more certain.
A randomization process similar to secure HD wipe can be used to truly randomize the bias. The very paranoid might want to patch their kernel so that the idle task does secure wipes on pages and swap. Doing it more thoroughly thoroughly would probably be a real performance killer (Even the idle task version would harm performance by trashing the caches, but not as badly).
Are you sure? (Score:2)
Note that physical deformation may still leave recoverable magnetic signatures on the recording medium. There are companies who specialize in this sort of data recovery. I know of at least one case where a laptop (with hard drive) was run over by a truck, completely crushing it. The company was able to recover all most all of the data.
Tempest standard used to be 10 passes (Score:2)
Re:Securing Data (Score:2)
It is my understanding that the most paranoid security involves incineration, shredding the remains and then encaseing in concrete for burial in a secured facility.
Cripes, it's easy (Score:1)
Gawd, why do it the hard way? In a hurry you are toast anyways (Except for the primercoard idea... wrap that HDD in primercord... but then you'll spend the same amount of time in jail for disfiguring the officers there to apprehend you.
Although, back in my hacker days (friends who did the cracking, I just built the hardware) I had a degaussing coil wrapped around the hard drive (Monster 20MEGS!) one flip of the switch and it starts degaussing (If you heard of a bust you have time to sanitize, if you dont hear of the bust then you are the first
Re:Yet another reason why encryption is important (Score:1)
Hard drives and seals (Score:2)
It is a common misconception that hard drives are vacuum sealed. In fact, Winchester-style disk drives use an air cushion to "float" the heads above the disk platters. They won't work in a vacuum. Furthermore, hard disk drives have filtered "breather holes" which connect the inside of the drive to the outside. They need to do this because as the spindle motor heats up, the air inside the chamber expands, and it needs a place to go.
Not true. The danger is contamination -- i.e., dust. If even a tiny dust particle gets between the read/write head and the platter while it is spinning at 3600 RPM or faster, Bad Things Happen. If you use a clean-room environment, you can open up a hard drive -- and even run it with the cover off. Data recovery companies sometimes do this sort of thing.
I Bet Al Gore Wished He Torched The Drives. (Score:1)
I recall they have a problem with "lost" e-mail.
I doubt he heated them,probably "accidentally"
formatted them.
decrypting is possibele, but takes time (Score:1)
The NSA already has tools to decrypt DES-128, that is why it is realeased for export.
Overwriting 7 times is possible to recover.
Re:possible problem with newer large HDDs (Score:2)
All HDDs I know of have such spare sectors and mapping now, and have for years. I know that the old Bernoulli drives in the '80s did that (and you could HEAR the spares being used because they were on different tracks).
That's why IDE and SCSI drives don't come with bad block lists on them like RLL and MFM drives did. The filesystem on such disks would either have a special badblock indication in the block map or would set up hidden pseudo files that occupied the bad blocks.
Dumber drives map in a spare when a write gets a hard failure. Smarter drives copy and re-map when too many read passes are required to retrieve a block w/o errors. They do not even report the condition. SMART drives have diagnostice that will tell you about some of these things.
Ferric Acid? (sp?) (Score:1)
The acid in question was not harmful to skin, thus avoiding charges of a "terrorist device" from Thermite or some more dangerous substance. (make that avoiding reasonable accusations of)
Sounded good, if one of you real chemists can point this in the proper direction it would be appreciated.
Re:possible problem with newer large HDDs (Score:1)
Do typical hard disks do this? I don't know, but I'm going to check that out. Now that I think about it, it has been a very long time since I have had a bad block on a hard drive.
Re:Destroying data (Score:1)
Re:Hard drives and seals (Score:2)
Which would lead to quite a nice way of trashing your drive if you had the ability to modify it yourself, or even better if some company wants to make 'secure' drive.
all thats needed is a nice row of diamond tipped styli that can be triggered and play the disk.
It might be possible to get the data from a hammered disk, but from a case full of steel wool? also if you had something to ignite it (and possibly some oxidant), well steel wool burns pretty good...
hmm as a thought, given that cases a small and at least semi-sealed you might not want to be near it when you did this :)
Re:Secure deletion paper (Score:1)
What about Magneto-Optical ? Since it is allowed to change state by heating with a laser, does that make the old data less descernable ?
What about flash memory cards ?
- just another cosmic ray -
Re:data destruction (Score:1)
Data Recovery (Score:1)
For more information (Score:1)
Re:"Officially" (Score:2)
1) Crack the hard drive case open
2) Strip the magnetic oxide from the disk platter with acid
3) Shred the substrate that the oxide coated.
Allegedly with sophisticated enough equipment you can salvage data from the substrate even once the oxide has been stripped.
--
Re:H Cl Re:data destruction (Score:1)
Works every time....
Re:Hah-hah! Obfuscate! (Score:1)
Re:dd truncates the file before writing! (Score:2)
To do thus properly, you'd have to go digging into the kernel and alter the unlinking operation to all the random overwriting before it actually unlinks the file. Bummer.
Re:the neal stephenson method (Score:2)
At work, we have several NSA certified tape degaussers. The degaussers are certified for media up to 750 oersted at better than -90 dB erasure. They are strong enough to erase the credit cards in your wallet if you stand too close to one that is in operation. Signs are posted that warn people with heart pacemakers to stay out of the area. As strong as they are, they are not powerful enough to securely erase the high coercivity media used in many modern tape cartridges and disk drives. The other problem is that a hard disk enclosure is going to shield the platters inside the drive.
See A Guide to Understanding Data Remanence in Automated Information Systems [ncsc.mil] for the National Computer Security Center guide to the subject.
Re:"Officially" (Score:2)
Re:"Officially" (Score:2)
"Just drop it in the bubbling mass of molten metal to your left on your way out of the secure area!"
A good article on this at ABCNews.com (Score:2)
Here are the articles:
Trashing your PC - http://archive.abc news.go.com/sections/tech/Geek/geek000706.html [go.com]
Data Dump - http://archive.abc news.go.com/sections/tech/Geek/geek000622.html [go.com]
The Hard (Drive) Facts - http://archive.abc news.go.com/sections/tech/Geek/geek000615.html [go.com]
use cryptography (Score:2)
However, if you use cryptography, for example, the Steganographics File System [linux-security.org], and if you implement it securely, then it doesn't matter what people can retrieve.
Of course, with cryptography, you run into some of the same issues. In particular, keeping your keys secure is, in itself, not trivial. For example, if you type in your key and the program that reads the key gets swapped out, your plaintext key will have been written to disk.
Re:use cryptography (Score:2)
In the short term, if it's important, you can turn off swapping. But a better long term choice is probably to encrypt swap space with a key that is created at boot time, held in kernel memory, and discarded when the system shuts down/crashes. That addresses the problem once and for all.