From: Phil Hobbs on
On 4/15/2010 7:50 PM, Joel Koltner wrote:
> "John Larkin" <jjlarkin(a)highNOTlandTHIStechnologyPART.com> wrote in
> message news:5a8fs5tou6rga4q8iaela0htcdqio2grm6(a)4ax.com...
>> That's nonsense.
>
> To a large extent, yes, but I think it depends greatly on how much
> effort one goes to in destroying the media -- a disk that's just been
> broken into, e.g., a half-dozen pieces is probably well worth putting
> back together.
>
> Sending the platters through a chipper should be pretty effective, I
> expect.
>
> I've been told that during the cold war years intelligence agencies
> would meticulously splice back together paper documents that had gone
> through a shredder.

IBM and the German government announced a program to do that on a huge
scale with the shredded Stasi archives--which occupy thousands of
garbage bags of confetti. They're doing it by scanning and recombining
the scanned images. Could be pretty cool if it works. Fortunately the
perps have had another 20 years to finish dying off....

Cheers

Phil Hobbs

--
Dr Philip C D Hobbs
Principal
ElectroOptical Innovations
55 Orchard Rd
Briarcliff Manor NY 10510
845-480-2058
hobbs at electrooptical dot net
http://electrooptical.net
From: whit3rd on
On Apr 15, 2:15 pm, GreenXenon <glucege...(a)gmail.com> wrote:

> If I heat the platters of my HDD beyond curie point to eliminate the
> platters' magnetic properties, will disk-splicing still make it
> possible to recover data from those platters?

No. Alas, you haven't any clear idea what the 'curie point' is
for any given disk, since you don't know the magnetic formula.
Disk-splicing will lose data at each stress region, since stress
leading to fracture or bending is also capable of demagnetizing.

> Can similar data recovery be performed on volatile RAM chips even
> after the power is offed.

Similar, no. Recovery, yes. The volatility has a time decay constant
of a second or so, and it takes a long, temperature-dependent, delay
after power-off to thermalize the information to nonexistence.

From: GreenXenon on
On Apr 15, 5:31 pm, whit3rd <whit...(a)gmail.com> wrote:


> On Apr 15, 2:15 pm, GreenXenon <glucege...(a)gmail.com> wrote:


> > Can similar data recovery be performed on volatile RAM chips even
> > after the power is offed.
>


> Similar, no.  Recovery, yes.  The volatility has a time decay constant
> of a second or so, and it takes a long, temperature-dependent, delay
> after power-off to thermalize the information to nonexistence.


If the time-decay-constant is a second, then will it take a second for
the data to be completely lost when the power is offed?
From: Martin Brown on
Joel Koltner wrote:
> "John Larkin" <jjlarkin(a)highNOTlandTHIStechnologyPART.com> wrote in
> message news:5a8fs5tou6rga4q8iaela0htcdqio2grm6(a)4ax.com...
>> That's nonsense.
>
> To a large extent, yes, but I think it depends greatly on how much
> effort one goes to in destroying the media -- a disk that's just been
> broken into, e.g., a half-dozen pieces is probably well worth putting
> back together.
>
> Sending the platters through a chipper should be pretty effective, I
> expect.

Thermite ignition will be pretty ruinous to its stored data.
>
> I've been told that during the cold war years intelligence agencies
> would meticulously splice back together paper documents that had gone
> through a shredder.

The most famous recent one was the Iranian student reassembling shredded
US intelligence documents after they invaded the US embassy in Iran.
>
> But of course all governments have an interest in suggesting their
> intelligence capabilities are far greater than they really are too.
>
> One newer topic in security is "deniable encryption," wherein you
> purposely setup your encrypted hard drive (or whatever) in a manner that
> goes no obvious sign whether it's a bunch of encrypyed data or if it's a
> just a disk full of radom gobbledeegook that you put there when you
> erased the drive for completely legitimate (e.g., privacy) reasons.
> Cool idea... I've never encrypted an entire hard drive, but I definitely
> have used programs like "disk eraser" that fill the drive with random
> data when I've sold off an old drive, precisely to ensure there wasn't
> anything of use left.

Most users seem unaware that format does little more than alter the
drives directory table. That action is easily undone. Secondhand
computers from big organisations that *should* know better crop up with
monotonous regularity. A full long format writing all zeroes is better
but would not really challenge a data recovery specialist.

After you have rewritten the drive with random data a few times a la
disk eraser a government intelligence agency might be able to get at
least some of the old data back but they would only bother trying if
they had very good reason to do so. Single bit errors in encrypted
and/or compressed data are fatal to decoding.

You can hide pretty much anything in JPEG files without affecting the
decoded image if you know what you are doing. See steganography

http://en.wikipedia.org/wiki/Steganography

BTW GreenXenon is a paranoid netkook.

Regards,
Martin Brown
From: whit3rd on
On Apr 16, 12:39 am, Martin Brown <|||newspam...(a)nezumi.demon.co.uk>
wrote:

> Most users seem unaware that format does little more than alter the
> drives directory table. That action is easily undone.

True.

> A full long format writing all zeroes is better
> but would not really challenge a data recovery specialist.

False; the usual 'long format' involves a search for bad blocks,
and DOES erase and rewrite all data; nothing useful remains of
the data on the disk, because MODERN disk drives don't waste
any of the platter area. Thirty-five years ago, there might have
been
some data residue.

> After you have rewritten the drive with random data a few times a la
> disk eraser a government intelligence agency might be able to get at
> least some of the old data back but they would only bother trying if
> they had very good reason to do so. Single bit errors in encrypted
> and/or compressed data are fatal to decoding.

True, and there's an implication here: all hard drive data is
modulated
in a scheme like Manchester coding, RLL, GCR, eight-fourteen
modulation... there's lots of schemes and lots of names. These are
all
history-dependent in some way, i.e. a ruined bit kills ALL the
subsequent
data to the end of the block. There's also error-correction data,
which
assures the reader that his as-recovered data is wrong. There's
no way that the hypothetical 'intelligence agency' can reconstruct the
block well enough to match the error-correct code, and that means
clobbering 'most of' the bits is good enough to delete the data.


Even a few bits bad means the error-correcting code will make the
result into evidence-unusable-in-court.
First  |  Prev  |  Next  |  Last
Pages: 1 2 3
Prev: RIP Randy Slone
Next: If D from BC were a plumber: