What's new
  • Happy Birthday ICMag! Been 20 years since Gypsy Nirvana created the forum! We are celebrating with a 4/20 Giveaway and by launching a new Patreon tier called "420club". You can read more here.
  • Important notice: ICMag's T.O.U. has been updated. Please review it here. For your convenience, it is also available in the main forum menu, under 'Quick Links"!

DBAN Darik's Boot And Nuke, Data wipe/clearing

M

mrred

500 isnt very much money, like someone said on a slashdot comment, 500 is less than what a data recovery company whould charge, so its not worth their resources
 
wasnt referring to encryption

No shit. Expecting feds/LEO to tell you how to make sure they can't read your data is exactly like expecting the NSA to tell you what encryption they can break. I was making an analogy to illustrate my point.

In fact, LEO want you to think that they can do less than they can. If they can beat a two-pass zeroing, they want you to think that they can't beat a one-pass zeroing. Just like the guy thinking that a dell recovery tool is sufficient - the less people know, the better.
 
A

ak-51

My impression has always been that a DBAN zero fill was more than sufficient except for in the most critical of circumstances. I believe that the higher level 3-letter gov agencies can and will in certain situations recover data off of drives wiped in such a way. As for encryption, the current AES encryption standard is approved for use by these same agencies. One would think that if it had been broken by the NSA they would no longer want to use it, since that means it is breakable and therefor not safe to assume that nobody else has broken it. Furthermore if it were broken by the NSA or FBI, and they were keeping it secret, I would not imagine they would want to spill the beans about it on just any old cultivation case. To do so would immediately lose them their advantage. If you're still worried about relying on AES to protect you then use TrueCrypt's cascade function which overlaps the top 3 encryption methods (AES being the top one). This brings me to my final point, you might think by watching CSI that the government at all levels has an unlimited amount of money to spend on law enforcement. This is obviously not true, advanced data recovery is expensive. And really, if you're in a situation where seconds count such as a raid, is your hard drive really the worst thing you have in your home?
 
M

mrred

well this is more for people who found out that the cops are on to them and they have enought time to get rid of everything, including the data on your hd that may link you a grow.
 
A

ak-51

Another quick way would be to have a drill laying around, If you drill a single hole through the platters it would make it a giant pain in the ass to recover anything, if it's even possible.
 

laughingmoon

Active member
Guys, you're forgetting one thing.

First, run your eraser program. I like Eraser, and it's open source: http://eraser.heidi.ie/

Then, pull out your memory, this is what everyone is forgetting. The memory must be properly destroyed. Drill it, and smash it up with a hammer.

Lastly, take your hard drive, and hit it up with the drill as well.

After that, you'd need electron microscopes to try to do any sort of recovery, but it would be useless anyway.
 

RudolfTheRed

Active member
Veteran
zachmorris i hate to break it to you but you could not be more wrong and the cops probably will take your computer if your growing.
 
Top