Re: How many overwrites for secure erase?



bealoid wrote:

"Sebastian G." <seppi@xxxxxxxxx> wrote in
news:62q4cpF2486s5U1@xxxxxxxxxxxxx:

[snip]

This is nothing special though, even Peter Gutmann mentions much more
potent ways like magnetic force scanning tunneling microscopy.

and even gutmann says that no longer works and that 3 random overwrites is about as good as you can do.


And even I wrote that one overwrite is enough, but this doesn't change the result that such techniques allow to retrieve information statistically significantly better than random guessing. If the high level data are encoded with redundancy as well, this might be a problem.
.



Relevant Pages

  • Re: How many overwrites for secure erase?
    ... more potent ways like magnetic force scanning tunneling microscopy. ... and even gutmann says that no longer works and that 3 random ... overwrites is about as good as you can do. ...
    (alt.computer.security)
  • Re: How many overwrites for secure erase?
    ... potent ways like magnetic force scanning tunneling microscopy. ... and even gutmann says that no longer works and that 3 random overwrites is ...
    (alt.computer.security)
  • Re: How many overwrites for secure erase?
    ... more potent ways like magnetic force scanning tunneling microscopy. ... and even gutmann says that no longer works and that 3 random ... overwrites is about as good as you can do. ...
    (alt.computer.security)