Re: How many overwrites for secure erase?



"Sebastian G." <seppi@xxxxxxxxx> wrote in
news:62qjtgF2484t3U3@xxxxxxxxxxxxx:

bealoid wrote:

"Sebastian G." <seppi@xxxxxxxxx> wrote in
news:62q4cpF2486s5U1@xxxxxxxxxxxxx:

[snip]

This is nothing special though, even Peter Gutmann mentions much
more potent ways like magnetic force scanning tunneling microscopy.

and even gutmann says that no longer works and that 3 random
overwrites is about as good as you can do.


And even I wrote that one overwrite is enough, but this doesn't change
the result that such techniques allow to retrieve information
statistically significantly better than random guessing. If the high
level data are encoded with redundancy as well, this might be a
problem.

I'd be keen to see any cites for people actually doing this.
.



Relevant Pages

  • Re: How many overwrites for secure erase?
    ... more potent ways like magnetic force scanning tunneling microscopy. ... and even gutmann says that no longer works and that 3 random ... overwrites is about as good as you can do. ...
    (alt.computer.security)
  • Re: How many overwrites for secure erase?
    ... potent ways like magnetic force scanning tunneling microscopy. ... and even gutmann says that no longer works and that 3 random overwrites is ...
    (alt.computer.security)
  • Re: How many overwrites for secure erase?
    ... potent ways like magnetic force scanning tunneling microscopy. ... and even gutmann says that no longer works and that 3 random overwrites is about as good as you can do. ...
    (alt.computer.security)