• There has been a recent cluster of spammers accessing BARFer accounts and posting spam. To safeguard your account, please consider changing your password. It would be even better to take the additional step of enabling 2 Factor Authentication (2FA) on your BARF account. Read more here.

Hard drive shredders

That is actually a very rational approach. If someone, .gov or otherwise, really wants your data, they're going to get it. Security and privacy are largely illusions at this point.

They aren't, but in order to maintain, them, it'd be a pain in the ass.
 
There is no privacy. Get over it - Scott McNealy
 
They aren't, but in order to maintain, them, it'd be a pain in the ass.

I was generalizing, true. However as you imply, for most the level of effort required is disproportionate to the threat.

That doesn't mean that you shouldn't take reasonable precautions. But anyone telling you that you can be 100% safe is trying to sell you something.

"The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards - and even then I have my doubts." - Eugene Spafford
 
What's so hard about just not documenting your illegal activities on a computer? :laughing
 
Actually, shredder software was the original topic (see first post), and everyone seems to have comprehended that.

BTW:

Your first post referred not to shredder software but to "a shredder".

Did these people think to use a shredder

This is not how we refer to proper nouns in the English language. Do you use a Microsoft Word? How about using a Excel? It is hilarious that you yourself are accusing others of not owning up to your mistakes, when your own butchering of English is very much there in your own posts.
 
Your first post referred not to shredder software but to "a shredder".



This is not how we refer to proper nouns in the English language. Do you use a Microsoft Word? How about using a Excel? It is hilarious that you yourself are accusing others of not owning up to your mistakes, when your own butchering of English is very much there in your own posts.

I hate you for making me do this because I don't care all that much for Reli, but you need to read a little further.

As you know, a file isn't actually deleted when you empty your recycle bin. You need to over-write it with other data, which is what shredder apps do.

I've never heard the term before either and he mostly posts drivel, but apparently he is technically correct here.
 
I hate you for making me do this because I don't care all that much for Reli, but you need to read a little further.



I've never heard the term before either and he mostly posts drivel, but apparently he is technically correct here.

First the Hostess ending twinkies production and now this. And I have run out of icecream at home :cry
 
He was right and that's all that matters. He doesn't care that he wasn't clear and some people got confused over terms (as I did and admitted) he just want people to be clear that he was right and I/we were wrong. (Even if we were only wrong because we don't speak Reli.)
 
He was right and that's all that matters. He doesn't care that he wasn't clear and some people got confused over terms (as I did and admitted) he just want people to be clear that he was right and I/we were wrong. (Even if we were only wrong because we don't speak Reli.)

Your first post was "Derik's Boot n' Nuke."

Which leads me to believe you DID know what I was talking about......

And then later, you didn't? I don't get it.

And your claim that I was "rubbing it in" when I was merely providing clarification, prompted me to be snarky in return.
 
Last edited:
Reli the MASTER-DEBATER. Another thread added to the list.

As far as the topic goes...If you are really that worried about something being on your hard drive, The only way to be sure as hell that it will never be recovered is MY WAY, THE OAKEY WAY!!! Also would work with stolen goods, vehicle trackers, and murder weapons. Maybe even a body if you had the stomach and the time.
 
Hmm interesting, thanks.

The case law, it seems, upon further review, is leaning towards compulsion to reveal one's password being illegal. HOWEVER, there is also movement toward the idea that you CAN be compelled to ENTER your password, but there's a lot of disagreement about this. Law enforcement (my use of this term includes DA's offices and US attorneys and such) has been skirting the issue by writing the subpoena in such a way as offers the defendant immunity on whatever it is that the prosecutors are looking for (the fifth amendment doesn't apply when you're offered immunity), but if they find anything ELSE, you've got no immunity on that. It's pretty underhanded, imo.

But all of this is in flux, really.
 
http://linux.die.net/man/1/wipe

What about full HD encryption, like PGP Desktop?
(Most) encryption is just another form of lock. Any encryption can be broken-- the only question is how long it will take to break given the available computing power. This also assumes that it has been implemented airtight, as silly oversights like not realizing that your modern journaling file system will leave unencrypted evidence behind that can be recovered.
 
http://linux.die.net/man/1/wipe


(Most) encryption is just another form of lock. Any encryption can be broken-- the only question is how long it will take to break given the available computing power. This also assumes that it has been implemented airtight, as silly oversights like not realizing that your modern journaling file system will leave unencrypted evidence behind that can be recovered.

Important Warning. :rofl

That is true if someone REALLY wants it they can get it. Just like with protecting data it comes down to is it worth resources being invested.
 
Any encryption can be broken-- the only question is how long it will take to break given the available computing power.

I'm sorry, what? Are you saying encryption can be broken or the KEY can often be brute forced?
 
Reli the MASTER-DEBATER. Another thread added to the list..

yup, I be all ova that mofo fo tha 00-twelve :thumbup

As far as the topic goes...If you are really that worried about something being on your hard drive, The only way to be sure as hell that it will never be recovered is MY WAY, THE OAKEY WAY!!! Also would work with stolen goods, vehicle trackers, and murder weapons. Maybe even a body if you had the stomach and the time.

No kiddie pr0n here, so I'm not really worried......But this type of knowledge is good when it comes time to turn in a company laptop and you don't want some IT goon seeing personal stuff on it. I have always shredded/bleached but was just wondering how effective it is. Also wondering why Ms. "All Up In My Snatch" didn't do it before handing it over to the FBI (or maybe she did but it didn't work well).
 
Last edited:
I have always shredded/bleached but was just wondering how effective it is.

????????????
300.JPG

????????????
 
I'm sorry, what? Are you saying encryption can be broken or the KEY can often be brute forced?
As a general rule, any encryption-- with enough time and resources-- can be broken by brute force. In practice I don't think this happens very often, as the solution by brute force could require centuries or millennia of time depending on the algorithm and the attacker's resources. Just like physical locks, encryption only buys time against a determined attacker... and how much time is bought depends on the quality of the locking system used and the infrastructure around it.

But realistically speaking, why bother brute forcing a solution when it is usually far easier to employ espionage and/or social engineering to circumvent the encryption. All the hard drive encryption in the world-- even if it would take the NSA millions of years to brute force-- can be rendered instantly moot by a cheap spy gadget in the form of a keylogger between the computer and the keyboard.

I guess what I'm saying is that encryption is not a cure-all for the security conscious, as it only takes one little slip-up somewhere along the line between computer and eyeballs/fingers to be exploited and subverted. It'd be like building a bank vault with a state of the art vault door... but forgetting to reinforce the walls so that any dipshit with a shovel could tunnel in.
 
But realistically speaking, why bother brute forcing a solution when it is usually far easier to employ espionage and/or social engineering to circumvent the encryption. All the hard drive encryption in the world-- even if it would take the NSA millions of years to brute force-- can be rendered instantly moot by a cheap spy gadget in the form of a keylogger between the computer and the keyboard.

There's always my personal favorite: rubber-hose cryptanalysis... :rofl
 
I guess what I'm saying is that encryption is not a cure-all for the security conscious, as it only takes one little slip-up somewhere along the line between computer and eyeballs/fingers to be exploited and subverted. It'd be like building a bank vault with a state of the art vault door... but forgetting to reinforce the walls so that any dipshit with a shovel could tunnel in.

Well assuming you're encrypting YOUR info there is no reason you should be putting that password anywhere else so the likelihood of a social hack is low. Therefore if you use a strong enough key (password) that will take trillions of years to brute force than you can say with reasonable certainty that you are safe.

Just don't throw your password around all willie-nillie.
 
Back
Top