In Reply to: You can encrypt the contents, then securely erase when it's time.... posted by AbeCollins on November 21, 2014 at 23:04:37:
1. I know this whole disk encryption exists. However, without hardware support the result is a noticeable loss of performance.
2. The human factors associated with whole disk encryption yield a poor tradeoff of convenience vs. security (e.g. password strength).
3. There is no reason to believe that any "secure xyz" is actually secure after Edward Snowden's revelations. (I have known this to be the case for decades, but had no credible way of demonstrating this.) In addition, secure file erase is of dubious value due to device level revectoring games, which are the exception with spinning rust but an essential part of SSDs.
I place more faith in the sledge hammer method. However, after smashing to pieces it may be necessary to grind the results to dust and burn them. :-)
Tony Lauck
"Diversity is the law of nature; no two entities in this universe are uniform." - P.R. Sarkar
This post is made possible by the generous support of people like you and our sponsors:
Follow Ups
- RE: You can encrypt the contents, then securely erase when it's time.... - Tony Lauck 11/22/1407:37:29 11/22/14 (4)
- RE: You can encrypt the contents, then securely erase when it's time.... - AbeCollins 09:38:54 11/22/14 (3)
- RE: You can encrypt the contents, then securely erase when it's time.... - Tony Lauck 11:17:28 11/22/14 (2)
- RE: You can encrypt the contents, then securely erase when it's time.... - AbeCollins 09:30:29 11/24/14 (0)
- RE: You can encrypt the contents, then securely erase when it's time.... - fmak 08:45:55 11/24/14 (0)