Destroying confidential information from database

Sandy Harris sandyinchina at
Thu Apr 30 19:07:47 EDT 2009

On Mon, Mar 9, 2009 at 10:32 PM, Mads <mads at> wrote:

> I know of procedures and programs to erase files securely from disks,
> Guttman did a paper on that....

Yes, but that paper is over ten years old. In the meanwhile, disk
designs and perhaps encoding schemes have changed, journaling
file systems have become much more common and, for all I
know the attack technology may have changed too.

Is there a more recent analysis or is Guttman still the
best reference?

Sandy Harris,
Quanzhou, Fujian, China

The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at

More information about the cryptography mailing list