[Cryptography] Magnetic media destruction question
Kent Borg
kentborg at borg.org
Thu Jan 8 19:17:16 EST 2026
On 1/7/26 1:59 PM, John Levine wrote:
> T-7 is about shredding magnetic media, not paper. I don't see what relevance that has.
Thank you.
> The spec says that T-7 shreds magnetic media into chips no larger than 2.5mm�. I agree
> that it seems implausible that one could recover data from those.
Given crazy disk densities, I can imagine that there might be
recoverable data on that. And, as erased data isn't necessarily erased,
maybe there is some strategy for recovering files that get copied and
more than once? Maybe it is a bit like piecing together DNA sequences.
Were I paranoid about such things I would be happy with the current
shredding size, but then insist on some post processing step. Heat? A
caustic solvent? Stirring a cooking slurry of said?
It is possible that the benefit of shredding is the destruction if data
where the cuts are made not in the jigsaw puzzle of the remaining bits.
Not that this answers the original question: What has prompted this?
As for wiping data I like the approach of storing lots of high quality
random data and then read it back out, the only way the storage device
can regurgitate the data correctly is by honestly storing it. Do this
repeatedly and any old data that could be recovered has to be small, or
the device is leaving too much capacity unsold. But the approach I
really like is full disk encryption. I am suspicious of letting the
device claim to do the encryption, so I like the idea of the opensource
OS doing it. (And no Microsoft tricks of not encrypting because the
device said it will do it.)
I have long done full-disk encryption of my laptops, but what about the
boot partition? Only with my most recent machine have I done
/full/-full-disk encryption: I don't have boot partition, the machine
(as it sits in the hotel room awaiting the evil main) is not bootable at
all. I boot with a tiny external thumbdrive I keep separately. There is
still plenty the evil made can do, no doubt.
To prove to some security person that it is a working computer (do they
still do that?) boot from a "live CD" thumbdrive and don't decrypt the
internal storage at all.
-kb, the Kent who doesn't think anyone is really after his data
(excepting that time he visited China), but who crafts his personal
security as more of an intellectual exercise.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://www.metzdowd.com/pipermail/cryptography/attachments/20260108/7a29395b/attachment.htm>
More information about the cryptography
mailing list