<div dir="ltr"><br><br><div class="gmail_quote">On Thu, Jul 31, 2008 at 3:38 PM, Geoffrey Myers <span dir="ltr"><<a href="mailto:lists@serioustechnology.com">lists@serioustechnology.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
<div class="Ih2E3d"><br>
On Jul 31, 2008, at 10:06 AM, Jim Kinney wrote:<br>
<br>
> try a belt sander on the platters. By the time that data stream is<br>
> reassembled, our sun will be a red giant.<br>
><br>
> Realistically, a 1T+ alternating magnetic field (60Hz) for 5 seconds<br>
> with the drive not stationary in the field will render it useless to<br>
> even the most sophisticated STM/AFM methods. This will also render<br>
> the heads useless as well.<br>
><br>
> A hand-held bulk tape erasure moving across the top cover of a drive<br>
> for about 30 seconds will render the contents unrecoverable to<br>
> "normal" people. Most 3-letter named organizations can pull data off<br>
> from this. This will not destroy the drives ability to be used again<br>
> like the above method.<br>
<br>
</div>Well I guess it really depends on who you're trying to protect your<br>
data from. I would suspect that 10-20 overwrites of random data would<br>
be sufficient for all except the three letter government<br>
organizations. Oh, wait, that's likely who most folks are worried<br>
about. ;)</blockquote><div> </div><div>I like the idea of hiding secret data steganographically in really good pR0n images. That will slow 'em down :-) <br></div></div><br clear="all"><br>-- <br>-- <br>James P. Kinney III <br>
<br>
</div>