[ale] destroy old drives
William Bagwell
rb211 at tds.net
Thu Apr 11 21:37:11 EDT 2019
Layer of soft porn between the encrypted stuff and the red herring files will
add to their frustration;-)
Years ago bought a used 10 GB HD at the computer show in Marietta that was
from a banks computer. No account info (that I could find) but there was an
interesting inter-office memo describing the protocol to follow during a
robbery. Son wanted to save it but it was formated and used in a firewall
for almost a decade. HD still running when firewall retired...
Oh, if I ever start attending meetings again should I bring my log splitter?
William
On Thursday 11 April 2019, Jim Kinney via Ale wrote:
> I like to write clear text red herring files onto a LUKS encrypted drive
> to be disposed of. So delete the LUKS header, overwrite it with
> /dev/random. Reformat the drive as fat32 then add:
>
> Files named "bank_codes" and then filled with random generated account
> numbers and passwords. Files named "my passwords" and filled with random
> usernames, accounts, and passwords" Files named "my new access list"
> filled with real usernames gleaned from facebook, google, etc. but random
> passwords
>
> This works real well on a fresh install win10 with no password on the
> default user account. Keeps the schmucks busy testing :-)
More information about the Ale
mailing list