Can software data destruction be better than a powerful magnet?


    Hi,% username%, I'm sure yes. And in our power to make this a reality.
    This post was inspired by this discussion, where sometimes it came to xenomorphs. Everything will be simpler and more reliable here (will they suddenly forget to feed the xenomorph?)


    Educational program



    • Disk encryption is usually done by a symmetric algorithm like AES using a key, the maximum size of which in April 2015 rarely exceeds 32 bytes (256 bits)
    • There is no documented evidence of overwritten data recovery to date .
    • The encryption key for the container is most often a random sequence of bytes, and it is already encrypted using your password
    • This sequence of bytes with service information is rarely more than 1 kb. This amount of data can be rewritten with special methods in 10 seconds several thousand times


    Thus, under the condition of invulnerability of disk encryption protocols and algorithms, it is enough for you to destroy the container header and all the header backups in order to say goodbye to any amount of encrypted data forever .

    Truecrypt


    Despite the fact that the project is dead, his work lives on.
    Update Apr 2, 2015: Phase II complete. TrueCrypt has been audited.

    And so everyone guessed, and there was especially nowhere to get a pre-planned hole from there, it was too painful all the implementations of the algorithms used in it were known for a long time. This is not an OpenSSL thread.

    So, Truecrypt is an example of an OpenSource program that can be more or less trusted to encrypt large amounts of data with a small (physical) key. Even so: Most likely, you are not so cool that even if they catch you, they will use hypothetical holes in the trukript to get information from your container.

    Veracrypt


    This is an OpenSource fork of the script, to which new features are carefully added so as not to confuse new arrivals. For example, after audit of the trukript, they increased the number of rounds of password hashing many times over so that now it takes several seconds to wait for mounting. Brute-force the password, respectively, is more difficult as many times + -.

    So, these comrades can be asked to make a feature for safe quick removal of the header of the container (and its backup) and such a request even already exists.
    You just need to go in and vote.

    And we will have a practical, fast, free way to delete data permanently. Really good?
    So, we vote , do not be shy.

    Also popular now: