Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I've been physically destroying several old hard drives and prepping a pile of old electronics for recycling.

I've been physically destroying several old hard drives and prepping a pile of old electronics for recycling.

Scheduled Pinned Locked Moved Uncategorized
26 Posts 8 Posters 34 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • kkarhan@infosec.spaceK kkarhan@infosec.space

    @zer0unplanned @Nonya_Bidniss @n_dimension yeah, I do want to do something similar with @OS1337 but a bit more precise, aiming fir #LUKS headers first so it'll take literally seconds to make it already non-recoverable.

    zer0unplanned@friendica.rogueproject.orgZ This user is from outside of this forum
    zer0unplanned@friendica.rogueproject.orgZ This user is from outside of this forum
    zer0unplanned@friendica.rogueproject.org
    wrote last edited by
    #21
    @kkarhan @n_dimension @OS1337 @Nonya_Bidniss That is a harder nut, but if you realy want you can even beat up LUKS while I still ask why? that LUKS would be just a key to read overwritten data.
    The aim is the data not the external defences.
    kkarhan@infosec.spaceK 1 Reply Last reply
    0
    • zer0unplanned@friendica.rogueproject.orgZ zer0unplanned@friendica.rogueproject.org
      @kkarhan @n_dimension @OS1337 @Nonya_Bidniss That is a harder nut, but if you realy want you can even beat up LUKS while I still ask why? that LUKS would be just a key to read overwritten data.
      The aim is the data not the external defences.
      kkarhan@infosec.spaceK This user is from outside of this forum
      kkarhan@infosec.spaceK This user is from outside of this forum
      kkarhan@infosec.space
      wrote last edited by
      #22

      @zer0unplanned @Nonya_Bidniss @n_dimension Mostly because deleting/overwriting the header first is extremely fast and twarts any unauthorized data recovery early on.

      • This is a real security concern in #finance, where #ITsec literally has to deal with "Red Army Faction"-style hodtage taking scenarios as part of regulator-mandated #OpSec.
        • Like "How can access of CxO's be revoked in K&R scenarios?" is a question @BaFin and others ask not just since #wirecard went "poof!"…

      Just because a business doesn't have a shitton of cash at hand and banks neither doesn't mean that armed robbers would necessarily understand, much less accept.

      • Similarly one may need to transit sensitive data but has to safeguard it against unauthorized access no matter the party accessing whilst providing plausible cooperation of it.
        • Or not having the keys on the storage media entirely.
      kkarhan@infosec.spaceK 1 Reply Last reply
      0
      • kkarhan@infosec.spaceK kkarhan@infosec.space

        @zer0unplanned @Nonya_Bidniss @n_dimension Mostly because deleting/overwriting the header first is extremely fast and twarts any unauthorized data recovery early on.

        • This is a real security concern in #finance, where #ITsec literally has to deal with "Red Army Faction"-style hodtage taking scenarios as part of regulator-mandated #OpSec.
          • Like "How can access of CxO's be revoked in K&R scenarios?" is a question @BaFin and others ask not just since #wirecard went "poof!"…

        Just because a business doesn't have a shitton of cash at hand and banks neither doesn't mean that armed robbers would necessarily understand, much less accept.

        • Similarly one may need to transit sensitive data but has to safeguard it against unauthorized access no matter the party accessing whilst providing plausible cooperation of it.
          • Or not having the keys on the storage media entirely.
        kkarhan@infosec.spaceK This user is from outside of this forum
        kkarhan@infosec.spaceK This user is from outside of this forum
        kkarhan@infosec.space
        wrote last edited by
        #23

        @zer0unplanned @Nonya_Bidniss @n_dimension Either way, comitting "#AssetDenial" is more often than not necessary and one may only have a few seconds before those exercising force may realize that a "duress code" was used and going for the #LUKS headers first may be the only feasible option in a short time...

        zer0unplanned@friendica.rogueproject.orgZ 1 Reply Last reply
        0
        • kkarhan@infosec.spaceK kkarhan@infosec.space

          @zer0unplanned @Nonya_Bidniss @n_dimension Either way, comitting "#AssetDenial" is more often than not necessary and one may only have a few seconds before those exercising force may realize that a "duress code" was used and going for the #LUKS headers first may be the only feasible option in a short time...

          zer0unplanned@friendica.rogueproject.orgZ This user is from outside of this forum
          zer0unplanned@friendica.rogueproject.orgZ This user is from outside of this forum
          zer0unplanned@friendica.rogueproject.org
          wrote last edited by
          #24
          @kkarhan @n_dimension @Nonya_Bidniss I'll try to do the same on an atomic image of fedora 43 as a pawn image in a box and will tell you if it worked with results. But need a 2nd fedora Atomic SilverBlue on that as a real challenge.
          The years of me using Kali was very long ago just after backtrack, then I used Parrot OS rather but that all does not mater as it is all Debian RHEL
          My os is immuatble with a rollback option> makes it very much trickier
          1 Reply Last reply
          0
          • zer0unplanned@friendica.rogueproject.orgZ zer0unplanned@friendica.rogueproject.org
            @n_dimension @kkarhan @Nonya_Bidniss there are scripts that nuke the whole OS and Kernel and DD, just 1 script to run on the pc .
            Mr Robot used the chip for a microwave and pierced a hole in the HDD, in the movie whoami they used acid indeed with a mask on.
            But just 1 script and you can overwrite the hdd or SDD or/and nuke the whole OS> I wish them good luck with that recovering anything.
            n_dimension@infosec.exchangeN This user is from outside of this forum
            n_dimension@infosec.exchangeN This user is from outside of this forum
            n_dimension@infosec.exchange
            wrote last edited by
            #25

            @zer0unplanned @kkarhan @Nonya_Bidniss

            Problem with SSD "overwrite" is SSDs balance the writes.
            So if your file is in A D J, SSD MAY balance the write to B E K to balance the cells.

            On the upside, SSD has one addressable cell, not a fuzzy magnetic dust.

            zer0unplanned@friendica.rogueproject.orgZ 1 Reply Last reply
            1
            0
            • n_dimension@infosec.exchangeN n_dimension@infosec.exchange

              @zer0unplanned @kkarhan @Nonya_Bidniss

              Problem with SSD "overwrite" is SSDs balance the writes.
              So if your file is in A D J, SSD MAY balance the write to B E K to balance the cells.

              On the upside, SSD has one addressable cell, not a fuzzy magnetic dust.

              zer0unplanned@friendica.rogueproject.orgZ This user is from outside of this forum
              zer0unplanned@friendica.rogueproject.orgZ This user is from outside of this forum
              zer0unplanned@friendica.rogueproject.org
              wrote last edited by
              #26
              @n_dimension @kkarhan @Nonya_Bidniss So my HDD overwrite are useless on SSD?
              1 Reply Last reply
              1
              0
              Reply
              • Reply as topic
              Log in to reply
              • Oldest to Newest
              • Newest to Oldest
              • Most Votes


              • Login

              • Login or register to search.
              • First post
                Last post
              0
              • Categories
              • Recent
              • Tags
              • Popular
              • World
              • Users
              • Groups