> There's a very good paper on the subject given at a Usenix Security
> Symposium, I think 2 years ago. It showed exactly how much
> information you could glean off of a magnetic disk platter using an
> electron microscope to read out the old magnetic domains. It was
> absolutely spooky --- he was able to read data that had been
> written several write generations beforehand.
Sounds like Peters paper;
http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
This paper was first published in the Sixth USENIX Security Symposium
Proceedings, San Jose, California, July 22-25, 1996
Abstract
With the use of increasingly sophisticated encryption systems, an
attacker wishing to gain access to sensitive data is forced to look
elsewhere for information. One avenue of attack is the recovery of
supposedly erased data from magnetic media or random-access memory.
This paper covers some of the methods available to recover erased data
and presents schemes to make this recovery significantly more
difficult.
-cw
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/