Destroying a hard drive

Tom Buskey tom at buskey.name
Wed Jul 11 12:17:15 EDT 2007


On 7/11/07, Jerry Feldman <gaf at blu.org> wrote:
>
> On Wed, 11 Jul 2007 11:46:39 -0400
> "Ben Scott" <dragonhawk at gmail.com> wrote:
>
> >  FWIW, that is not considered sufficient for media containing
> > classified information.  The NSA doesn't tell us why, but presumably
> > they have their reasons.  Of course, your enemies are likely less
> > motivated.  If it was my own personal data, I'd be quite happy with
> > that.


I think we melt them.  I know paper gets burned.  We just give it to
security & they follow DSS procedures.


The key is the information on the drive. If you have personal data on
> the drive, simply degaussing, or possibly just shearing the platters
> would make the data recovery expensive enough not to be worth trying to
> recover, but if the information was very valuable, such as account
> numbers/passwords for high value accounts, or national security, it
> would be very important to do some very complete erasure and
> destruction.


That's the key.  You want to make the cost of recovery more expensive then
the worth of the data to whoever might get the drive.  For my personal data,
I'd be comfortable with Darryl's Boot and Nuke.  That will keep the casual
user w/o an electron microscope out IMHO.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mail.gnhlug.org/mailman/private/gnhlug-discuss/attachments/20070711/3b101c70/attachment.html 


More information about the gnhlug-discuss mailing list