1 |
On 1/31/06, Iain Buchanan <iaindb@××××××××××××.au> wrote: |
2 |
> If you "shred" or "wipe" the data (run random data over the disk many |
3 |
> times, with a bit of magic formulas thrown in) then apparently the FBI / |
4 |
> CIA / KGB / WTFC has a magnetic data recovery tool to see what bit was |
5 |
> written before the current bit (don't ask me how). |
6 |
|
7 |
It works because hard disks are still analog recording devices. The |
8 |
magnetic field used to write the data extends slightly outwards on |
9 |
either side of the track, and thus can record data (although with a |
10 |
much lower S/N ratio) in the space between tracks. If you have the |
11 |
right hardware that can be convinced to read the area between tracks, |
12 |
you have a chance of recovering the data. |
13 |
|
14 |
In fact in recent years manufacturers have nearly reached the limit on |
15 |
how tightly tracks can be squeezed together before they start |
16 |
overwriting each other. This is why laptop drives maxed out at 120G, |
17 |
until Seagate started using 'perpindicular recording'. |
18 |
|
19 |
Since there is so little spacing between the tracks now, I suspect |
20 |
(but can't say for certain) that the chances of recovering data from a |
21 |
modern large (>160G) drive that has been 'shred'ed is pretty much |
22 |
nil, regardless of the amount of money you through at it. |
23 |
|
24 |
-Richard |
25 |
|
26 |
-- |
27 |
gentoo-user@g.o mailing list |