RIAA wins again

OT: anything goes!

Moderator: Edi

User avatar
Mr Bean
Lord of Irony
Posts: 22466
Joined: 2002-07-04 08:36am

Post by Mr Bean »

Nope, sorry, doesn't work. They can scan the hard drive with an electron microscope. Besides random data is better,since you can amplify the residual signals from the HD. Of course all this costs tens to hundreds of thousands of dollars. Besides you don't have time to do this if they break into your house. Oh and instead of only nuking the HDD, nuke the entire computer for extra protection. I think AES encryption with large keys is secure enough though.
I see.... So your telling me on the off chance the RIAA gets an electron scanning Microscope and then compares a couple million bits togther, heck in a few weeks they might find a fully intact song!


Remeber they can't take 4/5s of a Song and sue me for it, They most find all those pretty Music files first before they can sue me(And considering the nessary anaylis time on a ES Microspe thats a three to five month job...)

"A cult is a religion with no political power." -Tom Wolfe
Pardon me for sounding like a dick, but I'm playing the tiniest violin in the world right now-Dalton
User avatar
Admiral Valdemar
Outside Context Problem
Posts: 31572
Joined: 2002-07-04 07:17pm
Location: UK

Post by Admiral Valdemar »

HemlockGrey wrote:Why do I feel like I'm about to be living in the movie 'Rollerball'?
I think another film based on a certain Orwell book is more apt an analogy.

Fire is the best eraser of data if you REALLY need to. Like to see an EM scan ashes and find anything.
User avatar
Pu-239
Sith Marauder
Posts: 4727
Joined: 2002-10-21 08:44am
Location: Fake Virginia

Post by Pu-239 »

Mr Bean wrote:
Nope, sorry, doesn't work. They can scan the hard drive with an electron microscope. Besides random data is better,since you can amplify the residual signals from the HD. Of course all this costs tens to hundreds of thousands of dollars. Besides you don't have time to do this if they break into your house. Oh and instead of only nuking the HDD, nuke the entire computer for extra protection. I think AES encryption with large keys is secure enough though.
I see.... So your telling me on the off chance the RIAA gets an electron scanning Microscope and then compares a couple million bits togther, heck in a few weeks they might find a fully intact song!


Remeber they can't take 4/5s of a Song and sue me for it, They most find all those pretty Music files first before they can sue me(And considering the nessary anaylis time on a ES Microspe thats a three to five month job...)
They probably don't even need the ES microscope, if the HDD is merely zeroed rather than written with random data, they can just analyze the signals comeing off the HDD heads and amplify it. That is why random data is best. Do that repeatedly while the hard drive is cold booted and again after it has been running for a while to make sure you get everything.

Also, remember that zeroing the HDD takes time, in case they break into your house. Destroying a floppy with the encryption key is fast- a CDR is faster. Microwave the CD for about 3 seconds or rip apart the floppy and burn the media. (Does dipping a floppy in water and microwaving work too?) This isn't too secure though, but useful if you do not have prior warning, and do not want to attach thermite to the HDD. :wink:

From http://www.sans.org/rr/incident/deletion.php
Securely Deleting Files

It has been established that deleted files can be recovered. Is it possible to delete a file (and its associated files, temporary, spooler, etc.) so that it cannot be recovered? There are rumors that government agencies have the capabilities to recover data that has been overwritten as many as 21 times. From a corporate perspective, an individual will have to determine the value of his data and determine the steps that can be considered "reasonable and practical" to prevent proprietary data from being stolen or recovered by competitors or groups intent on corporate espionage. The main premise for preventing data from being recovered is to overwrite it. The question becomes how many times should it be overwritten? There are individuals that believe that overwriting data only one time is sufficient to prevent the recovery of deleted files. However, the more the data is overwritten, the less likely it becomes recoverable by any means. For a drive currently in use, it is necessary to overwrite slack space and unallocated space. There are a variety of tools available to perform this task (some of which will be described later). These tools use one of three overwrite methods:

Single Pass – data area is overwritten once with either 1’s, 0’s or pseudorandom data

DoD Method – the data area is overwritten with 0’s, then 1’s and then once with psuedorandom data. Many tools use variations of this, overwriting as many as seven times, using three alternating passes of 0’s and 1’s following by one pass of psuedorandom data. This is based on standards outlined in the Department of Defense Manual 5220.22 M, also known as the National Industrial Security Program Operating Manual or NISPOM. This manual outlines the steps to both "clear" and "sanitize" a "rigid non-removable disk". To clear a disk it states that you must "overwrite all addressable locations with a single character." To "sanitize" a disk you must do one of the following:

* Degauss with a Type I degausser (degaussing exposes the drive to an electromagnetic field)
* Degauss with a Type II degausser
* Overwrite all addressable locations with a character, its complement, then a random character and verify. THIS METHOD IS NOT APPROVED FOR SANITIZING MEDIA THAT CONTAINS TOP SECRET INFORMATION.
* Destroy - Disintegrate, incinerate, pulverize, shred, or smelt.2

Guttman Method – the data area is overwritten 35 times. This method uses psuedorandom data to overwrite the drive and overwrites the drive taking into account the different encoding algorithms used by various hard drive manufacturers, RLL (run length limited), MFM (modified frequency modulation), PRML (partial-response, maximum-likelihood). This method of overwriting data was created by Peter Guttman, and is described in his paper, "Secure Deletion of Data from Magnetic and Solid State Memory."

It is important to note that the consensus is that overwriting the data only reduces the likelihood of data being recovered. The more times data is overwritten, the more expensive and time consuming it becomes to recover the data. In fact Peter Guttman states "…it is effectively impossible to sanitise storage locations by simple overwriting them, no matter how many overwrite passes are made or what data patterns are written."3 Overwritten data can be recovered using magnetic force microscopy, which deals with imaging magnetization patterns on the platters of the hard disk. The actual details of how this is accomplished are beyond the scope of this paper.
Heres a program for wiping: http://www.tolvanen.com/eraser/


Of course you are right Mr. Bean, the RIAA isn't going to spend thousands and thousands of dollars when they can get someone else to make an example of. Still, paranoia is good.

ah.....the path to happiness is revision of dreams and not fulfillment... -SWPIGWANG
Sufficient Googling is indistinguishable from knowledge -somebody
Anything worth the cost of a missile, which can be located on the battlefield, will be shot at with missiles. If the US military is involved, then things, which are not worth the cost if a missile will also be shot at with missiles. -Sea Skimmer


George Bush makes freedom sound like a giant robot that breaks down a lot. -Darth Raptor
User avatar
Pu-239
Sith Marauder
Posts: 4727
Joined: 2002-10-21 08:44am
Location: Fake Virginia

Post by Pu-239 »

Slagging the HDD isn't too good either since it will obviously be suspicious. The encryption method is easy since you can delete the loopback file, zero it (since it already appears random) and it will appear as random noise. Of course if you are someone who downloads gigs of stuff, just delete it since you don't have time for zeroing. They aren't going to crack AES anytime soon.

ah.....the path to happiness is revision of dreams and not fulfillment... -SWPIGWANG
Sufficient Googling is indistinguishable from knowledge -somebody
Anything worth the cost of a missile, which can be located on the battlefield, will be shot at with missiles. If the US military is involved, then things, which are not worth the cost if a missile will also be shot at with missiles. -Sea Skimmer


George Bush makes freedom sound like a giant robot that breaks down a lot. -Darth Raptor
User avatar
Admiral Valdemar
Outside Context Problem
Posts: 31572
Joined: 2002-07-04 07:17pm
Location: UK

Post by Admiral Valdemar »

Pu-239 wrote:Slagging the HDD isn't too good either since it will obviously be suspicious. The encryption method is easy since you can delete the loopback file, zero it (since it already appears random) and it will appear as random noise. Of course if you are someone who downloads gigs of stuff, just delete it since you don't have time for zeroing. They aren't going to crack AES anytime soon.
Would Blowfish do as well? Last I heard the NSA weren't too happy about 128-bit encryption, nevermind near 500-bits.

But then the NSA can't touch me here... GCHQ however...
User avatar
SirNitram
Rest in Peace, Black Mage
Posts: 28367
Joined: 2002-07-03 04:48pm
Location: Somewhere between nowhere and everywhere

Post by SirNitram »

BEHOLD THE POWER OF ACTUAL MATH!

Average KaZaA users per day(Taken from my copy of it, probably off): ~4 million people.

Sales last year for RIAA: 14.6 Billion. Sometimes reported as 14.3 Billion.

Cost of average CD: 16 bucks.

Net loss if every KaZaA user(Even my friend Bob who only downloads non copyrighted music, and of course the thousands who are there for the porn) caused one CD sale to be lost this year: ~60 million dollars US.

Or .6% of their annual net.
Manic Progressive: A liberal who violently swings from anger at politicos to despondency over them.

Out Of Context theatre: Ron Paul has repeatedly said he's not a racist. - Destructinator XIII on why Ron Paul isn't racist.

Shadowy Overlord - BMs/Black Mage Monkey - BOTM/Jetfire - Cybertron's Finest/General Miscreant/ASVS/Supermoderator Emeritus

Debator Classification: Trollhunter
Post Reply