Data Destruction: Difference between revisions

From Free Geek Seattle
Line 6: Line 6:


=Risks of having data stolen=
=Risks of having data stolen=
#Identity theft
#Monetary loss
#Public embarrassment
#Criminal prosecution
=How to protect your data while in use via encryption=
=How to protect your data while in use via encryption=
=What to do before handing your hard drive to a recycler=
=What to do before handing your hard drive to a recycler=

Revision as of 12:39, 1 May 2013

How is data stored on computers

When you turn a computer off, it forgets everything that's not written down. Computers write to a "storage device" or "block device". This can be a hard disk, and SSD, flash memory, even a floppy disk. The data is stored in a logical organization scheme called a Filesystem. Writing a new filesystem to the device or medium makes the old data inaccessible- but the old data is still there, and a determined person can find it.

We want to get rid of this old data, and that means writing new data over it, or *overwriting* as it's called. The old data needs to be overwritten several times with a pattern of high Shannon entropy on order to best obscure the old data.

Risks of having data stolen

  1. Identity theft
  2. Monetary loss
  3. Public embarrassment
  4. Criminal prosecution

How to protect your data while in use via encryption

What to do before handing your hard drive to a recycler

(e.g., you've upgraded to a new hard drive or have donated your old computer).