Data Destruction: Difference between revisions
Line 6: | Line 6: | ||
=Risks of having data stolen= | =Risks of having data stolen= | ||
#Identity theft | |||
#Monetary loss | |||
#Public embarrassment | |||
#Criminal prosecution | |||
=How to protect your data while in use via encryption= | =How to protect your data while in use via encryption= | ||
=What to do before handing your hard drive to a recycler= | =What to do before handing your hard drive to a recycler= |
Revision as of 12:39, 1 May 2013
How is data stored on computers
When you turn a computer off, it forgets everything that's not written down. Computers write to a "storage device" or "block device". This can be a hard disk, and SSD, flash memory, even a floppy disk. The data is stored in a logical organization scheme called a Filesystem. Writing a new filesystem to the device or medium makes the old data inaccessible- but the old data is still there, and a determined person can find it.
We want to get rid of this old data, and that means writing new data over it, or *overwriting* as it's called. The old data needs to be overwritten several times with a pattern of high Shannon entropy on order to best obscure the old data.
Risks of having data stolen
- Identity theft
- Monetary loss
- Public embarrassment
- Criminal prosecution
How to protect your data while in use via encryption
What to do before handing your hard drive to a recycler
(e.g., you've upgraded to a new hard drive or have donated your old computer).