Chuck is right, disks are no longer simple nor directly controlled.

There is also the issue of incomplete erasures.  Even if you could  
wipe every sector, a slight ghost image remains.  That's why many  
tools offer to rewrite each sector multiple times.  But even that  
assumes it can move over the magnetic media in exactly the same  
position - physical media will always be impefect.

In general, computers are very leaky with information, and full of  
security holes.  When you toss in google, verizon, facebook, and  
persistent flash cookies, privacy and security become hard to find.

It will be interesting to see how society adapts.

Jeremy



Sent from my iPod.
...because my other device is a BB Storm.


On Sep 30, 2010, at 4:35 AM, "Chuck Cole" <cncole at earthlink.net> wrote:

> Disk drives are surprisingly complex embedded processor subsystems  
> that have
> error management, track and sector coding, and disagnostics, etc,  
> that are
> outside "normal" access (and have layered complexities).  Drives  
> have not
> been totally transparent to outside data access for many years.   
> Logical
> access is all we get, per specs.  How the "low ;evel accesses" are  
> done and
> how much space or control may be feasible differs by manufacturer.   
> Once
> upon a time, one could get extra performance by using application- 
> specific
> sectoring, interleave, etc.  However, the need for, and impact of,  
> error
> management (mapping, coding, etc) killed the advanges and  
> feasibility of
> customized interlacing, etc, as disk capacity grew larger and larger.
> Hidden stuff exists, but it's unlikely to be significant capacity for
> criminal uses, and the low-level coding can provide some forensic  
> access for
> specialists that have manufacturers' support.  This is an incredibly  
> boring
> topic (and likely a non-productive one) to pursue.
>
>
> Chuck
>
>
>> -----Original Message-----
>> From: tclug-list-bounces at mn-linux.org
>> [mailto:tclug-list-bounces at mn-linux.org]On Behalf Of Jason Hsu,  
>> embedded
>> engineer, Linux user
>> Sent: Thursday, September 30, 2010 12:34 AM
>> To: tclug-list at mn-linux.org
>> Subject: [tclug-list] Hidden hard drive partitions
>>
>>
>> I've heard that some hard drives contain hidden partitions that
>> Darik's Boot And Nuke cannot erase.  Supposedly, law enforcement
>> requires manufacturers to include the hidden partition so that
>> the criminals cannot erase their tracks.  Only law enforcement
>> has the special software needed to access the hidden partition.
>>
>> Is this true?  I find this difficult to believe.  I don't think
>> this setup would work.  I can't imagine how law enforcement could
>> prevent such a tool from falling into the wrong hands, as it
>> would only require one rogue cop to give the software to the
>> criminals.  Given this, the criminals would be able to access
>> passwords, credit card information, etc. from all hard drives,
>> even those erased with Darik's Boot And Nuke.
>>
>> Is this just an urban legend?
>>
>> --
>> Jason Hsu, Linux-literate embedded engineer
>
>
> _______________________________________________
> TCLUG Mailing List - Minneapolis/St. Paul, Minnesota
> tclug-list at mn-linux.org
> http://mailman.mn-linux.org/mailman/listinfo/tclug-list