Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Sat, 23 Nov 2002 10:54:14 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Sat, 23 Nov 2002 10:54:14 -0500 Received: from hq.pm.waw.pl ([195.116.170.10]:21469 "EHLO hq.pm.waw.pl") by vger.kernel.org with ESMTP id ; Sat, 23 Nov 2002 10:54:14 -0500 To: Subject: Re: Where is ext2/3 secure delete ("s") attribute? References: <200211220122.gAM1MQY305783@saturn.cs.uml.edu> From: Krzysztof Halasa Date: 22 Nov 2002 22:31:06 +0100 In-Reply-To: <200211220122.gAM1MQY305783@saturn.cs.uml.edu> Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 854 Lines: 16 "Albert D. Cahalan" writes: > Forget the shred program. It's less useful than having the > filesystem simply zero the blocks, because it's slow and you > can't be sure to hit the OS-visible blocks. Aside from encryption, > the useful options are: > > 1. plain old rm (protect from users) > 2. filesystem clears the blocks (protect from root/kernel) It won't protect you from the root. If you need protection from root, be a root on your own machine. And be sure your unencrypted data, keys etc. never make it to/through any hostile system. -- Krzysztof Halasa Network Administrator - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/