1996-12-02 - Re: Secure Memory Deletion

Header Data

From: The Deviant <deviant@pooh-corner.com>
To: Mark Rosen <mrosen@peganet.com>
Message Hash: 25d1c8a614a716dc63f4b401e917bfc8c8832e5f2add674acc450cfdb7a80ec3
Message ID: <Pine.LNX.3.94.961202020640.703A-100000@random.sp.org>
Reply To: <199612012354.SAA13950@mercury.peganet.com>
UTC Datetime: 1996-12-02 02:10:26 UTC
Raw Date: Sun, 1 Dec 1996 18:10:26 -0800 (PST)

Raw message

From: The Deviant <deviant@pooh-corner.com>
Date: Sun, 1 Dec 1996 18:10:26 -0800 (PST)
To: Mark Rosen <mrosen@peganet.com>
Subject: Re: Secure Memory Deletion
In-Reply-To: <199612012354.SAA13950@mercury.peganet.com>
Message-ID: <Pine.LNX.3.94.961202020640.703A-100000@random.sp.org>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On Sun, 1 Dec 1996, Mark Rosen wrote:

> 	Does anyone know any papers on secure deletion of things from memory? That
> is one thing that most people are oblivious to, though, if a program leaves
> your unencrypted passkey laying in memory or a buffer of your plaintext,
> then all the encryption in the world won't help. Should I overwrite the 32
> times specified for hard drives, or are RAM chips easier to clear? Thanks.

1 time _should_ work for RAM chips, AFAIK.

 --Deviant
   PGP KeyID = E820F015 Fingerprint = 3D6AAB628E3DFAA9 F7D35736ABC56D39

Live long and prosper.
                -- Spock, "Amok Time", stardate 3372.7


-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQEVAwUBMqI5wzCdEh3oIPAVAQGE5wf7BbOXQv13u/JS/nByogiN7ukaoiejZdyl
1Mq+Dxpe6mJvUPR72n5ygeQ8kKMP9nV5s6A9dm32qXDIYE/uzrEt+RLZbxtt0eMV
1uwxjVcxJdBvMgeFhxvblT1AhDNdvBHO3ELgPnU3T+DnUJOTPCb/ychsQ98YdYPQ
gp0/nyJK9kCQPRPjZNvR8qP3RV9xd03KMBjwMJIfNw+RDfTtlQEEjhD9P6zSt4ky
spPL4ccKrM8mGS67g5mLW14V+mbn4qM3gmfS6f6VbkP0DovAIBxCzDbBACvkexOy
SRPCvvxL/2XiZ6NkGy844LFhJqlMMQWEUF+YrQykgBS9ST5uePquew==
=GGrT
-----END PGP SIGNATURE-----






Thread