From: The Deviant <deviant@pooh-corner.com>
To: Mark Rosen <mrosen@peganet.com>
Message Hash: 25d1c8a614a716dc63f4b401e917bfc8c8832e5f2add674acc450cfdb7a80ec3
Message ID: <Pine.LNX.3.94.961202020640.703A-100000@random.sp.org>
Reply To: <199612012354.SAA13950@mercury.peganet.com>
UTC Datetime: 1996-12-02 02:10:26 UTC
Raw Date: Sun, 1 Dec 1996 18:10:26 -0800 (PST)
From: The Deviant <deviant@pooh-corner.com>
Date: Sun, 1 Dec 1996 18:10:26 -0800 (PST)
To: Mark Rosen <mrosen@peganet.com>
Subject: Re: Secure Memory Deletion
In-Reply-To: <199612012354.SAA13950@mercury.peganet.com>
Message-ID: <Pine.LNX.3.94.961202020640.703A-100000@random.sp.org>
MIME-Version: 1.0
Content-Type: text/plain
-----BEGIN PGP SIGNED MESSAGE-----
On Sun, 1 Dec 1996, Mark Rosen wrote:
> Does anyone know any papers on secure deletion of things from memory? That
> is one thing that most people are oblivious to, though, if a program leaves
> your unencrypted passkey laying in memory or a buffer of your plaintext,
> then all the encryption in the world won't help. Should I overwrite the 32
> times specified for hard drives, or are RAM chips easier to clear? Thanks.
1 time _should_ work for RAM chips, AFAIK.
--Deviant
PGP KeyID = E820F015 Fingerprint = 3D6AAB628E3DFAA9 F7D35736ABC56D39
Live long and prosper.
-- Spock, "Amok Time", stardate 3372.7
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQEVAwUBMqI5wzCdEh3oIPAVAQGE5wf7BbOXQv13u/JS/nByogiN7ukaoiejZdyl
1Mq+Dxpe6mJvUPR72n5ygeQ8kKMP9nV5s6A9dm32qXDIYE/uzrEt+RLZbxtt0eMV
1uwxjVcxJdBvMgeFhxvblT1AhDNdvBHO3ELgPnU3T+DnUJOTPCb/ychsQ98YdYPQ
gp0/nyJK9kCQPRPjZNvR8qP3RV9xd03KMBjwMJIfNw+RDfTtlQEEjhD9P6zSt4ky
spPL4ccKrM8mGS67g5mLW14V+mbn4qM3gmfS6f6VbkP0DovAIBxCzDbBACvkexOy
SRPCvvxL/2XiZ6NkGy844LFhJqlMMQWEUF+YrQykgBS9ST5uePquew==
=GGrT
-----END PGP SIGNATURE-----
Return to December 1996
Return to “The Deviant <deviant@pooh-corner.com>”