A question for our more PC savvy tech gurus on the forum:

Discussion in 'Gaming and Technology' started by Man Against Time, Sep 8, 2016.

  1. Man Against Time Black Hole Melchizedek

    Member Since:
    Aug 20, 2010
    Message Count:
    8,044
    Location:
    The wrong side of the tracks.
    Reputation:
    81,300,405
    Ratings Received:
    +8,456 / 121 / -270
    I figure with all of the free advertising that they're getting in the American media right now that I may as well ask: is BleachBit really all that? Can it hard delete data to the point where it's not recoverable on a hard drive even if it's in the hands of, say, law enforcement?
  2. Medium Dave Bar Regular

    Member Since:
    Mar 10, 2016
    Message Count:
    162
    Reputation:
    917,673
    Ratings Received:
    +212 / 23 / -62
    Yes it should be unrecoverable. Boot and Nuke was iirc. I think they write random bits 3 times over the device. It's not going to leave any trace of even a single bit, let alone a character.

    Edit: wait sorry, ur deleting files in the system? I'm not sure about that. You get temp files and stuff.
    Latest Given Reputation Points:
    VisKnut: -24,469 Points Sep 8, 2016
    Neil Pye: -12,761 Points (^^ Knows all about deleting illegal files an' sheet) Sep 11, 2016
    • Gay Post Gay Post x 2
    • Like Like x 1
    • List
  3. Man Against Time Black Hole Melchizedek

    Member Since:
    Aug 20, 2010
    Message Count:
    8,044
    Location:
    The wrong side of the tracks.
    Reputation:
    81,300,405
    Ratings Received:
    +8,456 / 121 / -270
    I'm not deleting anything. I'm just curious for educational purposes and my own paranoiac "what-if" scenarios.

    You never know when you're going to have to pull your own Hillary Clinton maneuver.
  4. Johnson demented lumberjack

    Member Since:
    Apr 20, 2010
    Message Count:
    10,474
    Location:
    shit abyss
    Reputation:
    194,251,442
    Ratings Received:
    +14,297 / 200 / -310
    The safest bet is to assume the FBI is 3 steps ahead of any commercial software developer. There is no such thing as total privacy, total security, or totally irretrievable data in the "cloud" era. Consider the fappening: individual iPhones weren't hacked- Apple cloud storage was. Personal data doesn't mean shit anymore.
    • Agree Agree x 1
    • Informative Informative x 1
    • List
  5. Medium Dave Bar Regular

    Member Since:
    Mar 10, 2016
    Message Count:
    162
    Reputation:
    917,673
    Ratings Received:
    +212 / 23 / -62
    [IMG]
    Latest Given Reputation Points:
    VisKnut: -24,469 Points Sep 8, 2016
    Neil Pye: -12,761 Points (Still rocking a disk drive like it's 1998 again, eh faggot?) Sep 11, 2016
  6. Medium Dave Bar Regular

    Member Since:
    Mar 10, 2016
    Message Count:
    162
    Reputation:
    917,673
    Ratings Received:
    +212 / 23 / -62
    https://www.bleachbit.org/forum/it-...le-all-files-after-clean-free-space-bleachbit

    The short answer is yes, it may be possible to use software methods to recover data from a storage device (hard drive or solid state) after the data has been deleted using standard methods (no overwrite) and the drive has been cleaned with the wipe-free-disk-space option. If anything can be recovered, most likely some bits of the data may be recovered from the slack space or swap file. On the other hand, this is difficult for "mere mortals" to do because the file allocation table (which tells where the file was) has been wiped and because the remaining pieces are probably small (especially in slack space). Also, if the original file was large (like a photograph or modern word processor document), the recovered data would probably not find large enough piece to be useful (depends on the type of file, though).

    Depending on the specifics of the situation, there may be special recovery methods possible. For example, if you delete web browser history, then it can be possibly reconstructed from the Internet (from web server logs, government spying programs, etc).

    Overwriting free disk space can be used on USB and SSD drives too, though the technology is new and evolving (compared to hard drives), so not as much research has been done on the effectiveness. (SSD are not "hard" except for hybrids, by the way). For now unless you are like Osama Bin Laden, you can generally assume that SSD and USB drives are like hard drives.

    The best software method to wipe a primary drive (the drive that has the operating system) is to use DBAN with a single pass and with the option to wipe remapped sectors: this should make it 100% impossible to recover the data. You may want to read the documentation "Shred files and wipe disks". There are various steps you can follow to get you close to 100%.

    ---
    Andrew, lead developer
    Latest Given Reputation Points:
    VisKnut: -24,469 Points Sep 8, 2016
    Neil Pye: -12,761 Points (Faggot.) Sep 11, 2016
  7. Medium Dave Bar Regular

    Member Since:
    Mar 10, 2016
    Message Count:
    162
    Reputation:
    917,673
    Ratings Received:
    +212 / 23 / -62
    I'm not sure they can break the encryption between secure servers.
    Latest Given Reputation Points:
    VisKnut: -24,469 Points Sep 8, 2016
    Neil Pye: -12,761 Points Sep 11, 2016
  8. billy_boatrocker Wartime Consigliere

    Member Since:
    Apr 26, 2010
    Message Count:
    2,918
    Location:
    Portland, Oregon
    Reputation:
    44,165,444
    Ratings Received:
    +3,395 / 10 / -13
  9. Mandalore in recovery from sobriety

    Member Since:
    Apr 20, 2010
    Message Count:
    2,900
    Reputation:
    71,052,082
    Ratings Received:
    +4,858 / 35 / -83
    Funny how Mikey knows so much about wiping hard drives and how much data they can recover from deleted photos. But not surprising given that he fits the profile of a child molester almost perfectly. Creepy, unmarried and perpetually single, no normal human interactions... oh yeah; and he's publicly talked about raping children on numerous occasions. And then there's the mysterious circumstances that led to Mike somehow winding up back home under the vigilant eye of mom and pop after needing to suddenly leave China and Korea after working with young kids.

    Mike Coombs is involved in pedophilia and child pornography without much of a doubt.
    Latest Given Reputation Points:
    Neil Pye: 12,761 Points (Human trafficking as well.) Sep 11, 2016
  10. Medium Dave Bar Regular

    Member Since:
    Mar 10, 2016
    Message Count:
    162
    Reputation:
    917,673
    Ratings Received:
    +212 / 23 / -62

    cool story bro
    Latest Given Reputation Points:
    Neil Pye: -12,761 Points (You know it's the truth.) Sep 11, 2016
  11. Angroid CyberSperg 1138

    Member Since:
    Sep 4, 2012
    Message Count:
    5,414
    Location:
    EUSSR
    Reputation:
    76,711,945
    Ratings Received:
    +7,691 / 28 / -45

    Bleachbit may be reasonably effective but things are never that simple in IT land.

    Your IT experience comprises a multitude of devices and technologies, any of which - if not carefully considered and taken into account, can fuck your ass raw.


    Groid's Cardinal Rule #1 - If it needs to stay secret, never ever commit it to a computer or a phone or any kind of communications device.


    Every attempt to rectify heresy against Rule #1 is just trying to put a Band-Aid on a Machete gash after-the-fact. You may or may not get away with it and your mileage may vary, but really, it's not going to be a sure thing because of the many factors involved, any of which could have tripped you up.


    Having said all that, there are ways to *POTENTIALLY REDUCE* your chances of getting done but again I must stress that this is going to be a knee-jerk reaction and possibly too late already:


    #1 - Don't use any Apple Computer.


    #2 - Don't use any Windows Computer.


    #3 - Don't use any kind of mobile operating system from Apple, Microsoft or Google (Android), meaning their smartphones or devices which run their Smartphone OS's.


    #4 - That limits one's realistic choices to variants of Linux and the BSD's, some of which will be more secure than others.


    #5 - Your choice of computing hardware also plays a role. For example, more recent versions of Intel based (and 99.9% probably AMD as well) have un-announced and little known about "remote management" hardware baked straight into the chipsets / CPU's, meaning that the fucking Corporations (Intel / AMD) and the Feds can probably p@wn your computer despite whatever Operating System you thought was keeping you "safe". Basically, because the tapping is done at the hardware layer you have no fucking chance. I'm not making any of this up. Go read for yourselves on the Intel Management Engine.

    http://www.techrepublic.com/article/is-the-intel-management-engine-a-backdoor/
    https://boingboing.net/2016/06/15/intel-x86-processors-ship-with.html


    Storage devices also play a role. Shredding files (overwriting them with mumbo-jumbo) on USB sticks and SSD drives before deleting them may not work as effectively as when they were stored on hard drives, due to the way wear levelling on SSD's and USB sticks works.

    More dangers lurk in system pagefiles and hibernation files, which may or may not have picked up copies of whatever it was you were trying to destroy along the way.

    The only sure way to destroy electronically stored files with 100% certainty is to drill holes through the platters on a harddrive or to smash the chips of a USB or SSD drive with a hammer.

    The next best effort entails using something like DBAN (Darik's Boot & Nuke) as Mikev / Medium Dave mentioned and to completely wipe the drive. Keep in mind that DBAN will be less effective against SSD drives and USB sticks than it is against mechanical harddrives. You may need to perform more passes against SSD's and USB sticks to increase your chances of having wiped sensitive files.

    The third (and less certain) method is the shredding & deleting option via programs like Bleachbit and similar.

    Just keep in mind that the computer you're using is probably already backdoored in hardware. If you store files in the cloud or "sync to the cloud", you're probably fucked long ago already. It is an idiotic practice to store data with 3d parties, even if you think it's "encrypted".

    The way most people typically use encryption isn't really secure and it's a waste of time. It may be good enough to defeat amateur adversaries but not the well-funded and well-resourced pros who'll use workarounds to defeat it.

    Something like a barebones Raspberry Pi minicomputer running Linux or BSD may be a much more secure device than any mainstream PC or Laptop, because it won't have the Corporate / Fed backdoors baked into the hardware.
    Latest Given Reputation Points:
    Man Against Time: 68,319 Points Oct 9, 2016
    Prima Morte: 31,919 Points Nov 4, 2016
    • Post of the Day Post of the Day x 2
    • List
  12. Dirty Sanchez No Limit Nigga

    Member Since:
    Oct 16, 2016
    Message Count:
    55
    Reputation:
    2,549,735
    Ratings Received:
    +121 / 0 / -1
    You don't need bleachbit if you run Linux or BSD. You can use the dd command to overwrite the drive as many times as you want. The dd command is the most useful and potentially destructive command in all of computing.

    This is very much worth remembering. Data has a way of migrating to places that you don't expect it to.

    Some people with "always on" computers or devices get burned because some of their data still resides in ram even though they have wiped their drives. There are tools to extract all of the data contained in ram.
  13. Bluto Drunken lout

    Member Since:
    Apr 22, 2010
    Message Count:
    12,234
    Reputation:
    192,718,959
    Ratings Received:
    +15,953 / 64 / -166
    [IMG]

Share This Page