On 6/24/20 01:47, grarpamp wrote:
https://www.howtogeek.com/675784/can-law-enforcement-really-recover-files-yo...
Bleachbit, shred (from GNU coreutils), and zerofree
Critical data doesn't have time in situations to fuck around with that wiping bullshit. You need a strong crypto filesystem when powered down, and when up, a keyboard combo rigged to blacken keys and reboot. Then cron/keyboard run whatever wiping tools inside that regularly.
If you can spare the extra overhead to run a crypto filesystem, yes, do
that. (On systems as old as my current laptop, it's barely a workable
option, and I did notice better performance when I went back to an
unencrypted filesystem. Then again, my threat model was strictly
protecting against my laptop getting stolen when out and about, less of
a concern now especially with the COVID-19 pandemic limiting the need to
take it out of the hose.) However it still can't hurt to wipe deleted
files and free space as a matter of routine privacy protection.
However, do be aware of things like encrypted filesystems complicating
data recovery in the event of software/hardware failure. Sure, maybe the
cops can't get your data, but it can bite you in the ass when Shit
Happens(tm) and as a result *you* can't get your data either.
--
Shawn K. Quinn