Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

How to explode a hard drive

Name: Anonymous 2006-02-21 18:00

I know this isn't strictly tech, but I felt it's the best place for it.

People talk (on 4chan and such places) of raids by the police on their house to recover hard drives due to suspicions of CP or of pirated content.
I was wondering if anyone knew of a case where someone actually managed to destroy their Hard Drive, either remotley or before anyone could get to it, or any stories of the sort.
Could it hypothetically be fitted with some sort of... remote water filling thing?
Post anything relevant please.

Name: Anonymous 2007-12-18 8:29

>>159
And why the fuck would it need to work under ext3 if rm overwrites it with 0s? Learn to use cognitive reasoning.

Name: Anonymous 2007-12-18 20:28

>>161
rm doesn't overwrite with 0s in two out of the three settings, faggot.

Name: Anonymous 2007-12-18 21:37

They will always give you fair warning that they are coming. Just stick the HDD in the microwave for a little then take out the disks, scratch them. And then bend the hell outta them COLON DEE. NO WON WILL RECAWVER DATA FRUM THAT!

Name: Anonymous 2007-12-19 2:33

wouldn't the best be to write it all over with 1's instead of 0's?

I heard that the big data recovery labs doesn't read the tracks on the disk itself, but actually the space between the tracks, because when you 0 a disk, it doesn't remove the magnetizing between the tracks, and it's then just a matter of relocating the pin head just a bit.

Name: Anonymous 2007-12-19 15:15

Deniable encrypted partitions with usb token + passphrase authentication

Name: Anonymous 2007-12-19 23:00

>>1
If you're that worried when ever they come take your HDD and give it to your friend, then they need a new warrant to get it from him. Then you can take it back and have a lot of time to erase it all beyond recovery.

Name: Anonymous 2007-12-20 4:30

>>165
Having a USB token lying around kind of ruins the plausible deniability bit.

>>166
Because they'll always give advance warning, amirite? You can microwave a drive when men in black suits are knocking at your door (make sure they aren't Jehova's witnesses), but you can't drive to your friend's house and leave the drive there.
Much better to just use encryption (and possibly steganography, though a US judge recently ruled people can't be forced to hand over their encryption keys) and safe deletion practices, like shred.

Name: Anonymous 2007-12-24 20:43

>>1
dinamite

Name: Anonymous 2007-12-25 21:36

>>167
>Having a USB token lying around kind of ruins the plausible deniability bit.

No the idea is, the crypted data can decode into 2 different results. Check out TrueCrypt hidden volume.

Name: Anonymous 2007-12-26 3:01

>>169
167 most likely knows about that, while you don't seem to get what he's talking about. Kill yourself.

Name: Anonymous 2007-12-26 4:18

          ∧_∧   / ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄
          ( ´∀`) < IF U WERE KILLED TOMORROW IN A TABLE-RELATED ACCIDENT, I WOULDNT
        /    |    | GIVE A RATS ASS BECAUSE I WOULD BE SITTING ON MY TABLE!!redcream look at this please
Michio Kaku On Aliens, On Physics ...
http://youtube.com/watch?v=uWW6_LfiJJk
http://youtube.com/watch?v=PW8rgKLPHMg
       /       .|    \________
       / "⌒ヽ |.イ |
   __ |   .ノ | || |__
  .    ノく__つ∪∪   \
   _((_________\
    ̄ ̄ヽつ ̄ ̄ ̄ ̄ ̄ ̄ | | ̄

Name: Anonymous 2008-02-17 23:30

>>17
>>18
what about reiserfs

will it be almost impossible to recover as reiser4? if rm -rf / is performed

whats the diff? whats better?

Name: Anonymous 2008-02-18 2:47

>>172
The difference is that ReiserFS makes you kill your wife. Reiser4 is supposed to be a patch that lets you get away with it.

Name: Vin DiCarlo 2013-06-14 4:08


Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List