What is the problem?
Information removed from a hard disk drive by non-secure means (for example, by simple Windows delete) can easily be recovered. Utilizing specialized equipment, it is possible to recover even repeatedly overwritten information.
Leakage mechanism
Data is stored on a hard disk as a binary sequence of 1 and 0 (ones and zeros), represented by differently magnetized parts of a disk.
Generally speaking, a 1 written to a hard disk is read as 1 by its controller, and 0 is read as 0. However, if you write 1 over 0, the result is conditionally 0.95 and vice versa – if 1 is written over 1 the result is 1.05. These differences are irrelevant for the controller. However, using special equipment, one can easily read the «underlying» sequence of 1's and 0's.
Information wiping methods used by Acronis
The detailed theory of guaranteed information wiping is described in an article by Peter Gutmann. Please see "Secure Deletion of Data from Magnetic and Solid-State Memory" at http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html.
No. |
Algorithm (writing method) |
Passes |
Record |
---|---|---|---|
1. |
United States Department of Defense 5220.22-M |
4 |
1st pass – randomly selected symbols to each byte of each sector, 2 – complementary to written during the 1st pass; 3 – random symbols again; 4 – writing verification. |
2. |
United States: NAVSO P-5239-26 (RLL) |
4 |
1st pass – 0x01 to all sectors, 2 – 0x27FFFFFF, 3 – random symbol sequences, 4 – verification. |
3. |
United States: NAVSO P-5239-26 (MFM) |
4 |
1st pass – 0x01 to all sectors, 2 – 0x7FFFFFFF, 3 – random symbol sequences, 4 – verification. |
4. |
German: VSITR |
7 |
1st – 6th – alternate sequences of: 0x00 and 0xFF; 7th – 0xAA; i.e. 0x00, 0xFF, 0x00, 0xFF, 0x00, 0xFF, 0xAA. |
5. |
Russian: GOST P50739-95 |
1 |
Logical zeros (0x00 numbers) to each byte of each sector for 6th to 4th security level systems. Randomly selected symbols (numbers) to each byte of each sector for 3rd to 1st security level systems. |
6. |
Peter Gutmann's method |
35 |
Peter Gutmann's method is very sophisticated. It's based on his theory of hard disk information wiping (see Secure Deletion of Data from Magnetic and Solid-State Memory). |
7. |
Bruce Schneier's method |
7 |
Bruce Schneier offers a seven-pass overwriting method in his Applied Cryptography book. 1st pass – 0xFF, 2nd pass – 0x00, and then five times with a cryptographically secure pseudo-random sequence. |
8. |
Fast |
1 |
Logical zeros (0x00 numbers) to all sectors to wipe. |