[ale] destroy old drives

William Bagwell rb211 at tds.net
Thu Apr 11 21:37:11 EDT 2019


Layer of soft porn between the encrypted stuff and the red herring files will 
add to their frustration;-)

Years ago bought a used 10 GB HD at the computer show in Marietta that was 
from a banks computer. No account info (that I could find) but there was an 
interesting inter-office memo describing the protocol to follow during a 
robbery. Son wanted to save it but it was formated and used in a firewall 
for almost a decade. HD still running when firewall retired...

Oh, if I ever start attending meetings again should I bring my log splitter?

William

On Thursday 11 April 2019, Jim Kinney via Ale wrote:
> I like to write clear text red herring files onto a LUKS encrypted drive
> to be disposed of. So delete the LUKS header, overwrite it with
> /dev/random. Reformat the drive as fat32 then add:
>
> Files named "bank_codes" and then filled with random generated account
> numbers and passwords. Files named "my passwords" and filled with random
> usernames, accounts, and passwords" Files named "my new access list"
> filled with real usernames gleaned from facebook, google, etc. but random
> passwords
>
> This works real well on a fresh install win10 with no password on the
> default user account. Keeps the schmucks busy testing :-)




More information about the Ale mailing list