Not logged in
Log in now
Create an account
Subscribe to LWN
LWN.net Weekly Edition for May 16, 2013
A look at the PyPy 2.0 release
PostgreSQL 9.3 beta: Federated databases and more
LWN.net Weekly Edition for May 9, 2013
(Nearly) full tickless operation in 3.10
Just use hard disk encryption, and get full privacy.
If you want to delete the data, just scrub all the password-encrypted versions of the key.
Trying to somehow only store some data is a losing battle.
EFF: Ubuntu 12.04 will bring OS-level privacy options
Posted Mar 10, 2012 12:15 UTC (Sat) by drag (subscriber, #31333)
I think people want to have something that will help when they are actually using the system.
Posted Mar 10, 2012 12:48 UTC (Sat) by epa (subscriber, #39769)
Posted Mar 12, 2012 12:42 UTC (Mon) by slashdot (guest, #22014)
For starters, you'll need to change the kernel to scrub sectors of deleted files with multiple rewrites, do the same for swap on shutdown, and prevent any disk indexer from indexing the affected data.
And then change all applications to make sure data (including, say, the last selection in a file dialog, browser autocomplete, shell history, etc.) is properly stored in separate files to allow it to be found on deletion.
If you want to only delete some of the data, then it gets much harder, because logs need proper timestamps, incremental data structures (like autocomplete or LRU) needs to be equipped with a journal allowing to remove parts of it, and so on.
At any rate, things like Bash history can end up having all sorts information like passwords, so you'd probably need to delete them for any kind of deletion operation.
Or just give up, and encypt everything, making this a non-issue.
Posted Mar 12, 2012 14:47 UTC (Mon) by union (subscriber, #36393)
Essentially it's a output filter for logs.
Posted Mar 15, 2012 10:50 UTC (Thu) by epa (subscriber, #39769)
Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds