
2 Sep
2013
2 Sep
'13
12:06 p.m.
On Mon, 2013-09-02 at 17:45 +1000, Daniel Cross wrote:
I guess it depends on your threat model, so rewinding a bit - who are you wanting to prevent accessing your data? This greatly informs the conversation. The methods offered above, and in many of the replies thus far, assume a very sophisticated adversary.
Daniel hi
when the Space Shuttle blew up 60km above Texas, over 98% of the data was recovered from the disks found in the debris. Steve