An online search shows majority of tools available for wiping out data on a disk points to a practice of 7 wipes. They believe that it is a US DoD requirement. Some of them support the Gutmann method of 35 wipes. However, I could not find any documentation on US government website that indicates seven… Continue reading Disk Overwrite or Wipeout Best Practice
Tag: Privacy
India’s Unique ID Use Case
Nandan Nilekani’s…..Fully integrated ID card system for Indian citizens!!
The Open Group Security Practitioners Conference Day 1
Proceedings from the The Open Group Security Practitioners Conference at Toronto – July 22, 2009.
Internet Traffic Shaping in Canada
ISPs wants to shape internet traffic while Canadians are still waiting to know the effects on Privacy if two bills – Investigative Powers for the 21st Century Act and the Technical Assistance for Law Enforcement in the 21st Century Act – becomes law.
Critical Security Controls
What are the Critical Security Controls per US federal organizations? Important points and thoughts.
Vulnerability During City Strike
Toronto is on a strike. Dumpster diver may have access to public garbage dump sites.
Paranoid on Facebook
Shaheen’s thoughts on using Facebook
Protect Medical Records
Do we trust our medical history with our physicians and hospitals? Such information need to be encrypted or obfuscated.
Chrome OS, Cloud Computing and Privacy
Shaheen’s thoughts on upcoming Google Chrome OS; how does it relate to Cloud Computing and Privacy concerns.