{"id":58,"date":"2006-03-10T10:33:52","date_gmt":"2006-03-10T10:33:52","guid":{"rendered":"https:\/\/www.darknet.org.uk\/2006\/03\/post-mortem-data-destruction\/"},"modified":"2015-09-09T19:44:06","modified_gmt":"2015-09-09T11:44:06","slug":"post-mortem-data-destruction","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2006\/03\/post-mortem-data-destruction\/","title":{"rendered":"Post-Mortem Data Destruction"},"content":{"rendered":"

[ad]<\/p>\n

<\/p>\n

1. Introduction<\/h3>\n

This article describes and partly implements a method to delete<\/em> or re-locate<\/em>, potentially sensitive and \/ or incriminating information from your UNIX flavoured machine, after the sad event of your death.<\/p>\n

An older version of this article has<\/em> been published before, yet it has since disappeared from the Internet and the Google cache; hence this re-post.<\/p>\n

Initially, the intent of the whole idea of Post-Mortem Data Destruction<\/em> (PMDD), or Post-Life<\/em> Data Destruction, was humorous. Thus, this document should be taken lightly. <\/p>\n

Incidentally it can<\/em> be of use to interested people as this article does contain some useful tips \/ pointers if one decides to build such a system. For some of you that lack common sense: any damage you might cause to your machine after reading this document is entirely your own fault.<\/p>\n

Note that this article, obviously, assumes that the machine that the data is on, is under your own control. We will continue to look at various motivations<\/em> for PMDD, below. Note that this whole theory does not<\/strong> apply when you are using remote storage systems (i.e. virtual drives) as the information is then stored on a remote location<\/em> and we cannot be sure that the remote system really<\/em> deletes your data. Their EULA might state that they do but the truly paranoid wouldn’t make the assumption that they really<\/em> delete it. I sincerely wonder why<\/em> one would actually ever use such a remote virtual drive — by definition these are un-trusted<\/em>. But I slightly digress..<\/p>\n

2. Motivation<\/h3>\n

You can have various motivations for wanting your data destroyed<\/em> after your death:<\/p>\n