The addition of user folders and multiple overwriting

Forums: 

I would like the user to manually add folders to clean. Sometimes the use of custom programs.

The second issue - whether to add the option to self-determination overrides quantity? From what I see, now the program overwrites the file once. Could use an option that can be set manually override more.

--

Chciałbym, by użytkownik mógł samodzielnie dodawać foldery do czyszczenia. Czasami używa się programów niestandardowych.

Druga kwestia - czy można dodać opcję samodzielnego ustalania ilości nadpisań? Z tego co widzę, teraz program nadpisuje pliki jeden raz. Przydałaby się opcja, by można było ustawić ręcznie większą ilość nadpisań.

Custom folders is a good idea. For now the workaround is to define your own cleaner using CleanerML or, if you use Windows, Winapp2.ini.

Regarding shredding files with multiple passes (using the Gutmann method or DOD or similar), please read Shred files and wipe disks why this is at best worse than a waste time and at worst provides a misguided sense of security.

In the future please post one topic per message thread.

---
Andrew, lead developer

I second the suggestion for a 3,5 or 7 multiple pattern overwrite manual OPTION. Every security nation on planet earth has multiple overpasses for secure wipe of their files. Russia,Brits,Germanys 5,7 passes, DOD 5, NSA 7 etc. Those agencys are not stupid nor outright ignorant in regards to wasting countless hours because one overwrite is enough.

Sorry, please read the BleachBit documentation about shredding files, and you should find that is not true. Specifically, read the section "Myths and legends." If you disagree, please provide valid references.

---
Andrew, lead developer

Nations agencys who make it their business to know of information remaining after a single deletion, use multiple passes to securely erase sensitive data on their users hard drives.

I have read the extremely questionable material spewing a single pass is all that is needed. Any objective individual would question such a article's deception or actual intention.

The time it takes for 3 passes of alternating patterns is nearly identical than that for a single pass on modern hard-drives. When anyone spews it's a 'waste of time', they are talking about 5 minutes perhaps? That argument is entirely MUTE, compare that to some pig w/Badge trying to construct anything possible to blackmail,extort or charge you with. 5 Minutes?

Perhaps the best approach with the faux 1 pass propaganda is to use freeware True Crypt to securely encrypt the entire volume then securely delete it. Any recovery then would find at most find snippits of random patterns without anyway of linking them into the original files and data.

Anyone posting that DOD, NSA, MI6, FSB agencys using multiple overwrites to securely wipe hard drive data is a 'Myth' or 'Legend' is seriously confused and their agenda is entirely suspect in the least.

A waste of Time? Nonsense, 3 passes is microseconds more than 1 pass. Add the option for multi-patterns, multiple passes.

Three passes take three times as long. For one small file, yes, it doesn't make a time difference, but it's not uncommon to clean 100MB, 1GB, or more. The time is a relatively small issue compared to the implied promise that multiple passes are more secure, but it has never been demonstrated that data once can be recovered. Meanwhile, there are other security issues that are ignored.

---
Andrew, lead developer

Nations agencys who make it their business to know of information remaining after a single deletion, use multiple passes to securely erase sensitive data on their users hard drives.

Since there are so many government agencies that do this, it should be easy for you to provide a solid reference regarding one agency that approves the usage of multiple passes to sanitize the removal of individual files within a file system.

In particular, I think you missed this part from the BleachBit documentation:

The DoD 5220.22-M standard was never intended to be shred individual files or to wipe free disk space: it was intended to wipe the entire hard drive causing a complete data loss including the operating system and all software, settings, and documents. Also, Department of Defense approves software shredding techniques only within the DoD: for storage devices released out of the Department of Defense, only mechanical destruction is approved. In other words, any software which shreds individual files or free disk space cannot be DOD or NSA compliant.

So if you are talking about shredding a 500GB hard drive with multiple, this would take hours or days. Also, this would not be meet DoD's standard for devices released out of the DoD. If released out of the DoD, the device would have to be physically destroyed.

---
Andrew, lead developer

Quote, 'The time is a relatively small issue compared to the implied promise that multiple passes are more secure, but it has never been demonstrated that data once can be recovered. Meanwhile, there are other security issues that are ignored.'

WHAT? There are THOUSANDS of recovery specialists who routinely do that in the private sector, pickup the Yellow Pages! However it's the thugs, pigs and outright goose stepping goons with near unlimited US taxpayer funding who make it their business to piece together supposedly deleted and shredded files and supposedly unused portions of a hard-drive to extort, blackmail or in some cases charge the hapless individuals with whatever they find.

Any fool can run the Windows based freeware Recuva to see how many so-called securely deleted files are actually fully recoverable and the thugs with unlimited US taxpayer funding are certainly using much more sophisticated and expensive recovery software than freeware's Recuva.

The micro seconds difference between writing a single pattern or 3 alternative patterns is as pointed out again and again INSIGNIFICANT, it sounds like the programmer is simply to lazy to include a feature the users could elect to use to illicit a multiple pass, multiple pattern overwrite on files as well as unused drive space.

On a desktop, it is very common for users running secure Wipe on a unused HD to run it prior to leaving the office or going to bed with the program having the option to shut-down the system upon completion. So what if it takes 5-8 hrs. to complete, your'e sleeping or out of the office anyway and when you return all of your previously deleted files are securely Wiped off your hard drive.

Quote, 'The DoD 5220.22-M standard was never intended to be shred individual files or to wipe free disk space: it was intended to wipe the entire hard drive causing a complete data loss including the operating system and all software, settings, and documents.'

Anyone who has actually worked for the US Gov. and been involved with the DOD and the equipment they later sell to the public knows the secure file deletion is NOT used to as you allude to just 'clean a hard drive entirely', they are under law to physically remove the hard drive and physically destroy them. All pre-owned, used DOD computers come without any hard drives. Even with multi-passes, the DOD do not trust that information cannot be recovered. The DOD routinely shreds and securely deletes single files as part of it's operations both in DOD related facilities across America and overseas, suggesting otherwise is simply not true.

they are under law to physically remove the hard drive and physically destroy them.

Yes! Within the DOD, the sanitation rule is wipe the whole hard drive (not individual files). Outside of the DOD, the sanitation rule is physically destroy the hard drive (wiping is not enough).

The DOD routinely shreds and securely deletes single files as part of it's operations both in DOD related facilities across America and overseas

That may sometimes be the practice, but it's not documented and goes against the documented DOD standard. When we are discussing the DOD-approved wiping method, we must refer to the official DOD documentation.

---
Andrew, lead developer

Recuva cannot recover a file properly wiped with a single pass. The recovery experts also cannot recover files wiped properly with a single pass. Rather than give you my opinion that this is true, look up the Great Zero Challenge. It was a challenge with a monetary reward for recovering data from a hard drive wiped once with zeros. From 2008 to 2009, the challenge was never accepted by anyone.

I'm sorry you are not willing to read the provided documentation and references (such as the 2006 NIST Special Publication 800-88 page 7), and you cannot provide any references to support your opinions. If you cannot provide references for your opinions, let's not continue this discussion. If you don't like BleachBit, don't use it.

---
Andrew, lead developer

How About A Compromise then?

The programmer of BleachBit SHOULD Add a OPTION to the Mouse Sub-Menu to Securely change the filename and then Overwrite a selected file(s) with at least 3 passes, 00,11 and random. The time it would take the standard HD to carry out that function would be within seconds for avg. file sizes.

Then for the avg. BleachBit user that routinely wipes the free-space on their hard-drives, those securely overwritten files would have progressively imprinted passes over them of 00.

Other Linux secure wipes are using multi-overwrites, obviously they are not buying the one pass is secure. As I previously pointed out any fool can use the freeware pgm Recuva to see if a supposed shredded overwritten file is recoverable and YES many can be, I've used Recuva to test the actual real proficiency of many 'supposed' secure erasing pgms. Several of them FAILED and yet if I were to buy into a single pass overwrite theory, ALL of them would succeed which is far from being truthful. Corporate and Law enforcement agencys are not going to be using a freeware recovery program but one that is 1000s of times more efficient.

None of those recovery Agency's nor any of the HUNDREDS of recovery software programs would exist nor succeed if the theory of a single overwrite securely destroys the files.

Add to BleachBit the feature for multi-overwrite passes in the Mouse Sub-Menu Options to suppliment mere 'Delete File' so the users of BleachBit could should they choose securely delete files which later thru avg. BleachBit use then go one to have successive 00 overwrite passes placed on top of them later.