Dear Tom, On Sun, Aug 25, 2013 at 7:15 AM, <tpgww@xxxxxxxxxxx> wrote: > On Thu, 22 Aug 2013 12:45:59 +0200 > "0.akowalski" <0.akowalski@xxxxxxxxx> wrote: > >> You also have my plus one ;-) > > I hope we all realise that this will really be just a more-sophisticated > approach to security-by-obscurity. AFAIK there's no bullet-proof and > widely-available approach to forcing multiple, nearly-simultaneous > overwrites, or dealing with OS page-files. > I've now played around with the new Shred plugin and applying it on a file yielded the following: Failed to remove /tmp/1001-emelfm2-svn-unpack.tmp~1/bcrypt-master/Makefile - Success Is this expected? Furthermore, I peeked at the source code (I couldn't yet find docs for the plugin) and it seems to me that this is a home-grown implementation for a shredding algorithm. Is there a good reason to not just re-use the thoroughly tested shred command that comes with most Linux distros (and allow for some plug-in config options, like nature of rewrite---zeros or pseudo-randoms---and nr of rewrites)? Regards, Liviu -- Users can unsubscribe from the list by sending email to emelfm2-request@xxxxxxxxxxxxx with 'unsubscribe' in the subject field or by logging into the web interface.