[liberationtech] secure wipe of flash memory
Michael Rogers
michael at briarproject.org
Mon Jul 30 04:01:29 PDT 2012
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On 21/07/12 18:02, Chris Ball wrote:
> Hi,
>
> On Sat, Jul 21 2012, Michael Rogers wrote:
>> Does anyone on the list know whether flash controller chips use
>> journalling? I'm guessing they might because YAFFS does.
>
> I don't think so -- YAFFS is a filesystem, and the wear-leveling
> algorithm on the controller only knows how to act on reads/writes
> to individual blocks on the flash, so they're very different
> layers. The flash controller isn't a replacement for a filesystem;
> you still need to use one, and it may or may not be journaled.
>
> (Although the independence between wear-leveling algorithm and
> filesystem isn't total; there's evidence that the vendors teach
> their firmware how to handle writes to the Windows FAT cleanly.)
Thanks for the information Chris. Perhaps journalling was the wrong
word for me to use - what I'm interested in is whether a forensic
investigator can (partially) reconstruct the order in which the
logical blocks of a flash device were updated. If so, TrueCrypt hidden
volumes could be exposed.
Each time YAFFS updates a logical block, it stores a numbered mapping
from the logical block to a physical block. The numbers reveal the
order of the updates. Do you know whether controller chips do
something similar?
Cheers,
Michael
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iQEcBAEBAgAGBQJQFmmJAAoJEBEET9GfxSfMMi8H/RR3xRubP3+ld7E+JIwqhmfi
k1KE/lIHEKyJ7xlkGQzcCBG42TLcND+LlYQHk87QIyhnB/gFeIpEJUkLtBO3g+p8
aGCrAhYtRgTT+ULBN9EEQ2GdeSq6xL+JOd4l5xFLwtRgn/vDxvpjuN4FyPactDzK
02HFr867TO6BaVb+oVV1Q5EHjiv81O1fa6QHWY5yHIxN4sJDlxZQ+Mk/5Cnkvukd
Ik3iypqnCZODrABsgHfnQHgCGpB88zKIjuiANMpaeke0fUWt+2bpb1reeQlFG/lX
P1J2rqEs4Lsf/hDXIkOJARZmwlz7OsQgGK8VrOSiY9pkFhGp6kw9V/JLF+0fvlA=
=DrW7
-----END PGP SIGNATURE-----
More information about the liberationtech
mailing list