TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

What It Takes to Truly Delete Data

48 pointsby spaceboyover 8 years ago

4 comments

Pfhreakover 8 years ago
It&#x27;s difficult to teach this lesson to people.<p>It was difficult for me to learn this lesson personally. When I understood it, I deleted my Facebook account (best decision, btw), but I assume that even though my account was deleted there are still references to it all over. IDs in log lines, references not cleaned up -- enough to paint something of a picture of who I was and what I did with the site.<p>Now I&#x27;m more judicious in what I share, how I share it, which applications I give permissions. But I&#x27;m still leaking metadata everywhere. It&#x27;s frustrating and terrifying that the cost of participating in our society is either a HUGE cognitive load in keeping an eye on all the data you emit or accepting that basically everyone will have full access to your (meta)data over time.
评论 #13561392 未加载
评论 #13562014 未加载
评论 #13561399 未加载
评论 #13562325 未加载
radsover 8 years ago
If @realDonaldTrump deletes a tweet, it&#x27;s against the Twitter ToS to republish it using a bot.<p>When it does happen I&#x27;ve seen people post screenshots of the old tweet. This doesn&#x27;t prove anything more than trivial knowledge of the Chrome Web Inspector.<p>I&#x27;ve thought about distributing a program so people can keep their own local archives of important tweets. There are plenty of ways to achieve this already, but that&#x27;s besides my point.<p>How can we make it obvious when an important figure deletes a tweet without breaking Twitter&#x27;s ToS?
评论 #13562872 未加载
评论 #13562124 未加载
评论 #13561426 未加载
评论 #13561461 未加载
zokierover 8 years ago
While its still no silver bullet, encryption can make the problem more manageable. For example for hard drives with full-disk encryption you should be able to just throw away the key and the data should become inaccessible. Same applies to for cloud backups; you don&#x27;t know what the cloud provider might do with the data you upload, but they should not be able to access the content if it is properly encrypted, and as such the issues raised in the article become lesser.<p>Of course this does not apply to data that is actually being used&#x2F;processed in cloud instead of just being passively stored.
bkoover 8 years ago
&gt;That computer, armed with the company’s proprietary wiping software, uses a special algorithm to programmatically access each bit on the drive, stored as either a ‘0’ or ‘1,’ and write a new digit to it. The process must be repeated at least three times and with different numbers to be up to DoD standards.<p>Maybe a stupid question, but why don&#x27;t they just write every bit to either 1 or 0 regardless of its current content? Are they trying to preserve some data and not others? Why do you need to do it multiple times if the bit being written is independent of the actual contents?
评论 #13561492 未加载
评论 #13561807 未加载
评论 #13561422 未加载
评论 #13562105 未加载