Thursday, October 19, 2017

Privacy: Scribbling


I talk a lot about privacy and security here. I have been in the habit of writing certain communication down by hand. My kids think I’m old, but that’s not it. I love the digital world and use it as much as possible. If you put information on a computer and delete it, is really gone? It is not gone until it is over written. Can you control when that happens? Perhaps my son the computer science major can do this, but most of us cannot. If I want something to be really delete-able, I write it down. Then I can destroy what it was written on. There are also ways of making your writing illegible. This is not the best way to dispose of your writing, but you may want to preserve what is written on.
Sometimes we handwrite short pieces of text that should be destroyed after it had served its useful purpose. It could be a password, an address, a name, etc. It could be something you don’t want your roommate to ask questions about, or something you don’t want a random dumpster diver to collect.
There are a number of possible ways to purge this sensitive information, but many are unsatisfactory. Crossing out the text with a pen is among the lamest, as the information is readily recoverable. Manually tearing the paper into bits is messy, imprecise, and possible to reconstruct. Cutting with scissors is okay but still cumbersome. Shredding with an actual office shredder is good but not always available. Cross-cut shredders are much better than strip cut shredders. Physical destruction with fire, water, or chemicals is possible but very messy.
In fact there is a simple way to destroy handwritten text, simply overwrite it with more handwritten text until it’s no longer possible to distinguish what text is true and what text is nonsense. It’s helpful to overwrite with the same kind of plausible content. For example overwriting numbers with random numbers, overwriting names with names, overwriting English sentences with general phrases. If the same pen is used for the original writing and the overwriting, then it’s sufficient to add 2 to 4 layers of overwritten text. If the pen is not the same, then it’s best to use 3 or more different pens of similar colors to do the overwriting. This way it’s difficult to tell which pen wrote the real information and which pen wrote the gibberish.
Note that this technique of overwriting cannot safely destroy printed material, because the look of handwritten text is too distinct from typefaces, and pen stroke ink looks very different from laser printer toner or offset printing ink. Printed materials still need to be shredded properly; there’s no shortcut for that. Also for handwriting, avoid overwriting with simple patterns like long straight lines, periodic loops, etc. You should overwrite with text that actually imitates the sensitive text, because this is what makes it hard to separate the content from fiction. Finally note that overwriting is tedious for more than a paragraph of text, so bulk destruction of paper should still seek a proper cross-cut shredder.
Privacy, like most security, is a lot of work. It’s worth the peace of mind but it takes a lot more work to be secure than to just let things slide. Be vigilant.
Semper Paratus
Check 6
Burn

No comments:

Post a Comment