Interesteduser
New Member
Hello, i was wondering if such a study had been implemented or if any technically educated users had looked into Eraser's source code itself. I was interested in possible malicious code in Eraser, as well as other programs for free space deletion, its competitors, etc... This is not at all meant to be an insult to the developers of Eraser, but to inquire for non technically proficient end users to see for themselves (or at least how it appears in the opinion of others).
I greatly appreciate your help and if such a study or forum thread exists, on Eraser, as well as other free space deletion programs, please direct me.
I'm greatly interested in the privacy aspect, as we are all really endowed by our creator the right to live in privacy...
-An Interested User
(as a side question: Eraser claims to make all recovery of the deleted data impossible to recover (ie all software recovery methods) albeit physically examining the hard disk. Could someone perhaps elaborate more on what specifically this means and how Eraser's developers and pioneers of this technology ascertain that the overwritten data is absolutely irrecoverable, albeit physical examination.)
Thank you so much
I greatly appreciate your help and if such a study or forum thread exists, on Eraser, as well as other free space deletion programs, please direct me.
I'm greatly interested in the privacy aspect, as we are all really endowed by our creator the right to live in privacy...
-An Interested User
(as a side question: Eraser claims to make all recovery of the deleted data impossible to recover (ie all software recovery methods) albeit physically examining the hard disk. Could someone perhaps elaborate more on what specifically this means and how Eraser's developers and pioneers of this technology ascertain that the overwritten data is absolutely irrecoverable, albeit physical examination.)
Thank you so much