ZCode said:
what do you mean by the "security weaknesses of the target system"? In this case we are just talking about hard-drive and the Eraser software itself, right?
No. We are also talking about the file system and the operating system with which that file system is associated. The behaviour of these very complex system components has major implications for user security.
ZCode said:
what are the "traces" of the files? If I already overwrite the whole disk with random 0/1s why would there be "traces" left? You mentioned all the metadata and the contents are destroyed, but you also mentioned that " virtually impossible to secure his or her data against sustained expert forensic examination"
If you overwrite the whole of the disk (e.g. by formatting and it and then erasing the free space), nothing except the (almost empty) file table will be left, and that disk will be pretty much secure, even against forensic examination. But it is only when disposing of the disk or putting it to some other use that you can do this.
In day to day use, Windows (or any other modern OS for that matter) will create partial or complete copies of files in locations which the ordinary user will not know about and to which he or she will often not have direct access. As I understand it, Eraser will prevent Windows making shadow copies (the most obvious cause of security weakness) of files it erases directly. But if a file has been through a series of versions, shadow copies of those versions may still exist, and Eraser will not know about them. There will also be partial copies of user data in the paging file and in the cluster tips of files (including OS files the user is not allowed to access). Also, in the NTFS file system, the file table itself contains the data as well as the metadata of small files. I was referring to entities such as these (which are obvious targets of any forensic examination) when used the term 'traces'. I accept that the term is potentially misleading, but I could not think of a better one.
The point here is that Eraser will do a good job of destroying files, but it takes knowledge and effort to identify and destroy everything a user with reasonable security concerns might want removed. Even erasing free space (always a time-consuming job) is not the complete answer, because restore points and application clutter are in space not marked as free. Alongside Eraser, regular use of cleaning apps. such as CCleaner will also be required. It also makes sense to store data, especially sensitive data, on a non system drive, as these can usually be cleaned more easily and thoroughly than system drives. Finally, remember that effective file erasure is not possible on flash drives and SSDs, because the wear levelling firmware on those drives redirects (and thus defeats) the overwrite. Erasing free space (which writes to
all the available space) does however work on these drives.
I hope this helps.
David