account abandoned@lemmy.world to No Stupid Questions@lemmy.worldEnglish · edit-21 year agoHow does SecureErase work?lemmy.worldimagemessage-square37fedilinkarrow-up1150arrow-down121file-text
arrow-up1129arrow-down1imageHow does SecureErase work?lemmy.worldaccount abandoned@lemmy.world to No Stupid Questions@lemmy.worldEnglish · edit-21 year agomessage-square37fedilinkfile-text
minus-squarevzq@lemmy.blahaj.zonelinkfedilinkarrow-up2·1 year agoFair point. Data integrity and availability concerns often trump confidentiality. Still, if your main concern is safe disposal rather than preventing unauthorized access, most major operating systems have ways to ensure continued access.
Fair point. Data integrity and availability concerns often trump confidentiality.
Still, if your main concern is safe disposal rather than preventing unauthorized access, most major operating systems have ways to ensure continued access.