u need to read this agian..its very clear that jamal wanted us to wipe the data to eliminate any of the following concerns no matter how minor the possebility is
by using wipe after encrypt is to close any possible gap of what mentioned below=
(Cold boot attacks are one of the few possible methods for subverting a whole-disk encryption method, as there is no possibility of storing the plain text key in an unencrypted section of the medium. However, even this is unlikely and difficult to execute in a non-laboratory situation, as a cold boot attack requires immediate network access to the computer and is only possible within several minutes or even seconds of the system being depowered, depending on the kind of random access memory used. Even then there is still the possibility of the key itself being scrambled or otherwise protected, which may make even this method fail.
Other side-channel attacks, like the use of hardware-based keyloggers or acquisition of a written note containing the decryption key, may offer a greater chance to success, but do not rely on weaknesses in the cryptographic method employed. As such, their relevance for this article is minor)
then after that i mentioned that jamal's method might be emplemented in top gov security agencies as the best method to destroy data once and for all as the next best method to destroying a data on a hdd..but later came icecube and talked about security breach..and with respect this is not our topic we r talking about or the tutorial of jamal is talking about..we stoped last thing on a joke by dog with a funny reply..but later came icecube and things messed up in no related replies..sorry for this..with respect to all.
Edited by Master of Disaster, 29 November 2010 - 08:42 PM.