drive wiper information

How's the drive wiper working exactly?

I have three scenarios:

1. Wiping in a virtual drive to compress space:

If you want to zip a virtual drive file, then it would be good to overwrite the space with zeroes. Virtualbox then has an option do drop the zeroed blocks and the drive could be compressed. Other compression programs will also benefit from the boring space.

2. Wiping a truecrypt volume:

Overwriting the free space of an outher volume with zeroes would guarantee, that there is no "inner volume". In a non "in dubio pro reo" situation, eg in a dictatorship, work or relation would be nice to reveal the hidden contents and give no space for suspecting "more".

3. Wiping a truecrypt volume #2

Truecrypt itself initializes with random numbers (I read somewhere) Overwriting with zeroes would reveal the block of a hidden volume.

So I guess, both methods have their advantages (overwriting with zeroes AND overwriting with randoms)

doesn't seem to be a suggestion topic moved to discussion board

The suggestion was to extend and specify the "drive wiper" options (and be more elaborate in the help)

1. 1 pass overwrite with zeroes

2. 1 pass overwrite with random numbers

3. 3 pass ...

... Gutmann

The suggestion was to extend and specify the "drive wiper" options (and be more elaborate in the help)

1. 1 pass overwrite with zeroes

2. 1 pass overwrite with random numbers

3. 3 pass ...

... Gutmann

Mostly your "suggestion" was a series of questions. and at least 2 or your items 1,2, 3 are, I believe already implemented.

It might be possible to more fully describe the wipe patterns available,

but it might be unwise to expect a continuously enhanced general purpose wiper to always restrict itself to a set of patterns that exactly conform to the needs of TrueCrypt,

unless of course Piriform and Truecrypt came to a formal agreement.