Disk drives are surprisingly complex embedded processor subsystems that have error management, track and sector coding, and disagnostics, etc, that are outside "normal" access (and have layered complexities). Drives have not been totally transparent to outside data access for many years. Logical access is all we get, per specs. How the "low ;evel accesses" are done and how much space or control may be feasible differs by manufacturer. Once upon a time, one could get extra performance by using application-specific sectoring, interleave, etc. However, the need for, and impact of, error management (mapping, coding, etc) killed the advanges and feasibility of customized interlacing, etc, as disk capacity grew larger and larger. Hidden stuff exists, but it's unlikely to be significant capacity for criminal uses, and the low-level coding can provide some forensic access for specialists that have manufacturers' support. This is an incredibly boring topic (and likely a non-productive one) to pursue. Chuck > -----Original Message----- > From: tclug-list-bounces at mn-linux.org > [mailto:tclug-list-bounces at mn-linux.org]On Behalf Of Jason Hsu, embedded > engineer, Linux user > Sent: Thursday, September 30, 2010 12:34 AM > To: tclug-list at mn-linux.org > Subject: [tclug-list] Hidden hard drive partitions > > > I've heard that some hard drives contain hidden partitions that > Darik's Boot And Nuke cannot erase. Supposedly, law enforcement > requires manufacturers to include the hidden partition so that > the criminals cannot erase their tracks. Only law enforcement > has the special software needed to access the hidden partition. > > Is this true? I find this difficult to believe. I don't think > this setup would work. I can't imagine how law enforcement could > prevent such a tool from falling into the wrong hands, as it > would only require one rogue cop to give the software to the > criminals. Given this, the criminals would be able to access > passwords, credit card information, etc. from all hard drives, > even those erased with Darik's Boot And Nuke. > > Is this just an urban legend? > > -- > Jason Hsu, Linux-literate embedded engineer