Disk drives are surprisingly complex embedded processor subsystems that have
error management, track and sector coding, and disagnostics, etc, that are
outside "normal" access (and have layered complexities).  Drives have not
been totally transparent to outside data access for many years.  Logical
access is all we get, per specs.  How the "low ;evel accesses" are done and
how much space or control may be feasible differs by manufacturer.  Once
upon a time, one could get extra performance by using application-specific
sectoring, interleave, etc.  However, the need for, and impact of, error
management (mapping, coding, etc) killed the advanges and feasibility of
customized interlacing, etc, as disk capacity grew larger and larger.
Hidden stuff exists, but it's unlikely to be significant capacity for
criminal uses, and the low-level coding can provide some forensic access for
specialists that have manufacturers' support.  This is an incredibly boring
topic (and likely a non-productive one) to pursue.


Chuck


> -----Original Message-----
> From: tclug-list-bounces at mn-linux.org
> [mailto:tclug-list-bounces at mn-linux.org]On Behalf Of Jason Hsu, embedded
> engineer, Linux user
> Sent: Thursday, September 30, 2010 12:34 AM
> To: tclug-list at mn-linux.org
> Subject: [tclug-list] Hidden hard drive partitions
>
>
> I've heard that some hard drives contain hidden partitions that
> Darik's Boot And Nuke cannot erase.  Supposedly, law enforcement
> requires manufacturers to include the hidden partition so that
> the criminals cannot erase their tracks.  Only law enforcement
> has the special software needed to access the hidden partition.
>
> Is this true?  I find this difficult to believe.  I don't think
> this setup would work.  I can't imagine how law enforcement could
> prevent such a tool from falling into the wrong hands, as it
> would only require one rogue cop to give the software to the
> criminals.  Given this, the criminals would be able to access
> passwords, credit card information, etc. from all hard drives,
> even those erased with Darik's Boot And Nuke.
>
> Is this just an urban legend?
>
> --
> Jason Hsu, Linux-literate embedded engineer