Dumpster-Diving Attack: Difference between revisions

Fix typo
Clipster (talk | contribs)
Tags: Mobile edit Mobile web edit
Line 4: Line 4:


==How it works==
==How it works==
Due to how most storage devices work, files that are deleted by the user are not immediately deleted; instead, they are marked as available to be overwritten.{{CitationNeeded}} This allows deleted files on disposed storage devices to be recovered using data recovery tools.
Due to how most storage devices work, files that are deleted by the user are not immediately deleted; instead, they are marked as available to be overwritten.<ref> https://www.howtogeek.com/125521/htg-explains-why-deleted-files-can-be-recovered-and-how-you-can-prevent-it/</ref> This allows deleted files on disposed storage devices to be recovered using data recovery tools.


This attack is not limited to storage devices; paper records can also be used to extract sensitive information.
This attack is not limited to storage devices; paper records can also be used to extract sensitive information.