summaryrefslogtreecommitdiffstats
path: root/README.md
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-05-13 12:02:29 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-05-13 12:02:29 +0000
commit751ac5be401fcb4b633a5ea3116de2f9d7452bbb (patch)
tree442d9b37f3c5f5d306a9eef7b35363b78ac1c5a3 /README.md
parentAdding upstream version 0.36. (diff)
downloadnwipe-upstream/0.37.tar.xz
nwipe-upstream/0.37.zip
Adding upstream version 0.37.upstream/0.37upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to '')
-rw-r--r--README.md7
1 files changed, 6 insertions, 1 deletions
diff --git a/README.md b/README.md
index a864f7e..824719e 100644
--- a/README.md
+++ b/README.md
@@ -30,10 +30,15 @@ The user can select from a variety of recognised secure erase methods which incl
* Verify Ones - This method only reads the device and checks that it is filled with ones (0xFF).
* HMG IS5 enhanced - Secure Sanitisation of Protectively Marked Information or Sensitive Information
-nwipe also includes the following pseudo random number generators:
+nwipe also includes the following pseudo random number generators (prng):
* Mersenne Twister
* ISAAC
+ In addition to the above, the following prngs will be available in v0.37
+* XORoshiro-256
+* Lagged Fibonacci
+* AES-CTR (openssl)
+
These can be used to overwrite a drive with a stream of randomly generated characters.
nwipe can be found in many [Linux distro repositories](#which-linux-distro-uses-the-latest-nwipe).