Convenient Secrets In Secure Data Destruction - Some Thoughts