re Even if you format the disk and reinstall completely, it's still infected.
I presume you mean that, via the boot-kit the MBR-dance remains, faking-out the new 'install' as before.
So then, if HD is removed, erased say, in a *nix box and all bits set to (00000 or whatever) -- is that sufficient?
(Or is the base-format itself changed by the boot-kit, such that the special n sectors appear to be "(B)ad", also a clue?)
Would latest SpinRite handle the mangled sectors via its recovery scrubbing, then ID-ing the oddly-formatted "secret/Bad" sectors?
Maybe seeing the 'damage' as merely a need for a sector-level base-format rewrite.
Would that process not restore hygiene, or am I missing something more subtle?
(You say 'unallocated space', mayhap some few bytes in-between Partitions, thus never available for normal data R/W?)
I don't know how SpinRite treats such anomalous places, though clearly the entire base-format is rewritten on every full run, cylinder by cylinder.
Which should catch these moles I'da thunk..
In any event, for 99% of users who would comprehend none of this -- how long, do ya guesstimate? before the IntarWeb majority has an epiphany
== generally comes to realize that the game has entered a new dimension / that Redmond still flunks security 101
... and a (very)-critical-mass goes viral with multiple horror stories ??
And we haven't yet had WCW-1, yet [World-Cyber-War] -- the practical application of [n!] writ Large.
YPB--millions, eh?