Greg, (edited )
@Greg@lemmy.ca avatar

Fill the drive 100% using data duplicator then delete everything on the drive. Repeat a few times to ensure you scrub all blocks. There is no need to physically destroy the drive.

edit: fair criticism of this approach in cases when the data is unencryptd and the hard drives has bad blocks. I just wanted to give a counter to the destroying hardware approach which isn’t necessary warranted

ramble81,

That doesn’t work with SSDs anymore. Their controllers map “bad” blocks which are put in an RO state and writes no longer go there but data still exists. There is usually a buffer of extra space so you do see the capacity loss, but if you bypass the controller you can still read the data there.

Greg,
@Greg@lemmy.ca avatar

That’s fair, I can appreciate an attack vector in cases where there are bad blocks and the drive was unencrypted. Luckily bad blocks are less common with modern SSDs and assuming the disk was encrypted, a few bad blocks are unlikely to expose any contents. So knowing the number of bad blocks and what data was stored would inform if a fill and empty approach would be suitable to sanitize the drive.

sylver_dragon,

This article covers several methods. Personally, I’d look for a BIOS based tool first, as that would be free and easiest. After that, the Diskpart Clean All command is probably fine for anything other than Top Secret data which a government based threat actor would be willing to put a lot of resources into recovering. If it’s just your tax documents and porn archive, no one is going to care enough to dig out anything which that command might have left behind.

skullgiver, (edited )
@skullgiver@popplesburger.hilciferous.nl avatar

deleted_by_author

  • Loading...
  • krash,

    If running linux, what command should be run? Shred isn’t viable on a SSD, as it will only tear them down. Shred was designed with HDD in mind.

    Smoke,
    @Smoke@frogdrool.net avatar

    @krash @skullgiver

    if the value of the compromised data exceeds the value of the drive, destroy the drive.

    frankyboi, (edited )

    Install all your steam library to full your SSD. Should do the job. Empty the disk, rinse and repeat a few times.

    CyberDine, (edited )

    NSA requires the use of a industrial shredder that can grind the components into pieces less than 2mm.

    ameri-shred.com/…/2mm-ssd-solid-state-drive-hamme…

    If you can’t do that, you should incinerate the drive at over 700 degrees.

    As far as wiping goes, a 3 pass overwrite alternating 0s and 1s is good enough as long as it’s done over the entire drive, not just the partition.

    BCWipe is good enough for this

    frankyboi, (edited )

    Dalvik boot and nuke.

    spez_,

    You smash it in 100 different places

    Bytemeister,

    Smash it to pieces, melt it down into a blob and drop it down a borehole at the nearest quarry

    potentiallynotfelix,

    If it’s really sensitive shit, you should beat the shit out of it with a sledgehammer and make sure you got all the nand modules(see diagram online), then throw parts of it into a large body of water, deeper the better

    diskmaster23,

    What about phones?

    TheAnonymouseJoker,
    @TheAnonymouseJoker@lemmy.ml avatar

    3 pass random data erase. If you are not going to use it again, a nice hammer.

    bloodfart,

    For an ssd you’ll have faster and better results with veracrypt, delete the key then call the drives secure erase.

    5220 was for media that actually gave the user real access to block level read and write. Nowadays even spinning media presents you with an abstraction.

    nutsack,

    i know this isn’t what is being asked, but disk level encryption is cool

    captain_aggravated,
    @captain_aggravated@sh.itjust.works avatar

    If it’s really an issue where “if the data on this SSD falls into the wrong hands, lives will be ruined” sort of thing, my favorite data security tool for this job is a bench grinder. Difficult to put the data back together when the flash chips are powder scattered throughout 14 different shop surfaces and at least two lungs.

    Adalast,

    I prefer thermite. Recover my data from a messy contaminated slag heap.

    SidewaysHighways,

    Be careful with lung butter though. Been betrayed before

    bloodfart,

    Call the devices secure erase functionality.

    here’s how to do it to sata and pata devices

    I don’t do some of the checking and testing in that article, I just do —security-erase-enhanced and unless it fails it’s fine.

    You could also encrypt the contents and delete the key.

    TedZanzibar,

    This is the correct answer. Due to wear levelling, a traditional drive wipe program isn’t going to work reliably, whereas most (all?) SSDs have some sort of secure erase function.

    It’s been a while since I read up on it but I think it works due to the drive encrypting everything that’s written to it, though you wouldn’t know it’s happening. When you call the secure erase function it just forgets the key and cycles in a new one, rendering everything previously written to it irrecoverable. The bonus is that it’s an incredibly quick operation.

    Failing that, smash it to bits.

    Dark_Arc, (edited )
    @Dark_Arc@social.packetloss.gg avatar

    And if you’re hiding from a nation state … don’t trust that, smash it to bits and dispose of them at different trash collection locations 🙂

    PM_Your_Nudes_Please,

    Are you considering using the drive afterwards? Because “toss it in a microwave for like 5 minutes” is always a valid answer if you’re not worried about reusing it.

    Dark_Arc,
    @Dark_Arc@social.packetloss.gg avatar

    Presumably there’s a risk of damaging the microwave?

    arin,

    If you want to cook with it yeah, but if it’s a junk toy then it’s practically indestructible

    Brkdncr,

    So many people here responding with outdated misinformation.

    KISSmyOSFeddit,

    Whoever might need, for whatever reason, to write on a parchment sheet which had already been written, should take some milk and should put the parchment in it for one night’s time. As soon as it is taken out, it should be strewn with flour in order that it not be wrinkled after it begins to dry, and so as to be kept under pressure until it dries out. After it is done, the parchment will regain its former quality, shining and lucid, by means of pumice stone and chalk.

    Aussiemandeus,
    @Aussiemandeus@aussie.zone avatar

    Thank you I’ve been reading comments all day to get the right information

    MNByChoice,

    If it is a large concern, then encryption will help. There are even drives with built-in encryption exactly for this purpose.

    Otherwise, will with non-repeated data. Repeat 9 times. (A heuristic, based on something I read 10 years ago.)

    Do not use repeated digits. Those are optimized out.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • asklemmy@lemmy.ml
  • DreamBathrooms
  • magazineikmin
  • Durango
  • thenastyranch
  • Youngstown
  • slotface
  • hgfsjryuu7
  • osvaldo12
  • rosin
  • kavyap
  • mdbf
  • PowerRangers
  • everett
  • khanakhh
  • anitta
  • InstantRegret
  • tacticalgear
  • vwfavf
  • ethstaker
  • ngwrru68w68
  • normalnudes
  • tester
  • GTA5RPClips
  • cubers
  • cisconetworking
  • Leos
  • modclub
  • provamag3
  • All magazines