HowMany,

Smash them with a hammer until they’re sand.

Fosheze,

Crack it open and run s drill through the center of each flash chip.

Unyieldingly,
Catsrules,

Does it have to be from orbit?

What if the drive is not on a planet?

Aussiemandeus,
@Aussiemandeus@aussie.zone avatar

Then you need to aim really well and time your orbit

WhatAmLemmy, (edited )

For all average user requirements that just involve backups, PII docs, your sex vids, etc (e.g. not someone who could be persecuted, prosecuted, or murdered for their data) your best bet (other than physical destruction) is to encrypt every usable bit in the drive.

  1. Download veracrypt
  2. Format the SSD as exFAT
  3. Create a new veracrypt volume on the mounted exFat partition that uses 100% of available space (any format).
  4. open up a notepad and type out a long random ass throwaway password e.g. $-963,;@82??/@;!3?$.&$-,fysnvefeianbsTak62064$@/lsjgegelwidvwggagabanskhbwugVg, copy it, and close/delete without saving.
  5. paste that password for the new veracrypt volume, and follow the prompts until it starts encrypting your SSD. It’ll take a while as it encrypts every available bit one-by-one.

Even if veracrypt hits a free space error at the end of the task, the job is done. Maybe not 100%, but 99.99+% of space on the SSD is overwritten with indecipherable gibberish. Maybe advanced forensics could recover some bits, but a) why the fuck would they go to that effort for a filthy commoner like yourself, and b) what are the chances that 0.01% of recoverable data contains anything useful!?! You don’t really need to bother destroying the header encryption key (as apple and android products do when you wipe a device) as you don’t know the password and there isn’t a chance in hell you or anyone else is gonna guess, nor brute force, it.

skullgiver, (edited )
@skullgiver@popplesburger.hilciferous.nl avatar

deleted_by_author

  • Loading...
  • otp,

    If you want to keep/sell the drive…

    1. Fill up the rest of the usable space
    2. Encrypt the drive
    3. Throw away the encryption key/password
    4. Hard format (writing zeroes to every bit, sorry if that’s the wrong term

    Is that the best strategy? Or is anything outside of 2 and 3 redundant?

    Brkdncr,

    You can’t fill the drive. The drive decides when to use its buffered free storage blocks. It’s at the hardware level and only the Secure Erase command will clear it.

    _edge,

    You fill up the usable space. Or the visible space. No one will disamble the device and read from the raw storage.

    Brkdncr,

    Then why do that when you can do a secure erase in seconds?

    otp,

    Right, I read some more of the comments and realized that’s what some of the “unreported space” is used for. Makes sense, thanks!

    skullgiver, (edited )
    @skullgiver@popplesburger.hilciferous.nl avatar

    deleted_by_author

  • Loading...
  • otp,

    That makes sense. Thank you!

    WhatAmLemmy,

    a) why the fuck would they go to that effort for a filthy commoner like yourself, and b) what are the chances that 0.01% of recoverable data contains anything useful!?!

    Nobody is gonna bother doing advanced forensics on 2nd hand storage, digging into megabytes of reallocated sectors on the off chance they to find something financially exploitable. That’s a level of paranoia no data supports.

    My example applies to storage devices which don’t default to encryption (most non-OS external storage). It’s analogous to changing your existing encrypted disks password to a random-ass unrecoverable throwaway.

    krolden,
    @krolden@lemmy.ml avatar

    Microwave

    ininewcrow,
    @ininewcrow@lemmy.ca avatar
    Brkdncr,
    • Secure erase using the drive OEMs tool.
    • If you were using something like bitlocker then simply dump the key.
    • Wood chipper or some other form of absolute physical destruction.
    protokaiser,

    I hear thermite is good at destroying things.

    TexMexBazooka,

    With fire

    muntedcrocodile,

    Encrypted volume and burn the encryption key

    Dark_Arc,
    @Dark_Arc@social.packetloss.gg avatar

    That’s better for prevention than after the fact for the wear leveling reasons others have mentioned.

    Winbombs,

    This is how storage services attest to a secure wipe.

    muntedcrocodile,

    But I wouldn’t trust anyone else with said encryption key who knows if its going straight to the CIA or not.

    n3m37h,
    kotauskas,
    @kotauskas@lemmy.blahaj.zone avatar

    A special feature known as SSD secure erase. The easiest OS-independent way is probably via CMOS setup – modern BIOSes can send secure erase to NVM Express SSDs and possibly SATA SSDs.

    User_already_exist,

    Did this already, it took 1 second for a 2TB drive. Would you trust that?

    skullgiver, (edited )
    @skullgiver@popplesburger.hilciferous.nl avatar

    deleted_by_author

  • Loading...
  • lud,

    TEMU/Wish/Aliexpress SSD

    I wouldn’t trust any computer part from those places.

    User_already_exist,

    Thanks for this informative answer. Then it would make sense that it took only 1 second, then again, I have a modern Asus motherboard (AM5) with a Western Digital NVMe drive, and that drive isn’t listed as Secure Erase compatible on Asus motherboard. I will download the WD dashboard and do it that way, I didn’t know it existed before I posted this question.

    KISSmyOSFeddit,

    Yes. SSDs are different from HDDs.

    WhatAmLemmy, (edited )

    Most SSD/flash secure erase methods involve the storage having full disk encryption enabled, and simply destroying the encryption key. Without the encryption key the data can’t be deciphered even with the correct password, as the password was only used to encrypt the encryption key itself. This is why you can “factory reset” an iPhone or Android in seconds.

    mark3748,

    It is the only approved method for data destruction for the several banks and government agencies I support. If they trust it, I trust it.

    I have checked a couple of times out of curiosity, after a secure erase the drive is as clean as if it had been DBANed. Sometimes things are standards because they work properly.

    Boomkop3,

    A microwave oven should do the trick

    SomeBoyo,

    doesn’t just overwriting the data work?

    kotauskas,
    @kotauskas@lemmy.blahaj.zone avatar

    No, “overwritten” data doesn’t actually get erased right away due to wear levelling. As SSDs get esoterically smart with how they prevent unnecessary erase operations, there’s no way to be sure without secure erase.

    SomeBoyo, (edited )

    overwriting the whole drive would fix that

    Starbuck, (edited )

    It actually doesn’t, because the drive won’t “let” you overwrite the reserve space. That’s why they introduced SSD secure erase, so the firmware knows that you mean to overwrite everything.

    Alternatively you could just use full disk encryption and burn the key when you are done.

    Page 36 of NIST 800-18r1

    nvlpubs.nist.gov/nistpubs/…/nist.sp.800-88r1.pdf

    Scholars_Mate,

    No. Modern SSDs are quite sophisticated in how they handle wear leveling and are, for the most part, black boxes.

    SSDs maintain a mapping of logical blocks (what your OS sees) to physical blocks (where the data is physically stored on the flash chips). For instance, when your computer writes to the logical block address 100, the SSD might map that to a physical block address of 200 (this is a very simplified). If you overwrite logical block address 100 again, the SSD might write to physical block address 300 and remap it, while not touching the data at physical block address 200. This let’s you avoid wearing out a particular part of the flash memory and instead spread the load out. It also means that someone could potentially rip the flash chips off the SSD, read them directly, and see data you thought was overwritten.

    You can’t just overwrite the entire SSD either because most SSDs overprovision, e.g. physically have more storage than they report. This is for wear leveling and increased life span of the SSD. If you overwrite the entire SSD, there may be physical flash that was not being overwritten. You can try overwriting the drive multiple times, but because SSDs are black boxes, you can’t be 100% sure how it handles wear leveling and that all the data was actually overwritten.

    Kyrgizion,

    Physical destruction. It’s the only way to be 100% sure.

    OmanMkII,

    For secure data destruction, either pay for it to be done properly, or create your own way of doing it. A decent sized drill bit can do all the work for you, at the cost of a new drive of course.

    bionicjoey,
    SkaveRat,

    Nuke it from orbit. Only way to be safe

    TexMexBazooka,

    A fellow Expeditionary Force enjoyer I see

    PerogiBoi,
    @PerogiBoi@lemmy.ca avatar

    ⬆️➡️⬇️⬇️⬇️

    EisFrei,

    A fellow enjoyer of democracy

    *Presses b

  • All
  • Subscribed
  • Moderated
  • Favorites
  • asklemmy@lemmy.ml
  • ethstaker
  • DreamBathrooms
  • everett
  • magazineikmin
  • Durango
  • InstantRegret
  • Youngstown
  • mdbf
  • slotface
  • rosin
  • thenastyranch
  • kavyap
  • GTA5RPClips
  • tacticalgear
  • JUstTest
  • cubers
  • cisconetworking
  • osvaldo12
  • khanakhh
  • ngwrru68w68
  • modclub
  • tester
  • anitta
  • normalnudes
  • Leos
  • provamag3
  • megavids
  • lostlight
  • All magazines