There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

CyberDine , (edited )

NSA requires the use of a industrial shredder that can grind the components into pieces less than 2mm.

ameri-shred.com/…/2mm-ssd-solid-state-drive-hamme…

If you can’t do that, you should incinerate the drive at over 700 degrees.

As far as wiping goes, a 3 pass overwrite alternating 0s and 1s is good enough as long as it’s done over the entire drive, not just the partition.

BCWipe is good enough for this

frankyboi ,

Dalvik boot and nuke.

frankyboi ,

Install all your steam library to full your SSD. Should do the job. Empty the disk, rinse and repeat a few times.

TheAnonymouseJoker ,
@TheAnonymouseJoker@lemmy.ml avatar

3 pass random data erase. If you are not going to use it again, a nice hammer.

bloodfart ,

For an ssd you’ll have faster and better results with veracrypt, delete the key then call the drives secure erase.

5220 was for media that actually gave the user real access to block level read and write. Nowadays even spinning media presents you with an abstraction.

spez_ ,

You smash it in 100 different places

kotauskas ,
@kotauskas@lemmy.blahaj.zone avatar

A special feature known as SSD secure erase. The easiest OS-independent way is probably via CMOS setup – modern BIOSes can send secure erase to NVM Express SSDs and possibly SATA SSDs.

User_already_exist OP ,

Did this already, it took 1 second for a 2TB drive. Would you trust that?

WhatAmLemmy , (edited )

Most SSD/flash secure erase methods involve the storage having full disk encryption enabled, and simply destroying the encryption key. Without the encryption key the data can’t be deciphered even with the correct password, as the password was only used to encrypt the encryption key itself. This is why you can “factory reset” an iPhone or Android in seconds.

skullgiver , (edited )
@skullgiver@popplesburger.hilciferous.nl avatar

deleted_by_author

  • Loading...
  • User_already_exist OP ,

    Thanks for this informative answer. Then it would make sense that it took only 1 second, then again, I have a modern Asus motherboard (AM5) with a Western Digital NVMe drive, and that drive isn’t listed as Secure Erase compatible on Asus motherboard. I will download the WD dashboard and do it that way, I didn’t know it existed before I posted this question.

    lud ,

    TEMU/Wish/Aliexpress SSD

    I wouldn’t trust any computer part from those places.

    mark3748 ,

    It is the only approved method for data destruction for the several banks and government agencies I support. If they trust it, I trust it.

    I have checked a couple of times out of curiosity, after a secure erase the drive is as clean as if it had been DBANed. Sometimes things are standards because they work properly.

    KISSmyOSFeddit ,

    Yes. SSDs are different from HDDs.

    PM_Your_Nudes_Please ,

    Are you considering using the drive afterwards? Because “toss it in a microwave for like 5 minutes” is always a valid answer if you’re not worried about reusing it.

    Dark_Arc ,
    @Dark_Arc@social.packetloss.gg avatar

    Presumably there’s a risk of damaging the microwave?

    arin ,

    If you want to cook with it yeah, but if it’s a junk toy then it’s practically indestructible

    Bytemeister ,

    Smash it to pieces, melt it down into a blob and drop it down a borehole at the nearest quarry

    Brkdncr ,

    So many people here responding with outdated misinformation.

    KISSmyOSFeddit ,

    Whoever might need, for whatever reason, to write on a parchment sheet which had already been written, should take some milk and should put the parchment in it for one night’s time. As soon as it is taken out, it should be strewn with flour in order that it not be wrinkled after it begins to dry, and so as to be kept under pressure until it dries out. After it is done, the parchment will regain its former quality, shining and lucid, by means of pumice stone and chalk.

    Aussiemandeus ,
    @Aussiemandeus@aussie.zone avatar

    Thank you I’ve been reading comments all day to get the right information

    Unyieldingly ,
    Catsrules ,

    Does it have to be from orbit?

    What if the drive is not on a planet?

    Aussiemandeus ,
    @Aussiemandeus@aussie.zone avatar

    Then you need to aim really well and time your orbit

    captain_aggravated ,
    @captain_aggravated@sh.itjust.works avatar

    If it’s really an issue where “if the data on this SSD falls into the wrong hands, lives will be ruined” sort of thing, my favorite data security tool for this job is a bench grinder. Difficult to put the data back together when the flash chips are powder scattered throughout 14 different shop surfaces and at least two lungs.

    SidewaysHighways ,

    Be careful with lung butter though. Been betrayed before

    Adalast ,

    I prefer thermite. Recover my data from a messy contaminated slag heap.

    potentiallynotfelix ,

    If it’s really sensitive shit, you should beat the shit out of it with a sledgehammer and make sure you got all the nand modules(see diagram online), then throw parts of it into a large body of water, deeper the better

    muntedcrocodile ,

    Encrypted volume and burn the encryption key

    Winbombs ,

    This is how storage services attest to a secure wipe.

    muntedcrocodile ,

    But I wouldn’t trust anyone else with said encryption key who knows if its going straight to the CIA or not.

    Dark_Arc ,
    @Dark_Arc@social.packetloss.gg avatar

    That’s better for prevention than after the fact for the wear leveling reasons others have mentioned.

    bloodfart ,

    Call the devices secure erase functionality.

    here’s how to do it to sata and pata devices

    I don’t do some of the checking and testing in that article, I just do —security-erase-enhanced and unless it fails it’s fine.

    You could also encrypt the contents and delete the key.

    TedZanzibar ,

    This is the correct answer. Due to wear levelling, a traditional drive wipe program isn’t going to work reliably, whereas most (all?) SSDs have some sort of secure erase function.

    It’s been a while since I read up on it but I think it works due to the drive encrypting everything that’s written to it, though you wouldn’t know it’s happening. When you call the secure erase function it just forgets the key and cycles in a new one, rendering everything previously written to it irrecoverable. The bonus is that it’s an incredibly quick operation.

    Failing that, smash it to bits.

    Dark_Arc ,
    @Dark_Arc@social.packetloss.gg avatar

    And if you’re hiding from a nation state … don’t trust that, smash it to bits and dispose of them at different trash collection locations 🙂

    diskmaster23 ,

    What about phones?

    nutsack ,

    i know this isn’t what is being asked, but disk level encryption is cool

  • All
  • Subscribed
  • Moderated
  • Favorites
  • [email protected]
  • random
  • lifeLocal
  • goranko
  • All magazines