There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

lord_ryvan ,

ELI5 albeit a long one:

Your storage is like a book, with an index at the beginning. This index tells whatever computer reading it ā€œthe contents of ā€œMath Homework 5.odtā€ start on page 100 and ends on page 125ā€, for example.

When a new file needs to be stored, the computer only has to quickly read the index, find a spot in the book with empty pages, and write the file on those pages.

Nkw, when you delete a file, the computer will only erase the index, which is much quicker. Math Homework 5.odt is gone so more another file can be written onto pages 100 through 125!

A thief getting their hands on your storage could still read the part with your fileā€™s content on it, though, so itā€™s not safe!

ā€œSecure deleteā€ means the computer will not only erase the index entry, but even every letter from every page related to your fileā€™s content. This takes a long time, but a thief trying to read those pages will simply see blank pages, so thatā€™s why itā€™s safe!

Nibodhika ,

Your disk is like a file cabinet, thereā€™s also an index folder where for example it says that ā€œyour file.txtā€ is in cabinet C7. You go there and thereā€™s a sheet of paper written in pencil with the contents of your file. In this analogy hereā€™s how several solutions work:

  • Delete the file: throw away the index folder. Now if you need to write to disk you might think C7 is free and when you go there to write something else you find the old paper, which you erase and write on top. But if someone gets to your cabinet before that and they open C7 your file Will be there in its entirety, there just isnā€™t an index telling you which cabinet to open.
  • Zero wipe: you go to C7, erase the file, and then throw away the index. Now if someone gets to your cabinet they might go to C7 but all they see is a white sheet of paper. However itā€™s technically possible with a white sheet of paper to see what was written before, so this is considered better but not perfect.
  • Random wipe: same as before, except you erase and write random stuff on the sheet of paper. So it becomes a lot more difficult to recover what was there.
  • Multiple passes: Same as before, but you do this several times, so after dozens of random writes your original data should be completely impossible to recover.
LainTrain , (edited )

Itā€™s worth mentioning that the OS index is what gets deleted when a file is deleted, the SSD is untouched by this, but SecureErase is a special command sent to the SSD controller inside the unit that deletes its own index of what entries correspond to which 1s and 0s on which separate internal NAND flash chips (and dies, planes, blocks and pages) and in what order. This makes recovering data very very difficult even if the actual data is not overwritten in any way, because SSDs will often write in parallel for speed, which renders the oldest most bruteforcry digital forensic technique in the book on HDDs - simply transplanting the platters into a different drive, imaging them into hex and looking for file headers and subsequent zeroes (to identify empty space after a file) and reading in files as if they were written linearly to see what comes out.

Thatā€™s as I understand it though.

slazer2au ,

It depends on the who made it.

If your hard drives are encrypted then it doesnā€™t delete the data, it deletes the encryption key which makes the data effectively unrecoverable, while others will take the existing ones and zeros of data and turn them all into ones, then turn them all into zeros and repeat 3 or 4 times just to be sure.

vzq ,

Hot take: Itā€™s what old farts used to use back in the day.

These days you should just use encrypting file systems with per-file keying (like eg APFS) and stop worrying about deletion leaving file data around.

JackGreenEarth ,

I donā€™t want to encrypt my drive in case I forget the encryption key and lose all my data

naeap , (edited )
@naeap@sopuli.xyz avatar

Yeah, Iā€™m having a hard time deciding about that.

On the one hand Iā€™m often in business trips and want to be at least able to recover my data easily if something happens.

On the other hand getting the laptop stolen with all the data is a nightmare.

Didnā€™t look into current solutions for quite some time though. As Iā€™m currently waiting for a new laptop, this could be a good time to check something out.
Anyone with some suggestions? (Will look into the encrypted FS OP recommended, but having options and opinions never hurts)

Edit: ok, just realised that APFS is Apple File System. So thatā€™s not gonna roll for me, as Iā€™m on Linux and would like to have something thatā€™s actually designed and developed for it. Donā€™t know anything about Linux APFS support, but Iā€™m a bit traumatised by NTFS and anyway I donā€™t want to have anything to do with Apple

Anyone with experience with encrypted LUKS and data recovery?
Some buzzwords for options would also greatly help me
Thanks for anything in advance!

GamingChairModel ,

3-2-1 backup is important. Iā€™ve been burned with lost files before, so I now make sure theyā€™re available in multiple places.

I also encrypt everything. My laptops canā€™t be unlocked by anyone except myself: Apple Filevault on my Apple laptop, LVM on LUKS on my Linux laptop. If something happens to me, my laptops must be wiped completely to be useable as a used device.

My NAS keeps my backups of all my documents and media (and as a hobbyist photographer, I have over a terabyte of photos and videos Iā€™ve taken). Itā€™s encrypted, but Iā€™ve written the key down on paper and put it in my physical documents. If something happens to me, someone who goes through my physical documents will have access to my digital files.

I pay a cloud service (Backblaze) for cloud backups. I trust the encryption and key management to not actually give the service provider any access to my files.

naeap ,
@naeap@sopuli.xyz avatar

Thanks!

Just one question: How do you sync your photos to your NAS on the go?

GamingChairModel ,

I sync if I have a good Internet connection, like from my hotel room or whatever, by VPNing into my home network where my NAS is. There are distributed DNS type solutions for a lot of the big NAS brands, where theyā€™ll let you access your data through their service, but I never set that up because I already have a VPN. So my NAS and firewall are configured not to allow outside connections to that device.

But if I havenā€™t synced laptop to NAS yet, then copies exist on both my camera SD cards (redundant double SD card) and my laptop.

naeap ,
@naeap@sopuli.xyz avatar

Ah, alright
I currently use wireguard to access my home LAN. just hoped you had done experience with a nice system, so you donā€™t need to do it by hand - especially syncing my smartphone photos.
Maybe Iā€™ll give immich another chance

Thanks for the answers! :-)

vzq ,

Fair point. Data integrity and availability concerns often trump confidentiality.

Still, if your main concern is safe disposal rather than preventing unauthorized access, most major operating systems have ways to ensure continued access.

BenM2023 ,
@BenM2023@lemmy.world avatar

One thing other answers have missed is that some ssds encrypt data before writing and obviously after reading (this prevents a swap the storage controller type attack) A secure erase on such a device consists of changing the read/write key. Takes milliseconds. Irrevocable (unless you find a way to read previous contents of the key storage)

xnx ,

Where do people see a secure erase option?

bjoern_tantau ,
@bjoern_tantau@swg-empire.de avatar

Less of an option and more of choosing the right tool to do the trick.

In day-to-day life I might not care how files are deleted. But when I intend to sell my drive on ebay or so I would make sure that really all the data ia gone.

xnx ,

But how do you choose secure erase? A program or what

Trail ,

Yes.

Oisteink ,

Thereā€™s likely usb-keys to boot

Nollij ,

This is an option in the BIOS (UEFI) of certain PCs. I can confirm it exists on a number of HP Elitebook models.

TheBananaKing ,

Most of these answers are mostly right: deleting a file on disk doesnā€™t actually erase the data, it just marks the space as available to write over - meaning that so long as nobodyā€™s used the space since, you can go retrieve the contents with an undelete utility.

Most of the time, people donā€™t care - but if for instance youā€™re selling the PC or thereā€™s highly sensitive information involved, that might not be good enough.

As such, there are utilities that can go out and specifically overwrite the contents of a file with all zeroes, so ensure that itā€™s dead-dead - and there are other utilities that can do the same to an entire disk.

Thereā€™s one wrinkle: Magnetic HDDs donā€™t reliably erase and overwrite completely in a single pass; just like rubbing out pencil writing, it can leave faint impressions under the new content, and it is actually possible (with serious effort by forensic recovery people) to glean some of the previous content. If thereā€™s serious money / security at stake, a simple overwrite is not enough, so thereā€™s software that certifiably-randomly scribbles over each bit, seven times over, making the chances of recovering the original astronomically slim. Again, this can be done for individual files or the entire disk.

SSDs arenā€™t prone to leftover impressions, thankfully - whatā€™s gone is gone. And they have one other neat feature: while a magnetic disk can only be erased one bit at a time, so large disks can take hours - SSDs can just open the floodgates and ground every cell at once, fully erasing the entire disk in an instant.

This instant-erase, while comprehensiveā€¦ returns before youā€™ve even taken your finger off the ENTER key, so fast it feels like it canā€™t possibly have done anything, it must be broken, how can I trust it? So BIOS manufacturers hype it up, call it something impressive to underline that itā€™s big and powerful, and actually impose a 10-second countdown to make it feel like itā€™s doing something complicated.

Any of these different things have been called ā€˜secure eraseā€™ at various points, so itā€™s a little context dependent. But from the end-user perspective: this data is getting shredded then incinerated then added to cattle feed; itā€™s not coming back.

KISSmyOSFeddit ,

Thereā€™s one wrinkle: Magnetic HDDs donā€™t reliably erase and overwrite completely in a single pass; just like rubbing out pencil writing, it can leave faint impressions under the new content, and it is actually possible (with serious effort by forensic recovery people) to glean some of the previous content.

No, itā€™s not. At least it has never been done on more than single bits, with an accuracy higher than 50% (which means even when trying to restore a single byte, your chances of it being correct are 1/256).

fulcrummed ,

Iā€™ll take a shot at the metaphor. Delete: telling someone they can use the whiteboard (but you didnā€™t erase it) Secure: cleaning it off when youā€™re done for the next user.

stevedidwhat_infosec ,

Computers use an address to tell it where the data is stored on your memory drive

Erase just deleted the address referencing the location, meaning other things can overwrite it.

Secure erase actually deletes the address and overwrites the data that was at where the address was pointing to. Sometimes itā€™s all zeros, some programs will write random crap over it

Glowstick ,

Thereā€™s a map that shows where every file on your disk is. Doing a regular trash just erases the map pointer for that file, but the 1s and 0s that the file is made of are still sitting there on your disk. Secure erase writes 0s into that area on the disk, so even if you knew where that file used to be located on the disk, now youā€™ll just find 0s there, instead of finding the 1s and 0s of the old file.

ozymandias117 ,

With an HDD, your operating system can (mostly) directly access bits on the magnetic disks, so you can wipe them by just writing 0 to it over and over (historically, there was a paper saying 7 times would make any bits unrecoverable - this changed as density got higher)

With SSDs, your operating system has very little control over what bits a write is touching, a lot more was moved into the firmware on the flash memory itself

So SSDs need a special command ā€œSecure Eraseā€ to wipe them

KISSmyOSFeddit ,

Itā€™s worth it to mention that after a single pass it was possible to recover single bits with an electron microscope, but not even a full byte. One pass has always been enough to delete actually meaningful data.

ozymandias117 ,

Yeah, and as densities have increased, fewer passes have been needed to even do that

Darorad ,

When you normally delete a file, it doesnā€™t actually delete it, to save time it just marks the space as free, so any new files can be written into that part of your drive.

But the actual data just remains there until a new file is written to the storage.

SecureErase does the second part without making an actual file.

Normal delete:

File: 01010101 -> no file:01010101

Secure erase:

File: 01010101 -> no file:00000000

KISSmyOSFeddit ,

Thatā€™s overwriting on a HDD. secure erase on an SDD throws away the key telling the controller what 01010101 means.

Anticorp ,

Normal delete just marks things as deleted, freeing up that space to be overwritten later, but the original data is still there until it is overwritten. Secure delete overwrites the data with random 1ā€™s and 0ā€™s, so it is actually gone and canā€™t be recovered. Itā€™s the difference between throwing a physical document into the trash, but not taking the trash out, or instead putting the physical document through the shredder and then burning the shredded paper. In the first example anyone with access can reach into the trash can and read your document, and in the second example itā€™s unrecoverable.

Hobbes_Dent ,

Erase takes the address off your mailbox and leaves the mail in it for the next resident to use. Secure erase opens it and scritches off all the words from your mail. Takes time though.

SpaceNoodle ,

Perfect ELI5

  • All
  • Subscribed
  • Moderated
  • Favorites
  • ā€¢
  • [email protected]
  • random
  • lifeLocal
  • goranko
  • All magazines