I understand traditional methods don’t work with modern SSD, anyone knows any good way to do it?

  • Skull giver
    link
    fedilink
    251 year ago

    Because of wear management and the way flash storage works, overwriting disks is even more useless for wiping data than it was on hard drives. Even on spinning rust there were plenty of files in relocated sectors, but on SSDs you get relocation behaviour and copied files without any actual damage to the disk.

    You can overwrite a file on your SSD with random numbers supposedly filling the entire file’s space, but under the hood the SSD could be like “erasing this block would wear down the disk too much, let’s just copy the block some place else and map the data offset to this new set of cells”. Modern SSDs also have extra storage capacity so that wear leveling can be done without reducing your storage space in the process, and cells the SSD deems to be too unstable will be copied and unmapped. Their data will still be there, but it won’t be accessible to the computer, even if you overwrite the entire drive.

    If you want to erase data, physically destroy the disk. If you want to prevent having to erase data, encrypt it (it’s on by default in Windows, Mac, and most Linux distros) so you only need to destroy the encryption key to make the data unreadable.

    • @[email protected]
      link
      fedilink
      61 year ago

      If you want to keep/sell the drive…

      1. Fill up the rest of the usable space
      2. Encrypt the drive
      3. Throw away the encryption key/password
      4. Hard format (writing zeroes to every bit, sorry if that’s the wrong term

      Is that the best strategy? Or is anything outside of 2 and 3 redundant?

    • @[email protected]
      link
      fedilink
      English
      31 year ago

      a) why the fuck would they go to that effort for a filthy commoner like yourself, and b) what are the chances that 0.01% of recoverable data contains anything useful!?!

      Nobody is gonna bother doing advanced forensics on 2nd hand storage, digging into megabytes of reallocated sectors on the off chance they to find something financially exploitable. That’s a level of paranoia no data supports.

      My example applies to storage devices which don’t default to encryption (most non-OS external storage). It’s analogous to changing your existing encrypted disks password to a random-ass unrecoverable throwaway.