[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y ] [Home]
4chanarchives logo
What is the best way to wipe and destroy a hard drive completely?
Images are sometimes not shown due to bandwidth/network limitations. Refreshing the page usually helps.

You are currently reading a thread in /g/ - Technology

Thread replies: 126
Thread images: 13
File: HD-2+degausser.png (164 KB, 500x216) Image search: [Google]
HD-2+degausser.png
164 KB, 500x216
What is the best way to wipe and destroy a hard drive completely? Assuming you know the FBI is coming to knock soon, and you have time to get ready.
>>
>>55527614
punch a hole in it
>>
Just burn down your house. Optionally with you inside it.
>>
>>55527614
stop hording kiddy porn
>>
>>55527614
Use them as target practice, with a howitzer.
>>
>>55527614
Find out if it will blend
>>
File: theproblemsolver.jpg (1 MB, 2448x2448) Image search: [Google]
theproblemsolver.jpg
1 MB, 2448x2448
>>
>>55527614
>Assuming you know the FBI is coming to knock soon
Well they are, now.
Have fun in prison, pedo.
>>
>>55527614
Drop it into a vat of boiling steel.
>>
>>55527614
Disassemble it and use a power tool like a belt sander to grind the discs into a powder.
>>
Install junk cleaning software
>>
>>55527614
Over writing a drive once will do. If you want to destroy the drive, shattering the platters will also do. Because of the density of modern storage, they'll need an electronic microscope to read each bit and that's not a feasible way to extract data. They *might* be able to pin something on you in five years. Maybe.
>>
>>55527640
Underrated post
>>
>>55527614
Just use some tool to overwrite it once
>>
DIY and in a hurry ? Ice axe and hammer, punch a hole in the fucker. Drilling is not enough, since it would lack the necessary pressure to damage the disk. A simple hole with a drill will leave the disk readable.
>>
>>55527614
>get the lid off
>power it up
>scrach entire surface of the disc with any siutable piece of metal
>flip disc upside down and repeat
>>
>>55527614
Thermite
>>
File: with a magnet you fucker.jpg (23 KB, 552x157) Image search: [Google]
with a magnet you fucker.jpg
23 KB, 552x157
>>55527614
>>
Stupid pedo, all the evidence is in NSA computers. The disk is irellevent
>>
>>55529363
I don't see how a wood-eating insect could do anything to titanium platters, anon.
>>
>>55527873
>>55527837

This. It's a huge misconception that overwriting your drives 7+ drives is more secure.

It's not, you're just killing your drives.
>>
File: 1465160357821.png (877 KB, 999x1024) Image search: [Google]
1465160357821.png
877 KB, 999x1024
>>55527614
>using HDDs
you deserve to get fucked
>>
I don't know why this debate even exists.
You should encrypt everything all the time anyway.
Why don't you?
>>
>>55529436
This

Full disk encryption is a must, even have a bootloader on separate media, maybe flash usb/sd card so if hdd is seized no evidence will be found.
>>
As many others have said, open the enclosure and destroy the platters.

I mean, destroy. Like into dust.
>>
>>55529429
How do you store your doujins then faggot
>>
>>55529503
SSDs
>>
>>55529503
Pururin?
Ha ha
Don't respond to bait.
>>
Have an angle grinder close by.
Then a bucket of corrosive liquid and bunch of magnets at the bottom alternatively electrify the liquid.

Cut into the drive, preferably into the discs, throw it into the bucket.

Waddup nsa.
>>
In the jurassic park movie, the hacker used these magnets on his computers. I don't know if that would do anything to the hard drive.
>>
>>55527614
Wipe the data and overwrite the entire drive, including empty space, once/one pass, that should be enough. Because some of "empty space" still contains deleted data because of magnets. Install something like recuva to see if you can get anything back, if not then congrats. Additionally you could fill the entire drive with millions of copies of an image saying "Nice try FBI".
>>
>>55529725
>Additionally you could fill the entire drive with millions of copies of an image saying "Nice try FBI"
I'm gonna write a new wiping methods that does this and become a millionaire. See ya suckers!
>>
high powered electromagnet. you can find instructions on how to build one and if someone shows up you turn it on then move it next to your hard drives. or use dragon dildos.
>>
>>55527614
Write random data in two passes then physically destroy the drive platters in your preferred way.
>>
>>55529405
Not sure if full retard or trying to be funny.
>>
1 write pass, 2 or more if you are paranoid.


The problem with physical destruction is that each square inch of the platter holds hundreds of gigabytes of data.
With enough resources they could potentially extract files from the platter area that isn't damaged.
>>
>>55527614
I use a coffee can of termite. I would love to see the cops bring that data back.
>>
You're all idiots. If you try to destroy your data you will be charged with destruction of evidence when the feds arrive. If they were coming to your house, they already had enough evidence to arrest you and this will just add to your sentence.
>>
>>55532700
You are correct here, but being charged with destroying data might be better than facing the charges for whatever you might have on the computer.

Same reason drunk drivers have an incentive to flee the scene of the accident.
Better to get charged for fleeing than DUI since the latter carries a might harsher penalty.
>>
>>55532700
What obligation do I have to preserve anything before a search warrant has been served?
>>
>>55527614
I'm interested in knowing what the fuck it is you faggots in this thread are doing that is so illegal.
>>
>Customer requests Data Erased
Screwdriver through Platters
>Customer doesn't request anything
Add platters to the ever growing Platter Snake.

So far Ive Zip-Tied Somewhere around 300 Platters together like Christmas Garland.
>>
Overwrite the entire thing with random shite and then drill a few holes in it. Make sure one of those holes is the cache.
>>
Sledgehammer the fuck out of it and hide it under something like a loose plank in the kitchen
>>
aqua regia
>>
>>55527614
Hello there fellow OP!

I'll wipe your hard drive for you.

just send it to my home address: 601 4th St NW, Washington, DC 20535

remember to provide as much personal information as you can! for the lulz :^)
>>
>>55527614
Get infected with a cryptolocker virus
>>
>>55532982
>I'm interested in knowing what the fuck it is you faggots in this thread are doing that is so illegal

Trying to use /dev/urandom to generate CP images
>>
>>55532982
I masturbate to anime style drawings of little girls. It's not illegal in my country, yet, but a maniac will soon run this place so I'm preparing.
>>
>>55533557
This with a syringe through the "Do Not Cover This Hole"
Mix inside the HDD or the needle might dissolve too.
>>
Hammers.

No but really, just empty your recycle bin.
>>
>>55529410
I'd go for twice if you're paranoid. Once is "I'm not a drug lord" tier.
>>
Not one person has mentioned DBAN
>>
Its called a sledge hammer you fucks
>>
>>55533763

These kids these days
>>
>>55527614
>mix up some thermite (its cheap and easy)
>build a little lincoln log thing to hold the thermite above your HD platters
>put a piezo lighter set up to auto fire after you hit a button
done, bye, kthx
>>
>>55527614
take it apart and rub a magnet over the metal discs
>>
>>55527784
See also: Degaussing coil
>>
>>55527640
No, not optionally.
>>
File: musketsComparison.jpg (532 KB, 864x720) Image search: [Google]
musketsComparison.jpg
532 KB, 864x720
>>55527614
Go /k/commando on it
>>
>>55527614
How did not anyone suggest the actual method?

Magnets.
>>
>>55527614
encrypt everything and throw away the key
>>
>>55534362
Technically it's just the threaded barrel making that a scurry salt weapon. The rest is moot since the weapon is not self loading. I also have no doubt George Washington would have kept some of the wood on there, he was a classy guy. His false teeth were made of ivory.
>>
>>55527614
This lists the trusted methods to successfully wipe a drive: http://www.killdisk.com/dod.htm

Example for a HDD:
1) Overwrite all addressable locations with a single character. (aka zero-fill: http://www.killdisk.com/)
2)Destroy - Disintegrate, incinerate, pulverize, shred, or melt. (Thermite)
>>
buy an iron barrel, toss it in, applicate fire for 5-6 hours: fucking burn that motherfucker
>>
>>55534501
Ever heard of the Ghiradoni air rifle? 20 round semi auto and could take down large game. Things Jefferson owned one.
>>
You guys recommend some stupid ass shit.
Mate just dump the fucking drive in the middle of the ocean, nobody will ever find it and the salt water will destroy it quick enough.
If not just open it up and take the platters and bury them 6 feet deep.
There is plenty of easy shit you can do to get rid of them.
>>
>>55527614
Use dm-crypt with key-file and store passphrase on small separate and redundant drive. On 128Mb sd-cards for example. When shit hits the fan overwrite them few times with random data.
But safest way it not to store key-file locally. Install dropbear to your initramfs, add ssh keys and retrieve key directly from remote host.
>>
>>55527614
since it's all encrypted, just power off
>>
File: immunity.jpg (75 KB, 550x448) Image search: [Google]
immunity.jpg
75 KB, 550x448
>if the opponent is going to reverse engineer it
Microwave it and drill holes through the plates

>if I am just paranoid someone will steal my laptop and try skiddy recovery methods

shred -n 30 -z -u filename


>if I want to erase a hard drive before giving it to a normie relative
Boot in a USB live and dd if=/dev/urandom of=/dev/sdX

I usually encrypt the files I want to be safe in a truecrypt container.
>>
First zeroise the keys. You did encrypt, right?

Then, one zero pass is all you need. For an SSD, ATA Secure Erase is the best you can do (on SSDs, dead sectors stick). I personally use a zero-pass followed by ATA Secure Erase Enhanced, but that's only to cover any possible remapped sectors and because there's no reason for me not to.

If your threat model includes sudden seizure, you will also need to encrypt and securely zeroise RAM using a TRESOR-based (CPU debug registers and/or L3 cache) hypervisor, which helps defeat cold-boot attacks, and have some way (VT-d required) of stopping the various live DMA attacks. Power down when you are done.

Also have facilities for verifying firmware as best as possible, because evil maid and other bootkits.

Failing to do the above means you're not even Facebook tier. Seriously.
>>
>>55527614
Use DBAN. Claim to always use it when formatting your drives. Start always using it when formatting your drives.
>>
>>55527614
Eat it
>>
>>55532700
You can't be charged for that unless they can prove that you have done something wrong and prove that you've destroyed evidence, which they can't.
>>
File: insidethebarrelfactory.gif (3 MB, 320x235) Image search: [Google]
insidethebarrelfactory.gif
3 MB, 320x235
https://www.youtube.com/watch?v=UIRXh2oiqtA
>>
>>55532726
Ah yes, the old Ted Kennedy trick. Classic maneuver.
>>
>>55529478
Pedo detected
>>
>>55533669
UK?
>>
>>55527614
if it's the FBI and not a cybercrime, dd /dev/zero or just drilling a hole in it would be more than enough.
if it is, yeah, run it over with your car.
>>
>>55529478
>Full disk encryption is a must, even have a bootloader on separate media
Not only bootloader, but also /boot partition and volume header. Then you could get rid of sd-card and legally claim that your hdd is empty.
>>
Deep fry it with breadcrumbs and eat it.
>>
>>55527614
guttman 35 pass wipe, then degauss.

i guttman'd, worked before they were searched
>>
>>55535703
Guttman method's as useful as zeroing the drive for anything even remotely modern
>>
>>55535720
what can i say, they didn't find anything with their shitty linux live cd.

don't buy ssd's and you'll be fine
>>
>>55535755
Like I said, it's as useful as zeroing the drive. In other words, you'd have been good if you just zeroed the drive
>>
File: 1445817204926.jpg (58 KB, 566x480) Image search: [Google]
1445817204926.jpg
58 KB, 566x480
>>55535703
>unironically dropping the gutmann meme
>>
>>55535771
>>55535783
yeah yeah, it was a while ago, and it's what i had on hand
>>
File: static1.squarespace.png (579 KB, 1000x563) Image search: [Google]
static1.squarespace.png
579 KB, 1000x563
This.
>>
>>55535324
>shredder
Literally invented by satan.
>>
>>55529388
I remember that thread, good shit
>>
File: you.png (26 KB, 448x274) Image search: [Google]
you.png
26 KB, 448x274
>>55534951
>I usually encrypt the files I want to be safe in a truecrypt container.
>>
>>55527614
Breaking Bad has it right, the only way to wipe it completely is to use a very powerful magnet.
>>
the fastest way is to encrypt your HDD from the start, then you can click a single button and no one can read your files any more.
If you don't have it encrypted keep a power drill next to your disks (a real power drill with AC not a battery) and start drilling holes through your platters.
Don't use a microwave or magnet, these are not reliable methods and can lead to a lot of data still being readable.
>>
>>55535324
I always wonder what a person falling inside would look like
>>
>>55527640
...and buy a one-way ticker to Belize

ez
>>
>>55527614
DBAN is enough.

Consider the amount of effort someone is willing to put out to retrieve your data. You don't need to physically destroy a hard drive unless you're a terrorist.

>>55529436
Encrypting is practically useless against law-enforcement if that is what you're worried about. >>55536405
>>
>>55536485
>encryption
>mattering
In this day and age, encryption means nothing. I very much believe that most forms of encryption have already been cracked and we're living with a false sense of hope.

>How I would wipe my hard drive
1. Wipe it once over, this is the main event, the main method.
2. Magnet it for a while, just to make sure nothing of value remains.
3. Drill the word, "penis" on it.
4. Get my charcoal grill going and cook the fucker for a while.
5. Place it in the sink and begin doing dishes with it.
6. Give it another once over with the magnet.
7. Stick googly eyes on it and paint it green.
8. Put it in a cardboard box with my watch inside it.
9. Leave it all on my coffeetable with milk and cookies next to it.
10. Wait patiently.
>>
All the same ideas, think up something new guys!

My idea: the Curie point.

Make a small, homemade forge, and heat it up above 1000°C
>>
>>55527640
Yeah. I mean there's still traces of what you did in your brain's hard drive, and you can't wipe that. #nooneissafe

>>55536630
Tell that to the encrypted folders I had in an old Windows XP installation I carelessly wiped without making a key.

I assure you you will never find a way to decrypt these anywhere on the web.
>>
The premise was that the FBI is in front of your door you fucks. You can't DBAN a 3 TB drive for 4 hours and tell them to please wait with picking up your computer until you're finished.
>>
>>55536647
You're probably correct, but that doesn't change the fact that encryption methods are getting cracked by the government faster than they're being invented.

>>55536655
>The premise was that the FBI is in front of the door you fucks.
Re-read the OP.
>>
https://www.youtube.com/watch?v=gi1V7gXyVeo
>>
File: airchat.jpg (38 KB, 660x365) Image search: [Google]
airchat.jpg
38 KB, 660x365
>>55529389
It depends. For example, in Cuba they have a major sneakernet going on with USB keys, for trading movies and stuff like that. Kinda hard for NSA to spy on that.

You can also have a entirely separate local/regional mesh network with wifi & optical routers for high-bandwitdh short range and packet radio for low-bandwidth medium/long range, using only private IP blocks (10.0.0.0/8, etc.)

Pic is an example application:
https://github.com/lulzlabs
>>
>>55529640
Why not practice shooting it with shotgun slugs? It's more fun than all that other work.
>>
>>55532982
We trade ancient secret chocolate chip cookie recipes.
>>
> open hdd
> take out disks
> microwave for 10sec
>>
>>55536628
Encrypting is practically useless against law-enforcement if that is what you're worried about. >>55536405

only if they can prove that the file is encrypted
>>
>>55537338
The rubber hose method doesn't work when--in addition to your passphrase--you also use have a randomly-generated token on some kind of removable device that's easy to destroy. I would say go with paper tape, if you can find a reader. :-) But if not, a microSD is pretty easy to melt with blowtorch.
>>
>>55527614
You are fucked either way.
https://www.law.cornell.edu/uscode/text/18/1519

Watch this:
https://www.youtube.com/watch?v=lqBVAcxpwio
>>
>>55532952
Anticipatory obstruction of justice, look it up.
>>
>>55529429
Kek have you printed all your silly pics ¿?
>>
>>55537446
Did Hillary look it up?
>>
>>55529555
Thats dead senpai.
>>
>>55527614
Irrelevant. They'll keep you in jail until you confess anyway.
>>
>>55529755
literally
dd if=nicetry.png of=/dev/sdb bs=2048
, you're not making shit
>>
>>55527614
>obstruction of justice charges: Up to 20 years in prison per count
Unless you're a serial killer and they have no other admissible evidence than what is on your hard drive,you're probably better off letting them get your drives.
>>
>>55537864
You could always just use a livecd only, for Internet access. Then nobody can tell if you had another machine and got rid of it.
>>
>>55537970
If you use a LiveCD all the time, then theoretically you could claim everything is ephemeral and there's no malice intended. In practice, that would mean either uploading everything to the cloud or saving non-OS content to fixed storage devices.

You're better off using fixed storage with strong encryption and then invoking your fifth amendment right to not self incriminate.

>but muh court cases
There are really two court cases that made US federal courts order divulging an encryption phrase. Both relied off the "foregone conclusion" doctrine, where the contents of the drive were not unknown to the government.

>Boucher
A Canadian pedo crosses the Canadian border and is at the US border. US Immigration asks to see his laptop. In the recent files list, the ICE agent sees filenames indicating CP. The agent asks him to mount his encrypted container. Shockingly, dumbass pedo does it. The agent finds tons of CP and he is arrested. When they restart the PC, the container is no longer mounted. They already saw several graphic images on the computer and knew they were on a container mounted as the Z drive, so it was a foregone conclusion.

>Fricosu
A mortgage scammer protects her computer with PGP Desktop Whole Disk Encryption. She is arrested for the scheme. Feds can't get on her PC. She gets on the prison phone (which is recorded if you're not calling your attorney) and talks about how all the contents of the scam are on the computer and the government can't get in because they don't know the password.

Recorded confession of defendant admitting that relevant files are on the computer, the computer is hers, and she knows the password = Foregone conclusion and not incrimination to have her give the password.

She ended up taking a plea bargain anyways (also, the government got a list of potential passwords from her husband and one of them worked).
>>
>>55533041
pic
>>
>>55535132
This. You can't be charged with obstruction of justice or tampering with evidence unless there's already an active investigation (i.e. they've served you a warrant, searched your house, and/or arrested you) otherwise it could be applied retroactively.
>>
>>55538064
>fifth amendment right to not self incriminate.
Might not work outside the US.
Anyway, why not both? If all your browser and network activity fingerprints are always originating from a LiveCD, then nobody can prove you actually have an extra disk or USB key stashed someplace. That one can be encrypted, and probably should if the contents are sensitive.
Of course, you can also have unencrypted (or maybe also encrypted) "legit" external storage as well, where you put stuff like banking records.
The idea of having everything mixed together doesn't sound good. It's far too easy for a judge to order you to hand over the key.
>>
>>55536600
The thing that burgerfies cows is extremely similar.
>>
>>55538641
huh apparently mods didn't like that webm
>>
>>55538641
Forgot link
https://www.youtube.com/watch?v=wrfAb0Ht_k0
>>
>>55538651
This isn't reddit, you fucking nerd.
>>
>>55538777
for you
Thread replies: 126
Thread images: 13

banner
banner
[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y] [Home]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
If a post contains personal/copyrighted/illegal content you can contact me at [email protected] with that post and thread number and it will be removed as soon as possible.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com, send takedown notices to them.
This is a 4chan archive - all of the content originated from them. If you need IP information for a Poster - you need to contact them. This website shows only archived content.