[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y ] [Home]
4chanarchives logo
Best way to securely wipe an SSD that I'm giving away?
Images are sometimes not shown due to bandwidth/network limitations. Refreshing the page usually helps.

You are currently reading a thread in /g/ - Technology

Thread replies: 53
Thread images: 2
File: 1456031545117.jpg (72 KB, 900x900) Image search: [Google]
1456031545117.jpg
72 KB, 900x900
Best way to securely wipe an SSD that I'm giving away?
>>
>>54007824
Zero fill.
>>
microwave
>>
>wipe
a tissue
>>
>>54007824
Borrow a degausser or run dban
>>
Use full disk encryption. Then you don't need to worry about it. Problem solved.
>>
>>54007824
if it's a Samsung SSD, just use the secure erase utility then do a single-pass erase with random data if you're extra paranoid.
>>
>>54007824
There's literally a SATA command called Secure Erase that will do exactly what you're asking for. GParted can do it. Some motherboards have the feature in their UEFI. Your SSD vendor might also provide a utility to do so.
>>
don't listen, it will fuck up the ssd
>>
install gentoo
>>
>>54007931
This is the way to go about it. Personal note, I had to do this on a computer with a terrible UEFI that wouldn't let me use that command. If you put the computer in hibernate mode and then start it up again via Linux it somehow completely disregards that security lock.
>>
>>54007824
Format it then open a command prompt in administrator mode and run
cipher /w:F

Alt 2: Get eraser and run disk wipe.
Alt3: Bitlocker the entire drive and have it owerwrite all space. Then just format the drive.
>>
>>54007931
this
>>
>>54008081
>command prompt in administrator mode

who uses those words?
>>
>>54010015
Windows people
>>
>>54007824
best ever

get encrypt-able ssd and encrypt it, then lose the key

otherwise a pass of random should do it... it's not like magnetic afaik
>>
>>54007855
a cloth is better for wiping off dust
>>
>>54007824
Depends on how secure you need. A single pass erase should be enough for most purposes.

If it has like nuclear launch codes, the only sure way is to shred it.
>>
>>54007866
pretty much this, although it being a solid state drive I don't think wiping the data multiple times will have the same affect as a HDD. Could be better, could be worse. But running a DBAN is the surest way to go.
>>
>>54010125
dban is a few passes of random, so yeah never hurts
>>
Unless the person you are giving it to is a master of file recovery jist format it a few times
>>
>>54010125

For god's sake, why do people still fall for the DBAN meme in 2016? Anything more than 3-pass is just paranoid retarded. You want to delete data more 'securely' than the DoD?
>>
>>54007824
dban is the way to go if you are selling the drive to the NSA or the FBI. If you are selling it to some random chomp, just format that shit and give it away.
>>
ATA Secure Erase

anything more on an SSD(arguably even a HDD) demonstrates a retard level of lack of understanding of technology

>>54007931

on gnu+linux there's hdparm and there's window equivalent also
>>
>>54010293
what

why would....

not even space lasers can keep them off the bits
>>
>>54007824
Those lips, man. They're so exotic. I want them on my dick.
>>
>>54010367
holy shit, are you me? I had the same exact thought, I was about to literally post the same thing.
>>
dd
>>
>>54012462
this desu
dd a /dev/zero
>>
>>54007824
fill it with copy pasted movies. this will overwrite all sectors
>>
write a script to copy pictures of Zone-tan onto it until it's full. leave them on there.
>>
>>54010125
frm dban site

"DBAN does not detect or securely erase SSDs"
>>
Just delete everything. Then run TRIM
>>
>>54010383

Holy shit man, what the chances TWO people find an attractive woman with larger than average lips attractive! Unreal!
>>
>>54007824
Wait wait wait, so how would you extract data from an unsecurly wiped SSD?
>>
>>54007824
slut's name?
>>
>>54014955
Her lips aren't larger than average so much as they are just this particular shape that is just so captivating.
>>
>>54007824
To have encrypted it in the first place.

Sorry OP, but the failure mode for NAND Flash is read-only/bad writes/stuck erases. And drive controllers do wear-levelling to disguise individual block faults; remapping is normal and journalling is continuous and opaque. It cannot be zeroised securely, at all.

You can try by using ATA Secure Erase commands (Google hdparm for proper usage) to ask the firmware nicely please - zero-filling like with DBAN or dd WILL NOT WORK - but if there was anything confidential on there in cleartext, you should also physically destroy the drive. ATA Secure Erase is not always implemented properly, and TRIM is delayed/cached/advisory, only marking deleted sectors for later reuse: the firmware tries everything it can to avoid block erases, which it might only get 10000/cell, or even 1000/cell over the life of the drive.

Always encrypt SSDs. Store the keys on EEPROM which does have a fast-fade erase (e.g. a TPM).
>>
Why would anyone ever give away a SSD?

Just use dd and fill it up with zeroes.
>>
>>54015255
Please note: the same is also true for drive-managed SMR drives, like the Seagate Archive series.

Recovery has been already demonstrated from stuck sectors on eMMC Flash. There aren't commercial kits yet as far as I know - it's still in research - but the research is solid.

Even with encryption in use, discard/usage maps will still reveal the filesystem in use and how empty/full it is, as well as stats like total sectors written/power-on time, from SMART. The firmware needs that metadata to allocate/garbage-collect sectors.

So don't try to use an SSD/SMR drive for "hidden volumes". You will lose deniability: the media is just unsuitable for that.

(I developed/tested FDE software a while back, and keep up with the forensics out of interest.)
>>
File: image.jpg (34 KB, 460x276) Image search: [Google]
image.jpg
34 KB, 460x276
Kill a kid an hour until it sorts itself out?
>>
Get any piriform like ccleaner> drive wipe tool> select any wipe that goes over the drive more than 3 times
>>
>>54014996
Syrian Girl on youtube
>>
>>54007824

Throw it in the ocean for a few days
>>
>>54007824
overwrite all the old data with tranny porn.
>>
>>54014955
>woman

I've got bad news for you, anon.
>>
>>54007824
Jesus people are stupid. So much bad advice. Only one correct way to wipe an SSD. Search for "ATA Secure Erase", read and learn. Morons.
>>
>>54010315
One of a very few non retarded answers.
>>
Fill the drive with illegal content.
>>
>>54010367
>>54010383
>>54014955
>>54015180
>>54015522
https://www.youtube.com/user/SyrianGirlpartisan/videos

Can you guys just shut up and appreciate things in life (or Syria)
>>
>>54015482
thanks
>>
>>54015328
Thank you.
>>
>>54007824
Stick it in the microwave
Thread replies: 53
Thread images: 2

banner
banner
[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y] [Home]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
If a post contains personal/copyrighted/illegal content you can contact me at [email protected] with that post and thread number and it will be removed as soon as possible.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com, send takedown notices to them.
This is a 4chan archive - all of the content originated from them. If you need IP information for a Poster - you need to contact them. This website shows only archived content.