Stories
Slash Boxes
Comments

SoylentNews is people

posted by mrpg on Friday March 17 2017, @05:14AM   Printer-friendly
from the encrypt-for-the-win dept.

How do you destroy an SSD?

First, let's focus on some "dont's." These are tried and true methods used to make sure that your data is unrecoverable from spinning hard disk drives. But these don't carry over to the SSD world.

Degaussing – applying a very strong magnet – has been an accepted method for erasing data off of magnetic media like spinning hard drives for decades. But it doesn't work on SSDs. SSDs don't store data magnetically, so applying a strong magnetic field won't do anything.

Spinning hard drives are also susceptible to physical damage, so some folks take a hammer and nail or even a drill to the hard drive and pound holes through the top. That's an almost surefire way to make sure your data won't be read by anyone else. But inside an SSD chassis that looks like a 2.5-inch hard disk drive is actually just a series of memory chips. Drilling holes into the case may not do much, or may only damage a few of the chips. So that's off the table too.

Erasing free space or reformatting a drive by rewriting it zeroes is an effective way to clear data off on a hard drive, but not so much on an SSD. In fact, in a recent update to its Mac Disk Utility, Apple removed the secure erase feature altogether because they say it isn't necessary. So what's the best way to make sure your data is unrecoverable?


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Friday March 17 2017, @06:50PM

    by Anonymous Coward on Friday March 17 2017, @06:50PM (#480558)

    FTFS: take a hammer and nail or even a drill to the [spinning-rust] hard drive and pound holes through the top. That's an almost surefire way to make sure your data won't be read by anyone else

    First, that will probably leave readable data (for someone who is REALLY determined).

    Next, it really bugs me when people destroy gear that is still usable.
    In a significant number of cases, storage devices are being put out to pasture because of their age/size.
    In years past, entire boxes became too old and underpowered for the current user.
    When that gear isn't passed on to someone with lesser needs, I find that to be wasteful and I really hate wastefullness.

    On a spinning-rust drive, here's a better way:
    Simply overwrite[1] the data ONCE.
    No one has ever demonstrated [googleusercontent.com] (orig) [slashdot.org] that this is not effective.

    ...and, if it actually was possible to recover that overwritten data, it would take an immense amount of money and time.
    Hell, the guys who recover non-overwritten data from spinning-rust drives make giant buckets of money.

    Now, if you're under a DoD[2] requirement to eradicate the data according to DoD's method, then go ahead and overwrite it SEVEN times using a different pattern of 1's and 0's each time.
    You won't actually gain anything over doing it once, but you'll keep them happy.
    (I'm thinking of Danny DeVito's line, "Were you toilet-trained at gunpoint?")

    The only reasons to ever destroy a spinning-rust drive are:
    1) the device's workings are already non-functional.
    2) a (DoD[2], again) contract requires that.

    [1] There are many utilities that can do this. [archive.org]
    Some descriptions. [googleusercontent.com] (orig)[3] [experts-exchange.com]
    The most-mentioned of these is Darik's Boot and Nuke (DBAN), a task-specific Linux distro/bootable disk; the software is available gratis and libre.

    [2] There is a reason that "military intelligence" is the most-used example of an oxymoron.
    Like no other entity ever, those idiots can burn through giant piles of money while showing no useful results.

    [3] The guy who bothered to include the lines which said
    Minimum requirements
      and
    Uninstaller included?
    for a bootable OS+utility on removable media really needs to buy a clue (as does the guy from whom he got that "information").

    .
    For SSDs, wear-leveling/spare capacity (mentioned down-thread) makes these techniques insufficient.
    Extreme heat is the solution.

    ...and full disk encryption before you start using the device eliminates the need for actions down the road.

    -- OriginalOwner_ [soylentnews.org]