Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Tuesday April 17 2018, @04:26PM   Printer-friendly
from the nuke-'em-from-orbit dept.

I once read in a news article (can't find it now... sorry) that apparently if you overwrite data with other data on a hard drive that the previous data is unrecoverable. So, would overwriting the entire hard drive with cat videos be just as effective as all these other "professional" security protocols that are used?

janrinok: Data erasure is important when you want to prevent anyone from recovering whatever was written on the storage device in the first instance. But there are many potential problems including just how secure does the erasure have to be, what hardware is controlling the reading and writing to the disk, are you attempting to delete data on a spinning rust device, a more modern SSD , or a thumb drive, and who are you trying to prevent from reading the data? If you are just trying to prevent a regular Joe Soap from reading what you once securely stored on a hard drive then simple overwriting might be enough. However, if you are concerned that law enforcement or a government agency might be interested in the drive's contents then you will have to take more stringent precautions. Ultimately, many of the highest classifications of data can only be securely erased by full degaussing or the physical destruction of the device. The link details the various standards that are deemed as acceptable to securely erase data to meet specific documented requirements.

Presumably, if you are worried that someone might have access to your data then you have already taken the precautions of encrypting it. However, poor encryption is worse than no encryption at all - at least with the latter you know that your data is vulnerable. With a weak encryption you might incorrectly believe that your data is secure when, in truth, it is not. This might result in you taking risks that you wouldn't otherwise take with the physical protection of the drive itself. The military and government agencies often insist that drives are secured in an approved security container when not actually in use to prevent anyone actually getting to the data in the first instance. If at home you simply leave your drive in the computer or lying around in plain view then anyone entering your home can steal it. How much protection you need to give depends upon the value of the data to you and how much you need to ensure that no-one else can get to it.

Many proprietary encryption programs use an 'in-house' encryption scheme in the incorrect belief that it is more secure than the recognised encryption methods that have been rigorously tested and mathematically proven. Other systems might have back-doors or make the decryption algorithms available to LE or government agencies. I personally would strongly recommend against using these encryption systems because they might only be giving you a false sense of security. However, if your data is already encrypted with a recognised encryption system with a strong pass phrase and salt then you are well on your way to preventing anyone from ever getting access to the data even if they have the drive in their possession. Note that encryption that is 'unbreakable' today might not remain so with advances in computing and perhaps the discovery of encryption flaws. Essentially, if it is considered good enough for the military and government agencies then it is probably sufficient for your needs.

It is important to realise that, any time your data is inside your computer and viewable, then any encryption is already defeated. If you have valuable data that is protected by nothing more than a computer in hibernation then anyone who can awaken the computer has full access to the data.

So now we finally get to the question that the submitter asked. How secure is overwriting as a method of data deletion? If the data is already securely encrypted then perhaps no further action is required, or simply overwriting it with cat videos will probably be enough to prevent anyone but the most determined attacker from ever reading the data. It will certainly be enough to stop the vast majority of people from getting anything useful from the disk drive. If you believe that the data on the drive must never be recovered by anyone else then the physical destruction of the drive might be warranted. The actual requirement probably lies between those 2 extremes. Only you know the value of the data on the disk drive and how important it is that it is not disclosed.

I now invite everyone to contribute their own experiences, tips and advice regarding data erasure....


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by SomeGuy on Tuesday April 17 2018, @07:02PM (1 child)

    by SomeGuy (5632) on Tuesday April 17 2018, @07:02PM (#668251)

    Good luck using that on your work computer without permission. You will be escorted out of the door if not locked up in jail for "hacking" or some shit.

    If it is your own personal hard drive then fine, but be aware that answer won't fit all needs.

    The question had come up before where someone had stupidly placed personal information on the hard drive of their work computer. They were changing positions or leaving and wanted to "securely" remove the data from their computer.

    Even if the machine is not locked down to forbid booting other OSes and wiping the drive, chances are doing so is against the rules. In some cases it might be OK to ask the IT folks to wipe the drive and re-load an image, but even that can raise unwanted red flags. Even if someone is leaving, that could affect severance pay or job references.

    In such a case the "safest" thing to do is delete the files in question, and fill the drive with copies of large work-related files.

    There is no guarantee that will really get everything. Modern OSes index the hell out of drives, and can leave hard to find temporary, backup copies, or related metadata sitting around. Of course, on a corporate network they may even create remote backups of user data.

    Now, if the drive belongs to you, then normally wiping the entire drive with DBAN or similar should remove all data. There is also an IDE/SATA "secure erase" feature that should even wipe bad and reserved sectors. You have to sort of trust that. On normal hard drives it would be quite rare those would contain any of your sensitive data, but SSDs keep lots of random reserved space.

    Anything beyond that is really just paranoia, but sending a drive in to a chipper-shredder is a nice simple way to get piece of mind (don't do that to vintage MFM/RLL/SCSI drives! those are in demand and worth the time to wipe!)

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 2) by coolgopher on Wednesday April 18 2018, @01:43AM

    by coolgopher (1157) on Wednesday April 18 2018, @01:43AM (#668378)

    I also seem to recall some harebrained indexing software which stored the indices on a *different* drive, so even if you properly wiped the drive where you'd stored the original files, there was plenty of things left on the drive with the indices. The name/OS of the software escapes me at the moment, but someone can fill in my blank?