+ Reply to Thread
Page 1 of 2 12 LastLast
Results 1 to 15 of 20

Thread: Fastest way to wipe SSD and HDD?

  1. #1

    Fastest way to wipe SSD and HDD?

    Hello,

    How would you wipe a SSD or HDD quickly, without the data being fully recoverable? I know some files will be recovered, and I'm fine with that as long as you cannot recover 100% of the drive.

    Thank you!
    Reply With QuoteReply With Quote
    Thanks

  2. #2
    Member illusive's Avatar
    Join Date
    24.10.10
    P2P Client
    What ?! That's Private!
    Posts
    512
    Activity Longevity
    3/20 16/20
    Today Posts
    0/5 ssssss512
    Normal quick format would wipe and NOT 100% recoverable. Actually no guarantee at all that any would be recoverable. Non-quick format would be even with less chance of recovering, I guess !!
    Reply With QuoteReply With Quote
    Thanks

  3. Who Said Thanks:

    Master Razor (10.03.17)

  4. #3
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,447
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39447
    For mechanical HDDs manufactured after 2001, which is essentially any one you find nowadays, the built-in ATA Secure Erase command is all you need. It will wipe everything, including reallocated and hidden sectors, and since it's run by the firmware, it'll be as fast as possible. I use HDAT2 to send it, but if you can't or don't want to hotplug disks to get rid of frozen status, try Parted Magic. Any other Linux distribution that includes hdparm will also work, just make sure you disable power savings and sleep mode everywhere, because you don't want to computer going into standby in the middle of the process.

    But if that's not quick enough for you, I guess you can delete the first 10% of each disk and/or partition.

    For SSDs, things are more complicated. I encourage you to read the attached papers, but here are the key points:
    • Traditional overwriting techniques are ineffective because of how flash memory works.
    • You rely exclusively on a good implementation of the ATA Secure Erase command, but sadly that's delivered by few manufacturers; two particularly egregious cases had the drives reporting success, when only the first few sectors (or none at all) had been erased.
    • Speed is a non-issue when the command does work effectively, it runs in less than a minute on even the highest-capacity drives.
    • The only 100% effective way to sanitize information in any solid-state storage medium is to use full disk encryption from day zero, and discard the key(s) when you need to "erase" it.
    Attached Files Attached Files
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  5. Who Said Thanks:

    Codec (10.03.17) , Lucius (10.03.17) , Master Razor (10.03.17)

  6. #4
    The only 100% effective way to sanitize information in any solid-state storage medium is to use full disk encryption from day zero, and discard the key(s) when you need to "erase" it.
    This is good. I'll keep this in mind the next time I buy USB-SSD drives.

    But for now, for an SSD, what would be best? Should I use:
    diskpart
    clean
    format fs=ntfs quick
    or
    diskpart
    clean all
    format fs=ntfs
    Reply With QuoteReply With Quote
    Thanks

  7. #5
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,447
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39447
    I would run clean all, which is equivalent to zero-filling. The full implications of that are described in the papers, but essentially, it'll stop any adversary that can't disassemble the disk and read the flash chips directly. Under Windows 8 and above, you'll want to run defrag x: /o after recreating the partition, to send the TRIM command and restore writing performance; for Windows 7 and below, there's this.

    Both of your examples are missing create partition primary, by the way. Can't format something that doesn't exist anymore
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  8. Who Said Thanks:

    Lucius (10.03.17) , Master Razor (10.03.17)

  9. #6
    Moderator
    Instab's Avatar
    Join Date
    17.09.09
    Posts
    6,661
    Activity Longevity
    5/20 17/20
    Today Posts
    0/5 sssss6661
    Quote Originally Posted by anon View Post
    The only 100% effective way to sanitize information in any solid-state storage medium is to use full disk encryption
    this is a bad idea because by doing so you completely rely on the quality of whatever encryption you used.
    Your account has been disabled.
    Reply With QuoteReply With Quote
    Thanks

  10. Who Said Thanks:

    Master Razor (10.03.17)

  11. #7
    @anon

    Fully automated code.

    Code:
    CLS
    ECHO.
    ECHO =============================
    ECHO Running Admin shell
    ECHO =============================
    
    :checkPrivileges
    NET FILE 1>NUL 2>NUL
    if '%errorlevel%' == '0' ( goto gotPrivileges ) else ( goto getPrivileges )
    
    :getPrivileges
    if '%1'=='ELEV' (shift & goto gotPrivileges)
    ECHO.
    ECHO **************************************
    ECHO Invoking UAC for Privilege Escalation
    ECHO **************************************
    
    setlocal DisableDelayedExpansion
    set "batchPath=%~0"
    setlocal EnableDelayedExpansion
    ECHO Set UAC = CreateObject^("Shell.Application"^) > "%temp%\OEgetPrivileges.vbs"
    ECHO UAC.ShellExecute "!batchPath!", "ELEV", "", "runas", 1 >> "%temp%\OEgetPrivileges.vbs"
    "%temp%\OEgetPrivileges.vbs"
    exit /B
    
    :gotPrivileges
    setlocal & pushd .
    
    
    set "psCommand=powershell -Command "(new-object -COM 'Shell.Application')^
    .BrowseForFolder(0,'Please choose a folder.',0,17).self.path""
    for /f "usebackq delims=" %%s in (`%psCommand%`) do set "SrcDrv=%%s"
    if "%SrcDrv:~3,1%"=="" (set SrcDrv=%SrcDrv:~0,-1%)
    
    (echo select disk %SrcDrv%
    echo clean all
    echo convert mbr
    echo create partition primary
    echo format quick fs=ntfs
    echo exit ) | diskpart.exe
    
    
    defrag %SrcDrv%: /o
    Reply With QuoteReply With Quote
    Thanks

  12. Who Said Thanks:

    anon (11.03.17)

  13. #8
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,447
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39447
    Quote Originally Posted by Instab View Post
    this is a bad idea because by doing so you completely rely on the quality of whatever encryption you used.
    A strong key, an algorithm with no known vulnerabilities and an audited open-source implementation of it should be assumed whenever encryption is used
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  14. Who Said Thanks:

    Codec (11.03.17)

  15. #9
    Quote Originally Posted by anon View Post
    A strong key, an algorithm with no known vulnerabilities and an audited open-source implementation of it should be assumed whenever encryption is used
    And what software would you recommend? I would use TrueCrypt but I'm not so sure anymore.
    Reply With QuoteReply With Quote
    Thanks

  16. #10
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,447
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39447
    TrueCrypt is okay. Even though its development ended under rather mysterious circumstances, the source code has been audited and confirmed to be safe.

    DiskCryptor is also good. When compared to TrueCrypt, it essentially trades container support for faster decryption speeds.
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  17. #11
    Moderator
    Instab's Avatar
    Join Date
    17.09.09
    Posts
    6,661
    Activity Longevity
    5/20 17/20
    Today Posts
    0/5 sssss6661
    Quote Originally Posted by anon View Post
    A strong key, an algorithm with no known vulnerabilities and an audited open-source implementation of it should be assumed whenever encryption is used
    that's the wrong approach. the crucial part here is that you're preparing for the future i.e. the encryption you apply when you start using the disk is meant to keep you safe at some time in the future when you wanna sell it or something similar. and exactly that's the problem, what's considered safe today can be totally useless in let's say 3 years from now.
    unless you can see the future this method always is a gamble.

    don't get me wrong, for a little more privacy this is good enough but can obviously never be considered 100% (except for clairvoyants )
    Your account has been disabled.
    Reply With QuoteReply With Quote
    Thanks

  18. #12


    Join Date
    22.06.08
    Location
    astral planes
    P2P Client
    sbi finest
    Posts
    3,125
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 sssss3125
    Quote Originally Posted by Instab
    this is a bad idea...
    that's the wrong approach...
    how about mentioning what would you consider 'a good idea' or 'a good approach'?

    Quote Originally Posted by Instab
    unless you can see the future this method always is a gamble.
    this applies to any method or approach used, from private to corporate ones of any scale (in this era)

    Quote Originally Posted by Instab
    for a little more privacy this is good enough but can obviously never be considered 100%
    agreed, no materialistic method is 100% sure

    Quote Originally Posted by Instab
    except for clairvoyants
    not even for them as they can only see parts of the future, not the whole, not whatever they may want to see
    Reply With QuoteReply With Quote
    Thanks

  19. #13
    Moderator
    Instab's Avatar
    Join Date
    17.09.09
    Posts
    6,661
    Activity Longevity
    5/20 17/20
    Today Posts
    0/5 sssss6661
    Quote Originally Posted by slikrapid View Post
    how about mentioning what would you consider 'a good idea' or 'a good approach'?
    if it has to remain usable: none. ssds are only really wiped if you burn them.

    this applies to any method or approach used
    not at all, if you wipe a non-ssd before selling for example it it's fine.


    anyway since Master Razor said he'd be fine with having just most of the data wiped using any of the mentioned methods should do the job. i just jumped in to fix the 100% statement
    Your account has been disabled.
    Reply With QuoteReply With Quote
    Thanks

  20. #14


    Join Date
    22.06.08
    Location
    astral planes
    P2P Client
    sbi finest
    Posts
    3,125
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 sssss3125
    Quote Originally Posted by Instab
    ssds are only really wiped if you burn them.
    and if the process of burning is successful, and if no method can retrieve such data and if no one can access your memory of the data and if no one can re-materialize the data and if no one already made a backup of that data, and, and,...

    Quote Originally Posted by Instab
    not at all, if you wipe a non-ssd before selling for example it it's fine.
    it may be fine, but you do realize that even a small chance that something may go wrong at any stage of the process is basically a gamble, ie. a 99,9% successful deletion rate leaves that 0,1% open to data retrieval

    in other words, whatever (materialistic) method anyone may suggest, with any level of technological abilities, it still does not guarantee 100% security... ever


    additionally, in the spiritual sense, if your karmic equation points to a failure in security, nothing you do will avoid that failure, on the contrary, whatever you do will lead towards the failure
    Reply With QuoteReply With Quote
    Thanks

  21. #15
    Moderator
    Instab's Avatar
    Join Date
    17.09.09
    Posts
    6,661
    Activity Longevity
    5/20 17/20
    Today Posts
    0/5 sssss6661
    Quote Originally Posted by slikrapid View Post
    and if the process of burning is successful, and if no method can retrieve such data and if no one can access your memory of the data and if no one can re-materialize the data and if no one already made a backup of that data, and, and,...
    --
    additionally, in the spiritual sense, if your karmic equation points to a failure in security, nothing you do will avoid that failure, on the contrary, whatever you do will lead towards the failure
    you might need a vacation
    Your account has been disabled.
    Reply With QuoteReply With Quote
    Thanks

+ Reply to Thread
Page 1 of 2 12 LastLast

Tags for this Thread

Posting Permissions

  • You may post new threads
  • You may post replies
  • You may not post attachments
  • You may not edit your posts
  •