I understand traditional methods don’t work with modern SSD, anyone knows any good way to do it?

65 points

Physical destruction. It’s the only way to be 100% sure.

permalink
report
reply
26 points

Nuke it from orbit. Only way to be safe

permalink
report
parent
reply
22 points

⬆️➡️⬇️⬇️⬇️

permalink
report
parent
reply
8 points

A fellow enjoyer of democracy

*Presses b

permalink
report
parent
reply
3 points

A fellow Expeditionary Force enjoyer I see

permalink
report
parent
reply
7 points

For secure data destruction, either pay for it to be done properly, or create your own way of doing it. A decent sized drill bit can do all the work for you, at the cost of a new drive of course.

permalink
report
parent
reply
1 point
2 points

Here is an alternative Piped link(s):

Call Geek Squad

Piped is a privacy-respecting open-source alternative frontend to YouTube.

I’m open-source; check me out at GitHub.

permalink
report
parent
reply
1 point
Deleted by creator
permalink
report
parent
reply
13 points
*

No. Most SSDs actually contain far more storage internally than the SSD controller exposes. They then even out the wear and tear of the flash memory “packages” by cycling through the various packages and, given there being more packages than actually exposed for use, this offers a level of redundancy so the device lasts longer.

Because of this, wiping the logical device (e.g. zero filling or writing random data multiple times) doesn’t actually guarantee every storage package is written to / overwritten. Thus data may still reside even after wiping (that can be accessed by reading the packages directly and skipping the controller which abstracts these packages into a virtual block device).

Some SSDs offer a secure wipe tool that does a low level wipe of every page or wipes out an encryption key and generates a new one but not every SSD on the market offers that feature.

From the company my org has used to decommission old hardware; an industrial grinder is sadly the most assured way to guarantee no data can be recovered.

permalink
report
parent
reply
49 points

If it’s really an issue where “if the data on this SSD falls into the wrong hands, lives will be ruined” sort of thing, my favorite data security tool for this job is a bench grinder. Difficult to put the data back together when the flash chips are powder scattered throughout 14 different shop surfaces and at least two lungs.

permalink
report
reply
6 points

I prefer thermite. Recover my data from a messy contaminated slag heap.

permalink
report
parent
reply
6 points

Be careful with lung butter though. Been betrayed before

permalink
report
parent
reply
46 points

A special feature known as SSD secure erase. The easiest OS-independent way is probably via CMOS setup – modern BIOSes can send secure erase to NVM Express SSDs and possibly SATA SSDs.

permalink
report
reply
8 points

Did this already, it took 1 second for a 2TB drive. Would you trust that?

permalink
report
parent
reply
21 points

It is the only approved method for data destruction for the several banks and government agencies I support. If they trust it, I trust it.

I have checked a couple of times out of curiosity, after a secure erase the drive is as clean as if it had been DBANed. Sometimes things are standards because they work properly.

permalink
report
parent
reply
21 points
*

Most SSD/flash secure erase methods involve the storage having full disk encryption enabled, and simply destroying the encryption key. Without the encryption key the data can’t be deciphered even with the correct password, as the password was only used to encrypt the encryption key itself. This is why you can “factory reset” an iPhone or Android in seconds.

permalink
report
parent
reply
9 points
*
Deleted by creator
permalink
report
parent
reply
3 points

Thanks for this informative answer. Then it would make sense that it took only 1 second, then again, I have a modern Asus motherboard (AM5) with a Western Digital NVMe drive, and that drive isn’t listed as Secure Erase compatible on Asus motherboard. I will download the WD dashboard and do it that way, I didn’t know it existed before I posted this question.

permalink
report
parent
reply
1 point

TEMU/Wish/Aliexpress SSD

I wouldn’t trust any computer part from those places.

permalink
report
parent
reply
7 points

Yes. SSDs are different from HDDs.

permalink
report
parent
reply

Encrypted volume and burn the encryption key

permalink
report
reply
16 points

This is how storage services attest to a secure wipe.

permalink
report
parent
reply

But I wouldn’t trust anyone else with said encryption key who knows if its going straight to the CIA or not.

permalink
report
parent
reply
1 point

That’s better for prevention than after the fact for the wear leveling reasons others have mentioned.

permalink
report
parent
reply
31 points

permalink
report
reply
4 points

Does it have to be from orbit?

What if the drive is not on a planet?

permalink
report
parent
reply
3 points

Then you need to aim really well and time your orbit

permalink
report
parent
reply

Asklemmy

!asklemmy@lemmy.ml

Create post

A loosely moderated place to ask open-ended questions

Search asklemmy 🔍

If your post meets the following criteria, it’s welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

Icon by @Double_A@discuss.tchncs.de

Community stats

  • 12K

    Monthly active users

  • 5.1K

    Posts

  • 279K

    Comments