So I bought two used ssds and decided to use recuva to see if the previous owner had any pronz or something

So I bought two used ssds and decided to use recuva to see if the previous owner had any pronz or something.

One was almost completely wiped, only found some config files.

But on the other I basically found the story of some guy's life and I wondered, what's the proper way to wipe a hard drive /ssd if you want to sell it?

It's really scary how can you just create a profile of someone with a bunch of filenames and photos.

Didn't find any porn tho. Just normie shit.

Other urls found in this thread:

nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf
en.m.wikipedia.org/wiki/One-time_pad#Perfect_secrecy
ata.wiki.kernel.org/index.php/ATA_Secure_Erase
stackoverflow.com/questions/3690273/did-i-understand-dev-urandom
twitter.com/SFWRedditGifs

I read the thread many times OP, and I couldn't find the link to the mega upload with all the stuff you found.

How the fuck did Earandil even kill Ancalagon

UHH???

Different thread

the power of love

also
>flying spaceship with shooting lasers

Parted magic, I have heard, works well. Or the built in SSD utility from the manufacturer.

they were oem samsung ssds, sm841. AFAIK is basically a 840 pro for oems.

do a single run of all zero's. Command is simple in linux or windows.

will this work for both mechanicl hard drives and SSDs?

yes. Don't worry about mutiple passes or any of that bullshit. Its literally all Meme tier info from 30 years ago.

If you're interested in this, read up on NIST's documentation: nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf

This document isn't too technical, and you can skip to the section where they just talk about drives.

I was reading some info that basically said that it's better to write random numbers instead of zeros.

But don't understand why

Samsung has the magician software.

So in that case you'll probably end up with a sheakspeare play waiting to be read once you dig through those numbers

Overwriting with one pass of random data is the same mechanism as encrypting with a one-time pad.

en.m.wikipedia.org/wiki/One-time_pad#Perfect_secrecy

bump

bump

bump

the only firesure way is to drill then microwave the mofo
Then throw it at the bottom of a body of water just to be sure

dd if=/dev/urandom of=/dev/sda

That should be more than enough on modern hard drives, especially SSDs, but if you're paranoid use srm -G /dev/sda which uses Gutmann's deletion algorithm, or on an SSD use secure erase ata.wiki.kernel.org/index.php/ATA_Secure_Erase

Any other answer is wrong.

Not if you're using /dev/urandom which is what you'll be using when erasing hard drives. It's more efficient (inherently less secure). It's the same if you use /dev/random.

You don't understand how hard drives work, do you?

I saw it on Silicon Valley, a show about tech nerds, so it must be true

the character was a h4ck0r too

op here, I don't understand your post, pls explain.

Good show but has a lot of inaccurate moments.

stackoverflow.com/questions/3690273/did-i-understand-dev-urandom

/dev/random requires lots of entropy and often "blocks"; runs out and waits, where /dev/urandom doesn't.

dd if=/dev/zero of=/dev/sdx

Should do the job

Just replace the content with memes, then delete it

But most memes aren't really /random/ and may be vulnerable to RNG attacks since the entropy poole isn't really /random/

what is really random besides atmospheric noise?

The US Department of Defense does at least three passes over the drive: overwrite entirely with zeroes, then overwrite entirely with ones, then overwrite with random data. Overwriting with random data may be repeated up to 5 times making for 3-7 total passes.

That said, while floppy disks were vulnerable to data recovery after one all-zero overwrite, modern drives are not. One pass should suffice.

Me.

*Holds up spork*

will this kill the disk?

or this?

Well if by kill, you mean make it unusable then no. /dev/urandom will fill it up with random data and /dev/zero will zero it out. You can always make a new partition table and use it afterwards.

ok thx!

SSDs have loads of hidden storage it marks as unavailable when the write limit gets close though?

They are pretty much impossible to wipe save a complete destruction

Kek :3 ^_^

tell us about this guy's life

If you're worried about writing so much data to an SSD, you can use the secure erase command. Arch wiki has a guide. (which you can do on any Linux, btw)

nothing interesting tho, the ssd might have been from his college laptop

>went to some college whose name I forgot
>studied finance and business probably
>married ugly wife that he probably met after college cuz I din't find pictures of her, only after he graduated
>btw he just married probably two years college
>started some shitty business.
>had an ugly daughter
>really old grandparents.
>really really liked basketball and football.
>probably Christian


This I just gathered from a quick glance, and it was really shocking how you can make a profile from someone you don't even know with so little information.

I got bored and stopped digging through.

Lotr doesn't have spaveships

>flying ship that shoots fucking lasers
>not a spaceship

choose one

Bump

Why would you sell any hard drive?You cant completely clean it without phisically destroying it with a hammer.

For hard drives, just write the whole disk at least once with zeroes or random data. You can do it multiple times with different types of data if you want.

For SSDs... You can do the same thing and it will make it look like the disk has been erased, but SSDs are about 25% bigger than they claim to be on the packaging and that additional storage exists internally and is used for making writes to the disk. It regularly contains entire unencrypted sections of filesystem even after you think the disk has been wiped. Fortunately it's only accessible by dismantling the SSD and accessing the pins on the flash chips directly, but still, it's there. If the SSD doesn't support some kind of secure erase command there is functionally no way to wipe the bloody things properly, just put them in the microwave.

If it's used for making writes, why won't it contain only zeroes after writing the whole SSD with it?

Do you consider shooting lasers evidence of it being able to go to space?