Securely erasing data and other anti-forensic measures

Hi Sup Forums, I have some files I'd rather not have fall into the wrong hands - no, it's not what you think, but rather academic research of a sensitive nature. How do I securely erase these files such that malicious parties cannot recover them with digital forensic methods? Ideally without using magnets or otherwise doing lasting harm to my computer. Is CCleaner's wipe free space function enough? What else can I do?

Other urls found in this thread:

eraser.heidi.ie/
dban.org/
youtu.be/NG9Cg_vBKOg
twitter.com/AnonBabble

Bump

Bump, anyone?

>Place on disk
>Make an empty encryption container
>Set an impossible password
>Copy all files to said container
>Run DBAN on disk
>3 passes
>Burn the disk
>Burn the ashes

BleachBit? Good enough for Hilldawg.

Military standards to reuse the disk is to entirely overwrite it 7 times with random data. If you need to go further, just melt the damned thing and buy a new one

>Encrypted root
>Multipass the keyfile if necessary to wipe
>Keep /boot and initramfs on a USB in pocket
Done and done.

eraser.heidi.ie/

Override once with zero.
Literally no data has ever been recovered from this, especially since we've moved to high density platters.

dban.org/ just use this.

destroy it

Please, do not post photo of my dad, Sir.

hlep i just use this on my ssd now my cortana window not boot??

Thermite. Anything less can be recovered.
Next time use GNU/Linux with full disk encryption

Thermite it really shit for killing drives better off bakeing the disks till they reach their curie point and depolarize

>format drive
>encrypt all space within drive
>format drive again
>send drive through a shredder to turn it into tiny bits
>dispose of bits randomly and in various ways

What is the best somebody can do without actually destroying the drive?

Encrypt, DBAN Wipe a few times. If you're extra cautious, degauss.

Fuck off pedo

Literally the only way to guarantee the data is gone, is physical destruction and or heating well above the curie temperature. The most boring and sure-fire way to go about this, is pulling the drive apart and baking the platters at 350F for an hour. That's better than a week of dban since the firmware can and does prevent writing over certain areas of the drive. Also make sure you destroy the flash memory on the controller board. Burning with a blow torch works.

zero the drive one or more times, shred the drive, burn the shreds

Use degausser.

No, Don't listen other guys. It's not enough.

Physical destruction of data is the only solution. Use degausser and drill it, use blender(Do you know will it blend

>Override once with zero.
>Literally no data has ever been recovered from this
It has many times. Overriding with a non random pattern is extremely stupid for reasons that you would know if you took 3 minutes to look stuff up before posting as if you knew shit. Educate yourself, dumbfuck.

What about wiping a usb flash drive? Without using physical destruction, what's the best way to wipe it? Can you just overwrite it?

lsblk
plug in device
lsblk
the device will be the new entry
say "/dev/sdb" or something
now all you have to do is wipe it
dd if=/dev/zero of=/dev/sdb
let it do its thing. should take a while.

sudo dd if=/dev/zero of=/dev/sd[X] where X is the drive.

Yes, there are technically ways to recover the data.

Are you expecting your malicious parties to spend many tens of thousands of dollars

>using advanced vuln lab tests as best practices for normies to use

Seriously, but if you want to be that paranoid, use /dev/random or /dev/urandom as your if on dd and move on with your life.

If you are really paranoid, put the /dev/random dd command on a loop and come back the next day.

...

youtu.be/NG9Cg_vBKOg

Anything short of physically destroying the drive won't help you

Can't you just run some electricity through them? Like hook a car battery up to the platters or something?

Magnet won't be recovered

Yeah, I'd hate if other people saw my tranny por.....uh, scientific research.

>Is CCleaner's wipe free space function enough?
considering it zeroes out the unused data, yes

if you have an SSD, the only way is to destroy the drive (assuming the data was ever written to disk unencrypted)

dd if=/dev/urandom of=/dev/sda
dd if=/dev/urandom of=/dev/sda # extra paranoid
dd if=/dev/zero of=/dev/sda


Then physically destroy the media

Secure erase is fine for SSDs.

>tfw I updated grub and my USB /boot wont work

doesn't data get erased if it's unpowered for a few months?