Hi Sup Forums, I have some files I'd rather not have fall into the wrong hands - no, it's not what you think, but rather academic research of a sensitive nature. How do I securely erase these files such that malicious parties cannot recover them with digital forensic methods? Ideally without using magnets or otherwise doing lasting harm to my computer. Is CCleaner's wipe free space function enough? What else can I do?
Securely erasing data and other anti-forensic measures
Other urls found in this thread:
eraser.heidi.ie
dban.org
youtu.be
twitter.com
Bump
Bump, anyone?
>Place on disk
>Make an empty encryption container
>Set an impossible password
>Copy all files to said container
>Run DBAN on disk
>3 passes
>Burn the disk
>Burn the ashes
BleachBit? Good enough for Hilldawg.
Military standards to reuse the disk is to entirely overwrite it 7 times with random data. If you need to go further, just melt the damned thing and buy a new one
>Encrypted root
>Multipass the keyfile if necessary to wipe
>Keep /boot and initramfs on a USB in pocket
Done and done.
Override once with zero.
Literally no data has ever been recovered from this, especially since we've moved to high density platters.
dban.org
destroy it
Please, do not post photo of my dad, Sir.
hlep i just use this on my ssd now my cortana window not boot??
Thermite. Anything less can be recovered.
Next time use GNU/Linux with full disk encryption
Thermite it really shit for killing drives better off bakeing the disks till they reach their curie point and depolarize
>format drive
>encrypt all space within drive
>format drive again
>send drive through a shredder to turn it into tiny bits
>dispose of bits randomly and in various ways
What is the best somebody can do without actually destroying the drive?
Encrypt, DBAN Wipe a few times. If you're extra cautious, degauss.
Fuck off pedo
Literally the only way to guarantee the data is gone, is physical destruction and or heating well above the curie temperature. The most boring and sure-fire way to go about this, is pulling the drive apart and baking the platters at 350F for an hour. That's better than a week of dban since the firmware can and does prevent writing over certain areas of the drive. Also make sure you destroy the flash memory on the controller board. Burning with a blow torch works.
zero the drive one or more times, shred the drive, burn the shreds
Use degausser.
No, Don't listen other guys. It's not enough.
Physical destruction of data is the only solution. Use degausser and drill it, use blender(Do you know will it blend
>Override once with zero.
>Literally no data has ever been recovered from this
It has many times. Overriding with a non random pattern is extremely stupid for reasons that you would know if you took 3 minutes to look stuff up before posting as if you knew shit. Educate yourself, dumbfuck.
What about wiping a usb flash drive? Without using physical destruction, what's the best way to wipe it? Can you just overwrite it?
lsblk
plug in device
lsblk
the device will be the new entry
say "/dev/sdb" or something
now all you have to do is wipe it
dd if=/dev/zero of=/dev/sdb
let it do its thing. should take a while.
sudo dd if=/dev/zero of=/dev/sd[X] where X is the drive.
Yes, there are technically ways to recover the data.
Are you expecting your malicious parties to spend many tens of thousands of dollars
>using advanced vuln lab tests as best practices for normies to use
Seriously, but if you want to be that paranoid, use /dev/random or /dev/urandom as your if on dd and move on with your life.
If you are really paranoid, put the /dev/random dd command on a loop and come back the next day.
...
Anything short of physically destroying the drive won't help you
Can't you just run some electricity through them? Like hook a car battery up to the platters or something?
Magnet won't be recovered
Yeah, I'd hate if other people saw my tranny por.....uh, scientific research.
>Is CCleaner's wipe free space function enough?
considering it zeroes out the unused data, yes
if you have an SSD, the only way is to destroy the drive (assuming the data was ever written to disk unencrypted)
dd if=/dev/urandom of=/dev/sda
dd if=/dev/urandom of=/dev/sda # extra paranoid
dd if=/dev/zero of=/dev/sda
Then physically destroy the media
Secure erase is fine for SSDs.
>tfw I updated grub and my USB /boot wont work
doesn't data get erased if it's unpowered for a few months?