I'm wiping my SSD of Win10, how do I ensure everything is completely deleted, and no traces of Windows spyware is left behind? I need Ed Snow levels of paranoia here, so an /rms/ approved way would be preferred.
I'm wiping my SSD of Win10, how do I ensure everything is completely deleted...
a Secure Erase usually does the job
for Ed level assurance, destroy the drive
zerofill
Look up how to issue an ATA Secure Erase command.
Don't use stuff like DBAN, it will just randomly wear your NAND down..
...
Thanks guys, took care of that quickly and easily.
Thanks, I'll look into that. I thought zerofill was just for HDs? And secure erase will be enough to get Bill Gates and Uncle Sam off my back?
What did you do to ensure this paranoia, OP?
>And secure erase will be enough to get Bill Gates and Uncle Sam off my back?
Whatever was on the drive won't be recoverable.
Though if you just want to get rid of windows Secure Erase is overkill. Most OSs TRIM the drive on installation, so it gets ditched either way.
>888
Nice.
And nothing, yet. I'd just like to know how before improving my OpSec becomes a terrorist activity subject to proper law enforcement :^)
I've heard that a lot of Win10 files still linger after one simply installs a new OS over it, so I'd just like to ensure everything is properly removed before installing any sort of security orientated OS.
Don't listen to the retards telling you to zero it out or break it. Just quick format it and you'll be fine. It's not like you can run from the botnet anyways, since there's a small computer inside the SSD. The controller inside runs its own non-free OS and simply exposes a common interface for the drive, like SATA. There's also an entire operating system in your motherboard of your computer alone, kernel and all if you use UEFI. And beyond that, there's a little CPU in you CPU called the Intel ME or AMD PSP that can act as a hardware hypervisor, controlling the whole PC and potentially phone home to CIA niggers.
You don't even know what tinfoil is, kiddo. The botnet is coming, and it won't stop until it rapes your tight little butt until you cry and it makes you its bitch.
This. You can use hdparm from a GNU/Linux live cd, to do it. Don't forget the HPA sectors, if enabled.
Boot and Nuke (DBAN). Just one pass of zeroes should do the trick. Burn the SSD afterwards.
>Thanks guys, took care of that quickly and easily.
Use the following commands in Linux live environment
$ sudo hdparm --user-master u --security-set-pass "PASSWORD" /dev/sd*
replace "PASSWORD" with the password you want to use during this process
$ sudo hdparm --security-mode h "PASSWORD" /dev/sd*
$ sudo hdparm --security-erase-enhanced "PASSWORD"
$ sudo hdparm --security-disable "PASSWORD"
You need to do this on some SSD's to force new RNG master key.
add the device at the end of the last commands.
Make one wrong step and you will brick your drive
Normal paranoia would be zero the drive once
However Snowden levels should be to eliminate the risk anyway and burn the thing and replace it. It's an easy replacement with all risk foregone.
Just zeroing the drive is enough though.
is this guy schizo or is he right
He's mostly right
this doesn't apply to my little baby ThinkPad x60 though right, since it's blob free via LibreBoot and stallman approved?
>I need Ed Snow levels of paranoia here
No you fucking don't or you'd destroy the drive and throw it away.
Maybe this Edward Snowden is a poorboy
boot on any linux shell then
dd if=/dev/zero of=/dev/sda
it will take some time and
requires superuser access.