Email or username:

Password:

Forgot your password?
nixCraft 🐧

Compliance is the root of all evil. So, you want to destroy the SSD? Drill all SSDs. Destroyed finally. All data is safe. Let’s go home.

The SSDs:

148 comments
Mudd ~: :blinking_cursor:

@nixCraft

Rules followed, compliance met, security insecure

Gemma 👽

@nixCraft
Took me a while to understand what I was looking at... Yeah okay they take a lot less physical space cos they are SSDs but they are in a 3.5" hardware frame. :blobcat_owo: oh no...

Tryst

@nixCraft I worked with a piece of military kit many years ago that didn't have a built-in secure erase (or zeroise, as we used to call it). Instead, there was a red sticker on the back of it and users were instructed to apply the muzzle of a pistol to the red dot and fire one round directly through the flash chip.

ScoldyFingerWagger

@tryst @nixCraft

i had a mate ran a computer recycling business. He offered a Premium Secure Data Deletion service.
Cost nearly as much as the HDD did originally.

16 yr old son with a big fucking hammer! 😂

Tattooed Mummy

@HereToChewGum @tryst @nixCraft this is my preferred data deletion method also 🔨

Luka

@HereToChewGum @tryst @nixCraft

my prefered solution was an old TIG Welding machine with 200A wand a foot padle. You can run tousands/hour and the temprature erases every part of storage left.

ScoldyFingerWagger

@auberginer @tryst @nixCraft

But they believe the data is dead, a lot more, if they see smashed remains...

Andrew

@tryst @nixCraft@mastodon.social that rules. Everything should have that feature

Unlogic

@tryst @nixCraft I always thought military data storage device destruction required shredding to a specific size depending on security level. I like the point and shoot more though.

Tryst

@Unlogic @nixCraft Think of this as an expedient field erase procedure

Unlogic

@tryst @nixCraft succinct description. Added to my vocabulary :)

priryo

@nixCraft
Cyberpunk remake of The Very Hungry Catapillar.
@djsundog

🪨

@nixCraft I'm surprised SSDs are so empty. How is 2.5" still the standard?

hotkey (Zoé)

@nixCraft It looks like empty space, but that's actually where the data is stored: it's filled with cloud particles. Drilling a hole allows the data to escape. :meow_googlytrash:

Bernd 💉x5 💙💛

@teajaygrey @nixCraft more like "we've done it this way since we had HDDs"

OpenComputeDesign

@nixCraft My "favorite" (reason to want to commit murder) is when a person or corporation is trying to destroy their data before selling a laptop, so they just drill random holes through the entire laptop. Only to still miss the hard drive half the time, leaving it ironically the only salvageable part.

Dragon

@OpenComputeDesign @nixCraft they’ll learn not to do that very quickly the first time they drill through a lipo cell

Sivation

@nixCraft ... which is why using a drive shredder is better!

gibeath

@nixCraft Er, NIST says "Shred, Disintegrate, Pulverize, or Incinerate by burning the device in a licensed incinerator" to destroy an SSD. This is hilarious but compliance isn't *as* terrible IF the standards aren't bullshit. nvlpubs.nist.gov/nistpubs/spec

Orb 2069

@gibeath @nixCraft
Shhh. We're busy expanding this particular idiots' mistake into a belief that all rules are inherently stupid! Don't yuck the yum!

Matt Palmer

@gibeath @nixCraft that is a load-bearing "if". Most auditors couldn't spell "NIST" if you helped them out with the first few letters. See, for example, the number of times password rotation still gets mandated...

Simon (a 🐮 in 🇳🇿)

@nixCraft I prefer to use something more subtle, like a sledgehammer

Григорий Клюшников

Just today I saw screenshots of a ebay listing for a MacBook with holes drilled through the soldered-down flash chips and the motherboard underneath them. But at least all other parts work I suppose? And it might even still be able to boot from external storage.

Chip35

@nixCraft No no no no no, Those should go into the paper shredder. A REALLY powerful paper shredder.

Brian Reiter

@nixCraft compliance has almost nothing to do with security.

DerTeZett

@breiter @nixCraft She did. It provides the principles that show the way. It's just a question of cooperation and the will of everyone involved in the organization where it leads.

lexi hexi (none, they)

@nixCraft@mastodon.social this is especially frustrating since the secure erase command for SSDs is pretty much anti forensic

Nazo

@nixCraft EDIT: Been answered.

I would imagine even if they had hit the board if they miss the chip itself they risk that some expert could recover data from it anyway.

I don't know much about it, but isn't the old fashioned write 10x or so still effective even on SSDs? I know things get remapped and wear cycling even has reserved parts, but enough writes of random data should fully clear it eventually, right? (Though not sure if 10x is right or not with SSDs. That's from magnetic media.)

4censord

@nazokiyoubinbou @nixCraft there is a point of overwrites where every flash cell has been changed. But, that costs loads of disk wear. Instead, one can issue a data secure erase command to drop all data, that even restores some write performance

Nazo

@4censord @nixCraft I know about erasing blocks, yeah. But I presume we're talking about extreme measures when someone goes as far as to actually drill holes in it. In theory it's possible to recover old data from erased cells -- or at least so I've heard. Presumably the idea here is to ensure that is no longer possible.

Sure is wasteful as heck to drill it IMO.

Nazo

@4censord @nixCraft This is what I was talking about, yes.

Zimmie

@4censord @nazokiyoubinbou @nixCraft There are two forms of secure erase for SSDs.

One involves flushing the key used for the wear leveling encryption. This is extremely fast, but it doesn’t actually erase the data; only makes it unreadable. Due to this, it doesn’t directly help with performance, so it is commonly followed by the second, older type.

The older type involves a voltage spike for about a tenth of a second. This completely wipes all data stored in the chip’s pages. This is the one which restores write performance, since all the pages are blank again (no mode read/erase/program cycle). Since this is a chip-level thing, it even wipes the data stored in spared pages.

@4censord @nazokiyoubinbou @nixCraft There are two forms of secure erase for SSDs.

One involves flushing the key used for the wear leveling encryption. This is extremely fast, but it doesn’t actually erase the data; only makes it unreadable. Due to this, it doesn’t directly help with performance, so it is commonly followed by the second, older type.

Nazo

@bob_zim @4censord @nixCraft Oh, I misunderstood. I thought that was referring to a simple block erase like what TRIM uses. That restores performance in the same basic way, but this mechanism takes it further by more thoroughly clearing the blocks I see.

Zimmie

@nazokiyoubinbou @4censord @nixCraft Technically, TRIM erases pages. Pages on a flash chip can contain several blocks. Erasing a single flash page is basically the voltage spike, but to only the one page and for a shorter time. The chip-level erase lasts longer in part to make sure everything gets fully saturated.

Different trigger and different scale of effect, but it’s the same mechanism.

Nazo

@bob_zim @4censord @nixCraft Yeah, I get you.

This makes a lot more sense than drilling. Then maybe they can be resold or repurposed instead of just being wasteful.

Robbie 🇧🇪 :tux:

@4censord
Also especially with mlc flash chips it is impossible to know which bits were stored once the cell state has been altered or reset. There is no physical magnetic memory effect like on harddrives
@nazokiyoubinbou @nixCraft

Frank Heijkamp

@4censord @nazokiyoubinbou @nixCraft This only works on SSD drives that supports this feature.

Chris

@nazokiyoubinbou @nixCraft well, the reserved parts oft the SSD are often not accessible via the normal SSD data controller. So rewrite often works not 100%.

Melvin Gundlach

@nazokiyoubinbou @nixCraft Maybe I’m missing something, but with SSDs it’s just better to encrypt the content of the drive. Destroying the key then effectively erases the data.

Nazo

@melgu @nixCraft I mean someone going extreme enough to drill through them is presumably assuming that an attacker might be able to extract data, so I would assume they would not trust encryption to be absolute either. (There are also other side effects like performance loss if it uses a complex enough encryption to be worthwhile.)

Either way though, a full cell erase should be sufficient. No need to be super wasteful and destructive.

Melvin Gundlach

@nazokiyoubinbou @nixCraft Isn’t drive encryption / decryption done in hardware these days anyways?

Nazo

@melgu @nixCraft Yes. I think you missed a significant portion of my previous post.

Melvin Gundlach

@nazokiyoubinbou @nixCraft I did? I was only talking about the performance loss due to the encryption. All your points are valid, though.

💉💉💉💉 Sean Houlihane 🕷️🔶

@melgu @nazokiyoubinbou @nixCraft I don't see that flushing the key is particularly future proof. The data remains only whilst the encryption remains strong.

DasMammut

@nazokiyoubinbou @nixCraft Overwriting 10x is only sensible for (very) old hard disks or floppy disks with wide tracks. Current hard drives pack tracks so close that writing one may impact neighbouring tracks.

So overwritung the complete disk once (e.g. 'dd bs=1M </dev/zero >/dev/sdX' on linux) will do the trick. On SSDs, due to wear leveling algorithms parts of data may survive overwriting in spare sectors but reading date from there will be hard.

Carsten Habicht

@nazokiyoubinbou Full disk encryption with e.g. LUKS also is a good first line of defense.

Frank Heijkamp

@nazokiyoubinbou @nixCraft Use disk encryption from the start and without the key all data on the disk looks random.

Q. Edwards

@nixCraft The only way to be 100% sure the data is destroyed is to eat the drives. Eat them.

GoatsLive

@nixCraft I cut all mime in half with my plasma cutter 😁

Willi

@nixCraft i will send my application for IT forensic specialist... (:

Starraven

@nixCraft
Horrible waste of usable equipment.

Supertapani

@nixCraft
@nixCraft
Mea Maxima Culpa. For years, I told people to remove the HDDs and to drill a hole through them, so they could be safely disposed.

I explained that no amount of erasing or formatting will do, but after drilling, the drives could be safely disposed of. I never explained what exactly makes the hole so secure. I never told them that things may work differently twenty years later 🤔

SpaceLifeForm

@nixCraft

I would not trust that if one is a criminal.

A lot of data could potentially be recovered.

SuperMoosie

@nixCraft

When Fujitsu had HDD issues around 2000, and a lot were returned under warranty, they had a guy sitting in the parking lot hitting them with a hammer and throwing them in a big skip bin.

Sure, the circuit board were cracked, but they could be changed quickly. The data on the platters was still intact.

Biggles

@SuperMoosie @nixCraft when I hit them with a hammer the platters shattered...

SuperMoosie

@Taco_lad
I think the novelty of smashing them hard enough to damage platters wore off after the first 100 or so.
@nixCraft

Biggles

@SuperMoosie @nixCraft quitter 😜
I used a cold chisel in a block of wood as a jig and smashed maybe 200 one day

disarray
@nixCraft this is why I like the wood chipper method
AT-AT Assault :verifiedtrans:

@nixCraft

Aren't there shredding services made specifically for harddrives? But lemme guess, OP's company is too cheap for even that.

Marc de Koning

@nixCraft Hmm.. couldn't they get a second life using nwipe?

Cyber PingU

@nixCraft No need to recover: they have never been even lost!

Alyssa Voronin

@nixCraft

My first thought: Don't you need to drill ALL of the chips?

My next thought: Don't you need to drill ANY of the chips?!

bricky
@nixCraft user error tbh

chinese drives have done this forever so it was a matter of time before the cost-saving tricks trickled down

@dirb
Coyote
@nixCraft bullet holes are just as effective, and arguably more fun.
Andy Fletcher

@nixCraft I've destroyed disks in my log burner in the past. The thing easily gets hot enough to melt aluminium so data destruction is assured :)

Armin H. aus F.

@nixCraft that procedure isn't for destroying data, it's to prove to the manufacturer that you've destroyed the SSD so that you receive an RMA replacement but keep the drive. Destruction happens afterwards.

Jonathan Hendry

@nixCraft

Might work as an anti-theft measure for stored drives. Thief sees hole, assumes is bad, leaves in drawer.

gudenau

@nixCraft This is why I use pliers to break the NAND in half (yes I skip the RAM and controllers and I know for sure what's what).

Sei Kay

@nixCraft why are they large like that but only have small actual space

Frost「:therian:|霜の狼|人面獣心」

@seiKay @nixCraft So they fit in things that expect a 2.5" hard drive!

You want small, go M.2. :3

David de Groot

@nixCraft kill it with fire, it’s the only way to be sure ;-)

Tim McNamara

@nixCraft I am now curious whether you can swap controller PCBs between chassis.

Anchal :comfycofe:

@nixCraft
Still, if you made a hole in the PCB, correct me if I am wrong. Wouldn't desoldering memory chip and soldering it on a working PCB would let you recover the data anyway?

LisPi
@anchal @nixCraft Possibly depending on how many components are paired.
Free Soft&Hardware Enthusiast

@nixCraft If you watched Mr Robot another good approach is to disassemble pry off the memory chips and throw them in the microwave, i typically disassemble use a hammer and sandpaper for platter disk based drives

Ken

@nixCraft The only safe way to destroy data storage devices! 💣

Ben Feakins :linux: :rstats: 📷

@nixCraft what if you missed the cheap USB thumb drive with the drill hole?

Nantucket E-Books

@nixCraft This how you get the San Diego scene in Blade Runner 2049.

wraptile

@nixCraft destroying perfectly good hardware should be illegal.

zBeeble

@nixCraft I mean... if you don't specifically destroy the flash chip, can't you recover the data by desoldering it and moving it to a new motherboard?

Rob

@nixCraft I thought during a second that you were shooting your SSD. 😂

CauseOfBSOD :fediverse:

@nixCraft@mastodon.social bruh

Ive said it before and ill say it again: thermite is the way to destroy data

Duncan Idaho

@nixCraft Lessons learned: drill at several places, best near the connector - at least for this type.

Wilhelm Gere

@nixCraft

Old boss, years ago, told people to destroy old CDs by scratching the back with a knife.

Like that was going to help. They weren't LP 33 1/3rds

I even showed him that the computer read the data just fine afterwards. Wouldn't listen.

thinker

@nixCraft 😂😂 Absolutely nothing destroyed except the case...😂

Joel Wirāmu, Pauling

@nixCraft
A lot of 2.5's ssds have tiny nand chips situated right behind the controller board... You might want to open up one of these to check you actually hit the chips

Hajo Thelen

@nixCraft

Augen auf bei der Vernichtung von Datenträgern (siehe oben 👆 )

#ITSicherheit #Datenschutz

Rickyx

@nixCraft Encryption is not security: not because it's technically insurmountable, but because there's usually someone holding a gun to your head asking for your password. So destruction makes sense...

However, m.2 are easier to destroy: lining them up on train tracks might be a solution. One warning. Do not try this at home!

will talk for elePHPants!

@nixCraft Drilling a HDD makes sense. (Taking them apart and stripping the magnets is so much more fun though)

But drilling an SSD?????

That sounds like a typical german thing to do. "We've done it always like that"

Incident Creator ❎

@nixCraft Fortunately I have access to facilities that permit the "Give 'em both barrels!" approach.

Idwthama

@nixCraft destroy hardware for compliance is part of the programmed obsolescence strategy from OEMs.

RipNatenom #motorisierteGewalt

@nixCraft Why do you want to destroy such valuable equipment?! Why don't you just encrypt them, and throw away the encryption key afterwards? Decrypting afterwards is practically impossible. Producing this equipment took a lot of energy and CO2, which is wasted if you just destroy it.

RipNatenom #motorisierteGewalt

@nixCraft Why do you want to destroy such valuable equipment?! Why don't you just encrypt them, and throw away the encryption key afterwards? Decrypting afterwards is practically impossible. Producing this equipment took a lot of energy and CO2, which is wasted if you just destroy it.

Armin Hanisch

@nixCraft Drilling? Here in rural Bavaria we rely on tools without a power plug. 😎😂

Kevin Karhan

@nixCraft ROFLMAO!

The only safe method is to fully encrypt all SSDs from the start of the use and then use
shred -f -n 1 -v -z /dev/$device
to wipe them.

Like this:
github.com/kkarhan/misc-script

winnie13ua

@nixCraft
I hope them had loots' of tasty salvageable data to analyze)

Jeff Noxon

@nixCraft @bedast I used to have to shred CD-ROMs and the microwave oven sure was a fun way to do that. Lights off in the kitchen.

schiermi

@nixCraft I heard degaussing might help in this case?

Jason Petersen

@nixCraft the replies to this are the worst thing I’ve seen in a while.

Jabberwock

@nixCraft i would have thought putting a SDD into a microwave would be easier.

Stuart Longland (VK4MSL)

@nixCraft What's the bet this was a drill in a jig set up for a traditional hard drive?

Ronin Otter

@nixCraft I’m saving this for an internal presentation.

Go Up