How To Really And Fully Wipe A Hard Drive? 108
root_dev_X ventures: "Admittedly, this is a random question, but here goes - Does anyone out there know of any ways to totally erase the data on a drive? Some friends of mine got into a discussion about this not too long ago; one of them told me they had heard from a friend in the military that they hooked up old HDDs to modified stun-guns and zapped them in order to totally erase them - apparently this method scrambled the magnetic field of the disk, leaving the data irrecoverable. Does this work? Are there any other methods for "data-destruction" (keeping the platter intact, that is)?" A nice "obliberate data to the point of senselessness" tool would be nice -- or is keeping the platter intact a senseless question if you want true security?
Re:its easy.... (Score:3)
Playing off ideas from Bruce Schneier's writings, there are three different people you want to protect yourself against here: casual snooopers, experienced hackers, and dedicated experts.
The casual snooper is someone like, say, my mom, who is baffled by Windows Explorer. You strategy will handle people like this very well, for the most part. If however you're trying to "really" wipe out the hard drive though, that's not enough.
The next person is the moderately adept hacker, who probably has the smarts but doesn't necessarily have the tools to get everything. This kind of person might be able to, for example, mount your hard drive on a Linux system and use various filesystem tools to retreive the contents of the disc. This is easier to do than you might think (anecdote: on my last computer, I went through various partitioning schemes to make room for Win95, BeOS, and Linux. I was surprised to find that one of my reinstalls brought me back to an earlier state of the disc, because the "new" partitioning was one I had used before, and the data was now accessible again. What I thought I had thrown away forever was once again accessible). A quick format might or might not fend off this level of cracker, but don't get your hopes up. A more thorough defense here would be to rewrite the whole drive at least once, if not a handful of times, with something like 1010101010101010101 etc.
The third level of cracker is someone with both the expertise and the tools needed to get whatever they want from your drive. Apparently, the magnetic field on the disc stores an imprint of the last dozen or so writes, thus the above 101010101 strategy only masks the contents of the disc, but it does not remove them. Slightly more clever destruction attacks add more entropy to what you're writing to the disc (add in enough variation to disrupt the magnetic field in various ways: 0000000111111111000000001111111) but even still you're just sweeping over your tracks, not really eliminating them. For this level of attacker, the only sure defence is really to thoroughly destroy the disc -- break it, burn it, scratch it up & cast the remains to the four corners of the world.
So, the short answer to the original question would be something like: "yes, it's possible to *really* erase a disc, but you have to know who you're trying to hide things from and how far you're willing to go to hide it."
Just destroy the sucker.. (Score:1)
1) Even if you overwrite the data with a "Military grade" data wipe tool, there exist pieces of hardware that will still be able to recover your data, if they want to enough.
2) Low-level formating is left for the factory. Modern drives have embedded servo information that you can't recreate without the aid of expensive factory hardware. And that wouldn't help you too much, anyways, given that it won't do a satisfactory job of wiping the disk.
This is why the manual warns you to not degaus the drive.
So your best bet is to just destroy the sucker. First wipe the drive using one of the wiping tools mentioned and then have fun.
I'd suggest you try microwaving it. But don't use your own microwave, because it'll probably end up frying the microwave given enough time. The fireworks are sure to be a crowd pleaser.
You also might consider playing hard disk platter frisbee. Although, with modern 3.5" drives, it's a lot harder than 5.25" or 8" platters.
And, once you've had your fun -- make sure that your disk platter frisbee buddies are people you trust -- just thermite the platters. You can find instructions on how to do thermite at any popular anarchist webpage.
If you leave the drive usable, there is always the possibility of discovery.
Re:destroy and dispose (Score:1)
4. Put picosats in an unstable orbit and allow them to burn up re-entering the atmosphere.
Re:Data destruction 201 (Score:2)
You need to raise the temperature of the magnetic coating above the Curie temperature [britannica.com] (770 C for iron). But as the platters are probably aluminum, and the melting point of aluminum is around 660 C -- you're probably going to have to settle for melting the platters and stirring them up.
Be aware that melting aluminum in your wastebasket will damage your wastebasket. And you probably should not do this near your cubicle.
"Keeping the platter intact"... (Score:1)
I guess you want to re-use the hard drive after deleting? Then you are stuck with software methods. A stated before you will need MANY truly random overwrites before the disk really is not recoverable. With Linux try (for drive
dd if=/dev/random of=/dev/hdX
Re:How to destroy anything... (Score:1)
Alternatively, store all of your important data on a Conner CFS1275A [seagate.com]. Probably one of the worst drives ever built. Had no less than five of them die on me in one week. Just wait for the "thunk-thunk-thunk" sound, and you're all set.
Simple! Follow these three steps: (Score:1)
Herkimer... (Score:2)
Or you could just give it to my friend Liz, she seems to break everything....
Re:Cryptonomicon: magnetic doorway (Score:2)
Who are? The disks, or the people who are leaving?
--
Re:Now you did it (Score:1)
In conventional terms, when a one is written to disk the media records a one, and when a zero is written the media records a zero. However the actual effect is closer to obtaining a 0.95 when a zero is overwritten with a one, and a 1.05 when a one is overwritten with a one. Normal disk circuitry is set up so that both these values are read as ones, but using specialised circuitry it is possible to work out what previous "layers" contained. The recovery of at least one or two layers of overwritten data isn't too hard to perform by reading the signal from the analog head electronics with a high-quality digital sampling oscilloscope, downloading the sampled waveform to a PC, and analysing it in software to recover the previously recorded signal. What the software does is generate an "ideal" read signal and subtract it from what was actually read, leaving as the difference the remnant of the previous signal. Since the analog circuitry in a commercial hard drive is nowhere near the quality of the circuitry in the oscilloscope used to sample the signal, the ability exists to recover a lot of extra information which isn't exploited by the hard drive electronics (although with newer channel coding techniques such as PRML (explained further on) which require extensive amounts of signal processing, the use of simple tools such as an oscilloscope to directly recover the data is no longer possible).
So, in conclusion - Sorry, can't be done without modifying the electronics in the drive. That might be a challenge to the drive manufacturers though... how to get your density doubled by purposefully use the overwrite and read both the previous and current data! Kind of the same idea as the two bits per cell technology used by flash memory manufacturers...
Yes there is! (Score:1)
separate the pieces (Score:4)
See Peter Gutmann's Usenix paper on secure deletion of data from magnetic and solid state memory [auckland.ac.nz] for some truly impressive data recovery methods.
--
Re:This won't work. (Score:2)
Yup. And even this won't work. Suppose you've got data in marginal sectors on the drive - the data gets mapped to spare tracks, and the marginal sectors are blocked out and remapped by the drive's firmware.
No amount of repartitioning and reformatting and "overwriting with junk" will overwite the mapped-out sectors, because the OS (and BIOS) never sees the mapped-out sectors.
Whether this is sufficient depends on who your imagined adversary is.
If it's Joe Average, who bought your used P166, repartition and don't even bother reformatting.
If it's Joe Linuxgeek, who bought your used P166, repartition and overwrite with junk.
If it's Fred the Fed, degauss. This will likely ruin the drive, as there's lots of information embedded between tracks on the platters that the drive heads use to figure out whether they're tracking correctly. This is why you can't "low-level" format (in the sense that you could with old-sk00l MFM drives) an IDE drive.
If you are Fred the Fed, and just got busted for selling secrets to the Russians... it's too late to use thermite.
There are reasons why military and intelligence organizations require physical destruction of drives on which classified material has been stored.
The right way, the wrong way and the Navy way (Score:1)
Re:There is no 100% sure way to destroy data. (Score:3)
You correctly point out that physical destruction of media is the only way to be sure.
One thing to be aware of when overwriting data with patterns is that what you think you write to disk isn't what you write to disk.
A string of "00000000" isn't "all magnetic north poles up", and a string of "11111111" isn't "all magnetic north poles down".
Drive firmware maps these bit streams into encodings that are broken up into patterns of ones and zeroes that the heads can always read - much the same way that your serial port would get very confused if you tried to download a 100K file of "all zeroes" by just holding the ReceiveData line low for 30 seconds with no parity or stop bits.
The actual encoding method by which the bitstream is encoded into alternating magnetic patterns is probably drive-dependent. As a result, the "ideal" pattern of bytes the controller should write to the drive to create patterns of alternating, or mostly-North, or mostly-South, magnetism, will also be drive-dependent.
Practical application: The Apple ]['s "disk ][" floppy controller used to have a feature where you could tell the floppy drive to give you the data as seen by the read/write head. By changing the encoding scheme to a less-redundant, but equally-reliable one, you went from 13 sectors per track to 16 sectors per track. Many copy-protection-breaking programs of the day would give you the bytes as seen by the drive head and use this to determine what encoding (or if a custom encoding) was in use.
In hard drives - MFM and RLL are two encoding schemes. RLL drives were exactly the same hardware inside, but used a different encoding scheme. RLL stood for Run-Length-Limited, where "Run-Length" can be loosely translated into "number of consecutive all-north-poles-in-a-row the drive firmware will tell the head to read/write for any given input bit sequence. As such, the RLL version of a drive typically had 30M of user space, whereas the MFM-encoded drive - same hardware - had 20M of user space.
Today's drives work on the same mechanism at the head/platter level, it's just buried under many more levels (BIOS, C/H/S remapping, LBA, etc. etc. etc.) of abstraction.
Others have posted links to this paper [auckland.ac.nz]. I've merely summarized section 3. It's a damn good paper.
If it's important - whether military or corporate secrets - physically destroy the media and buy a new drive.
Re:How about Something Different (Score:2)
True. An old stunt we used to love doing as kids was to load an image into an Apple ]['s graphics RAM, then power-cycle the machine and go into graphics mode on power-up.
Most of the time, there was corruption, but the image remained recognizable - the chips retained the ability to return a TTL signal to within spec - even after 5-10 seconds of power-down.
I have no doubt the data was recoverable (i.e. measure analog voltages) for power-down periods of time much longer than that.
Obvious solution (Score:1)
--
Big ass magnet (Score:2)
I've done it before, works like a charm.
---
Re:Other techniques (Score:1)
Here's what I would do:
That should completely wipe it out.
Re:There is no 100% sure way to destroy data. (Score:1)
Re:Big ass magnet (Score:1)
drives have gotten so dense that it is very difficult to depolarize all the data reliably.
you would probably need an alternating electromagnet capable of picking up a car to do serious damage... and even then...?
Re:its easy.... (Score:4)
/. needs a new moderation category "didn't get the joke".
Comment removed (Score:4)
Hysteresis is your friend. (Score:2)
Stick the platters near a source of strong alternating magnetic fields, change the relative 3d orientation of the source a few times, and run the source for a long time. Make sure there's no interposing metal that could reduce the field density at the surface of the platter, or increase field strength to compensate, and then melt the entire drive.
Physical distruction (Score:2)
Re:Other techniques (Score:1)
Using different patterns for different passes is advisable so that there's no recognizable residue left. Writing just zeros two dozen times probably wouldn't obfuscate the residue enough to stop someone determined with the right equipment. So you need to replace /dev/zero with /dev/random to make the data on your hd unrecovable for say the fbi..
And Don't Forget To Wipe Your RAM! (Score:1)
There is a paper from a 1996 USENIX Security Symposium that might be of interest. The paper is titled Secure Deletion of Data from Magnetic and Solid-State Memory [sourceforge.net]. It's chock-full of interesting tidbits...
Included are not only current (as of 1996) techniques for wiping a drive as well as your RAM(!?!?!).
Now, if that was current in 1996 (for the mainstream at least), what did organizations like the NSA have then. And, better yet, what do they have now?
Howto (Score:1)
Now, we can discard 3/4 of the posts that have something along the lines of "destroy the platters" as you _don't_ want to do that.
Next, overwriting with random data a few times is good. You will need to overwrite many times, using both sequential and random access patterns. If using just, say, sequential access (a-la format, even a low level one) there will be recoverable traces of your data at the edges of the tracks. The hard drive itself can't recover this data, but experts can.
Then overwrite the drive multiple times, not with random data, but with a fixed pattern to fully magnetize with the new data, say overwrite it with 0xFF multiple times in a row (sequential and random access) and then with 0x00, again multiple times in sequential and random access patterns)
Then you will need an implicit knowledge of the particular drive geometry and encoding methods, so you can calculate Worst Case Scenarios for both access patterns and data modulation.
One poster mentioned the old MFM worst case data pattern of 0xDAC3. This will be differnet with newer drives and encoding schemes.
Do this a few times and you should be safe
-- kai
Verbing Weirds Language.
Then again... (Score:1)
Cheers... .*rc is
--
$HOME is where the
Re:Cryptonomicon: magnetic doorway (Score:2)
Yeah, I can just imagine it now.. some fellow carrying a server walks out of the room. In doing so, some shoplifting-type sensor picks up this little detail, discharging an arc-welder into a thick coil wrapped around the doorframe.
The fellow notices a loud "wooosh", kind of a rapid tinkling as wiring squeezes about the doorframe and shifts in its mountings, fine ferrous dust immediately sucks towards the extremeties of the door, instantly forming a fine iron fur. All zippers, key rings, watch springs, and other iron sundries jolt imperceptably. The case of the computer is torn through inches of open space and slammed into the door frame. Anybody within 30 yards with a pacemaker dies instantly. The hard drive jumps as its magnets align to the strong magnetic field.
Then great capacitor in the arc welder fades, and only the smell of melted insulation and positive ions is left in the air.
I bet the data would still be intact... if not, easily recovered using advanced techniques. A uniform magnetic field would probably leave the ferrite in a predictable alignment... anything which isn't is part of the old data structure.
Encryption and writing random data acros the drive would probably work better. Maybe even mounting a coil near the platters then using a garage-door-opener type device to trip a battery inside the case to send crazy fields through the platters.
Re:Then again... (Score:2)
Re:Data destruction 101 (Score:2)
Re:securely wiping drives (Score:1)
Or if you don't mind waiting...reformat your system and put WinME on it -- it'll be completely trashed in about a month or so.
Thus sprach DrQu+xum.
Re:you REALLY wanna scre it up? (Score:1)
Is it just a coincidence that sans means "in the absence of?"
Re:Erasing a Hard Drive (Score:1)
dd if=/dev/random of=/dev/sda
You could of course adjust it to repeat the process with a shell script.
You can't overwrite everything easily (Score:1)
Pachooka-san
The smart user uses encryption. (Score:2)
Look at www.kerneli.org [kerneli.org] for information about how you can encrypt your hard drive on Linux. Other tools exists too.
Re:Simple! Follow these three steps: (Score:1)
Re:Big ass magnet (Score:1)
And how did you confirm that the data was fully wiped?
By doing something more than double-clicking on the C: icon in Windows Explorer, I hope!
Details, man! Need details!
Bulk Erasers (Score:1)
I didn't see this in any other comments...
Radio stations typically use a hand-held "bulk eraser" that's basically a big magnet to wipe clean tapes and such. We had a used hard drive in the station that I bulk-erased and it certainly seemed to get rid of all the information - and it still worked. Had to reformat it, but it worked.
You can probably purchase a bulk eraser for around $100 or so.
Re:The smart user uses encryption. (Score:1)
Taken off the http://www.rubberhose.com/ [slashdot.org]
For thoses that don't know about the software you can read about it here [rubberhose.org].
PS:I never post to /. This is a first! back to getting the new /. DB built...
Algorithm for Memory (Score:1)
Hmmm, this sounds alot like the algorithm for how memory works in our brain.
Re:Data destruction 101 (Score:2)
Re:Some thoughts... (Score:2)
We got some brand new 1 Gig IDE drives in a few months ago. They look like 10 gig drives but they claim 1. maybe they have 9 gig worth of bad sectors or maybe they have 9 gig worth of sectors that can be remapped.
When a modern drive is told to put a sector at a specific location, its going to do its own mapping and if its detected an area of the disk is going bad, it will put the new data someplace else leaving the old data there where you can't delete it as a user.
Really erasing a disk (Score:1)
The only non-destructive method that works well is a bulk tape eraser. A tape eraser contains a very weighty coil that generates an extremely strong magnetic field.
When I was in the Navy, that is what we used to erase hard media that contained TS information. The thing had a warning about not wearing a watch, using it near anyone wearing a pacemaker, or using it within 10 feet of any media that you didn't need to erase.
Laying that puppy on top of a hard drive for half an hour will randomize it _quite_ well. I don't want to make any guarantees about the drive electronics, though. So proceed at your own risk.
You can probably find one at a place that handle commercial video. Try the Yellow Pages.
Cheers!
Sand Paper (Score:1)
Erasing a Hard Drive (Score:1)
Start with the usual re-partition and reformat so you have a completely blank drive. Then completely fill up the drive with essentially meaningless crap, white noise. Then reformat again to blank it. All data should be completely gone.
Something like Eraser [tolvanen.com] should do it I'd think. Granted it's for windows, but I'm sure there'd be a Linux or BSD equivalent somewhere.
its easy.... (Score:3)
;)
srm (Score:1)
There is no 100% sure way to destroy data. (Score:2)
Several wiping programs are available that will overwrite data multiple times with binary patterns - checkerboards, solid 0's, solid 1's, random patterns, etc. Even after all of that, it is still possible for an organization with lots of resources such as a data recovery service or a three-letter agency to recover the residual remains of the data, though it would be very difficult.
The only sure way to eliminate the data entirely is to completely destroy the media. Sandpaper on hard disk platters or CD-Rs (the top side, make sure you sand off the silver and dye layers) works, incinerating also works. Be careful. I saw a case where a suspect tried to destroy a floppy disk with incriminating evidence by cutting it up with scissors. The FBI was able to put the disk back together like a jigsaw puzzle and recover the data. Make sure there is nothing left of the recording surface.
It all depends (Score:1)
If you're a newlywed and getting rid of your vast pornography collection a format is probably sufficient. Rewrite over the data with a random pattern if you're paranoid your new wife will use Norton Marriage-Breaker 2K1.
If you're dealing in contraban, whether the contraban is on the harddrive or the harddrive just contains incriminating evidence, destruction of the device would be your best bet. Remove the platters, stick them in the microwave for a few seconds (mostly just for the fireworks), sand them, sand blast them and melt them.
Just like cryptography the lengths you should go to depend on the difficulty in going to those lengths, the probability that those lengths can be compromised and the cost if those lengths are compromised.
This company does just that (Score:2)
No, I don't work for them, they are just located a few blocks away from where I live.
How we did it in the Marines - 1989 - 1993 (Score:1)
I can't speak for how it was done other than 1990 - 1993 .. I was enlisted with an MOS (Military Occ. Speciality) of 4063 (programmer) with a secondary MOS of 4066 (small systems specialist). Oddly, I never programmed, and spent all of my time as a PC specialist and LAN guy.
Norton (pre buyout) had a nice tool called wipedisk. Put this on a bootable floppy, set it in the autoexec.bat to execute and let it go to town. The app wrote 1 and 0 in alternate patterns to every byte on the drive.
If memory serves, our standards were to write in 1s, then 0s, then 1s again. This was standard practice for all drives that held classified data, including the unix servers (long story behind THAT bit o' weirdness).
Destroy the drive (Score:1)
Answer depends on your threats (Score:2)
PARENTS: <code>dd if=/dev/zero of=/dev/hdc</code> will make the disk appear empty to anyone who uses the standard access hardware.
TABLOID JOURNALISTS: you'll probably want to use one of the multi-pass programs. Civilian data recovery sites might still be able to pull up the data, but multiple writes (properly done) will make it expensive enough to discourage most people. If the material is sufficiently sensitive (e.g., you're protecting medical records of celebrities and the tabloids have been caught dumpster-diving) you might want to proceed to the next step.
TLA: big vat-o-acid to dissolve the platter. Forge to heat the platter to melting temperature, or at least hot enough to completely scramble all magnetic domains. Heavy duty sanders, again producing enough heat to scramble any magnetic domain that survives the abrasion and magnetic fields in the motor.
ALL: don't forget that data rarely exists in only one place. It's a waste of time to carefully scrub hard disks, yet toss backup CD-Rs into the trash as-is.
How to destroy anything... (Score:4)
Some thoughts... (Score:2)
Data recovery companies (Score:2)
No Need to! (Score:3)
For the next week, take all of the Trolls posts on Slashdot and store them in random places on your harddrive where the data needs to be destroyed. Anybody who trys to read that data would get so sick of reading "Frist Post", "wh00p", "pron" & "3133t h4x0r" and seeing lots of nasty goatse.cx links that they would immediatly dispose of the hard drive without getting any sensititve material
I guess that method wouldn't work if you were a troll trying to cover your footsteps, though!
Re:its easy.... (Score:1)
format just really seems to make the data go away, but it's still available w/ the right tools - just like deleting a file doesn't really make it 'go away' but removes the first letter of the file name, making the space available to the OS (okay, okay, that was how it is/was under FAT16) I'm sure other file sysetm types are similar.
This won't work. (Score:3)
- A.P.
--
* CmdrTaco is an idiot.
Now you did it (Score:4)
Unlimited storage.
That's right. Every time you need more disk space, simply delete something not used in a while, then overwrite it with a new file. Need that old file back? Great - have the filesystem automagically run a recovery on it. Put it into the kernel, and we've got blackholefs.
The end result is a bottomless pit of unlimited drive space
(and yes, I am joking, but if someone can think of a way to really do this them I'll REALLY be impressed!)
Re:Sand Paper (Score:1)
Data destruction (Score:2)
Other techniques (Score:5)
Lawrance Livermore used to take decommissioned hard drives and Syquest style media in the green area and dump the platters into a vat of acid. Floppy disks went through the three-pass shredders, so you end up with fine magnetic dust.
The original specification for overwriting disks containing classified but not secret data called for 300 overwrite passes, alternating between all-zeros, all-ones, alternating zero-one, alternating one-zero, and "worst case pattern" (for those old MFM drives, the 16-bit pattern 0xDAC3). You needed to know the exact drive geometry, because you want to do all the tracks on a platter individually, using a back-and-forth sweep so as to get into the guard bands as much as possible.
(In other words, wipe from cylinder 0-max on head zero, then from cylinder max-0, then go to the next pattern and wipe. Then you go to the next head.)
Is it worth it? At today's prices, I don't think so.
Re:Hysteresis is your friend. (Score:2)
Re:YAST (Score:1)
Re:This company does just that (Score:2)
Burn is a file-deletion utility that does what this poster just described---you can set the pattern (0000, 1111, or maybe 1010101)---and the number of passes it makes. Highly configurable.
Also has a command to "erase free space" on the hard drive---same options as the file deletion, only it cleans all the os-marked "free space."
--
I did this once (Score:2)
About a year ago I worked for a company (which shall remain nameless) that tasked me with writing a secure disk wiping algorithm. I did a little homework, and found that the US Department of Defense had a recommended 7-pass algorithm. A little more homework, and I discovered a crypto guru named Peter Gutmann [auckland.ac.nz] who had a 35-pass algorithm. I implemented both of those, and then took it a step further and allowed the user to create a custom wiping algorithm, up to 99 passes (I figured any more than that would probably be overkill). We had a professional cryptographer on staff who assured me that even after 99 passes of overwriting the data on disk with different patterns, the NSA or some other such agency could still recover the data if they wanted to badly enough. I had my doubts, but then I've never ventured into the field of electron microscopy.
Anyway, the project was killed due to management/marketing cluelessness, so we never actually shipped it, but it sure was educational to implement. I had been under the impression that simply overwriting a file even once with 0's and 1's would be enough to render it unrecoverable, how naive I was.
--
Re:YAST (Score:1)
Simplest Idea (Score:1)
Like some other people have said, it's much cheaper and securely reliable to destoy and replace the HDD, at least that way they can't cause a national security problem by loosing them behind photocopiers (see the Los Alamos incident late last year)
Re:Data destruction 101 (Score:1)
The magnetization starts out as a narrow track with a high signal to noise ratio. If the magnetization is not altered it will slowly spread out from the narrow track.
You might want to think of it as a hill of sand: over time the hill will be worn down and spread out, but it will still be a hill.
If you have written something a year ago the magnetization will have spread some. If you overwrite the data today then it will be possible to read the one year old data by reading just beside the track. If you overwrite the new data tomorrow it will still be possible to retrieve the 1 year old data, but it will be significantly harder to retrieve the data written yesterday.
So: while it does help to overwrite data several times, it is still possible to retrieve data that has been on the drive for long.
If data is only altered once a year, it will be possible to retrieve the individual years. I think IBAS [www.ibas.dk] is capable of recovering up to 6 generations back. As you might expect this is not cheap.
Re:The smart user uses encryption. (Score:1)
If everyone remembers, Kevin Mitnik's encrypted hard drive [slashdot.org] was in the possession of the FBI for years, and they couldn't get the data off it.
Re:How about Something Different (Score:2)
Hard Drive secure delete ? (Score:1)
Re:Erasing a Hard Drive (Score:1)
"Everything that can be invented has been invented."
Nuclear Magnetic Resonance Imager (Score:1)
So, we'd go down to the chem lab and rub the harddrive with a Vigorous Circular Motion [TM] against the side of the NMR machine (MRI for you politically correct types) that houses the liquid-helium cooled superconducting electromagnet. If you forgot to leave your wallet in another room, you lost all the mag stripes on your library cards etc.
This worked, but it so thoroughly polarized the heads and platters that they became useless for recording or reading anything ever again. This really pissed off the recyclers we were selling old hard drives to - they wanted to pull the heads out or something, anyway they complained A LOT.
The chem guys, incidentally, thought this was a ton of fun. They liked showing off their machine, I guess.
--Charlie
Re:Hard Drive secure delete ? (Score:1)
Contrary to conventional wisdom, "volatile" semiconductor memory does not entirely lose its contents when power is removed. Both static (SRAM) and dynamic (DRAM) memory retains some information on the data stored in it while power was still applied. SRAM is particularly susceptible to this problem, as storing the same data in it over a long period of time has the effect of altering the preferred power-up state to the state which was stored when power was removed. Older SRAM chips could often "remember" the previously held state for several days.
Re:This company does just that (Score:2)
I thought that I should just mention, to all those people recommending software solutions, they don't mean squat to someone willing to have the drive analysed by a professional data-recovery service. Mondern drives are getting harder and harder to erase this way and modern OS's don't help either, both abstract the actual physical data so much that you can't be abusolutely sure about anything.
Take ext2fs for example, to prevent fragmentation it stores files all over the surface of the disk, if a file grows in a way that would fragment it the entire file is moved to annother location on disk to prevent this fragmentation. That means you now have two copies of the file on disk.
There are also stupid bugs possible in this software (well, any software has bugs but . . . ). For example a couple of months ago someone on Bugtraq noted that shread (or wipe, I can't remember) truncated the file to 0 bytes before it overwrote it, this had the effect of creating a new file on disk and doing _nothing_ to the existing data, which can be recovered by a simple grep of the raw disk device.
Even if your wipe software works the hard disk itself abstracts the actual structure of the disk with things like automatic bad block relocation and such, making it impossible to know for certain that your sensitive data doesn't exist in a backup area of the hard drive.
I guess the important consideration is who are you trying to keep the data from, people who are going to use:
Re:Military methods (Score:2)
Re:Simple! Follow these three steps: (Score:1)
Re:you REALLY wanna scre it up? (Score:1)
If you are a script kiddie, at least do it on Linux.
Must destroy platter (Score:1)
From what I have studied and been told, there is nothing you can do to the data that would make it impossible for a determied foe with bottomless pockets (i.e., NSA, FBI, other evil-three-letter-acronym) to get the data. You must completely de-gauss the hard drive to do it, which is only theoreticly possible. You must destroy the hard drive completely.
Using an EMP device would be good, but it still might not be enough. However, going in this direction might have some great side effects if it's strong enough. Imagine this: The FBI breaks into your home with the mandatory guns and dogs, then you hit the button for the EMP device. They load all your stuff in their van, turn the ignition and . . . nothing. The EMP fried their van's computer. Ha Ha, suckers!
Some sort of explosion might do it, but it still might be possible to pick up every little peice of the hard drive and put it back together (unlikely, though). Burning it isn't really enough (there are data-restore compaines that restore burned hard drives all the time). The last two options are going to totaly destroy it anyway, so you might as well make sure the job is totaly done.
For this, you need something like thermite [thermite.org]. Useing this on your hard drive, it becomes diffcult to even say "this is a hard drive" *g*.
------
Wipe data off of the hard drive (Score:1)
Use Shred from GNU Fileutils (Score:4)
shred -z
It takes ~6-8 hours to wipe out a 10GB drive.
Re:There is no 100% sure way to destroy data. (Score:2)
--
Re:How we did it in the Marines - 1989 - 1993 (Score:1)
--
Spelling by m-w.com [m-w.com].
Another guaranteed way... (Score:2)
No special configuration options needed, and in many cases technically counts as overwriting with totally random data. :)
Dave
Data destruction 101 (Score:4)
Delete your files. This will keep a six-year-old from recovering them. If you're running a UNIX which doesn't have a recycling bin, nor a broken file system which still leaves data lingering intact long after "deletion", then you'll be able to keep a seven-year-old from recovering them.
Follow the following procedure:
Follow the cryptographic method outlined above. Then get out a sledgehammer and physically destroy the drive. Drop the platter in a metal wastebasket, douse it in lighter fluid and set the thing on fire. Don't stop until the platter is totally destroyed.
Keep in mind that the cryptographic method may fail, and even a bulk degausser isn't guaranteed. They can do amazing things with electron microscopy today.
dd, the helpful tool :) (Score:1)
do that several times... if you're really paranoid you can use
you REALLY wanna scre it up? (Score:1)
It's software for windows, but this shit is crazy, it will physically damage the drive. If you use something like Blowfish Advanced CS [www.bsn.ch] to wipe the drive of everything and clear the free space with a 30x write, and then use the Hard Drive Killer, and then maybe open the drive and put the pladders in a blender, it'd be damn near impossible for anybody to get anything.
Yet another yarn (Score:2)
Cryptonomicon: magnetic doorway (Score:1)
Good book.
PGP comes with a disk wipe utility... will wipe the hard drive anywhere from 8 to 256 times.
Military methods (Score:2)
Now that's secure.
Re:How about Something Different (Score:2)
An excellent example of this was the recent Concorde crash. I recall reading a little blurp about how it used a solid state memory data recorder which had lost power... yet the investigators were still able to extract most of the information from it.
Re:Military methods (Score:2)
The version I heard floating around was a somewhat urban-legendish-sounding story of <some vendor, possibly Norton> trying to sell <some product, possibly "wipedisk"> to <some security-paranoid gov guys, possibly the military, Lawrence Livermore Lab, etc.>. The military (or whatever) guys listened politely to the vendor's pitch, then said "That's nice, but let me show you how we destroy classified data..." and led them over to where they had set up some sort of guillotine thing, put a drive in, and chopped it in half; the message was "we don't need no steenkin' software -- if it's important, we can afford a new drive"; the vendor was suitably chagrined, etc...
Of course, the guillotine thing wouldn't be nearly as effective as the various other versions already posted (acid bath, thermite, etc.), which for that reason sound much more probable, but it's interesting that someone would have said it that way -- I guess to the less-imaginative, the guillotine makes an easier image (embellish the story with loud noises, pieces of platters and arm assemblies flying around, etc.) To me, the acid bath / thermite sound more impressive, but maybe it takes a little more sophistication to visualize. The embarrasing-the-vendor part seems extraneous, especially as it assumes the vendor would have failed to know better.
David Gould
Re:Some thoughts... (Score:2)
Re:Another guaranteed way... (Score:2)
Back in the days... (Score:2)
shred (of the GNU fileutils) works well (Score:2)
For the theory behind it, see "Secure Deletion of Data from Magnetic and Solid-State Memory" [auckland.ac.nz].
On-line documentation (if you have the package installed already):
$ info 'file util' basic shred