![]() ![]() ![]() |
|
freitasm: I use Acronis Drive Cleanser. The US DoD algorythm takes about five hours to clean a 500GB drive with four passes.
Please support Geekzone by subscribing, or using one of our referral links: Samsung | AliExpress | Wise | Sharesies | Hatch | GoodSync | Backblaze backup
hashbrown: Data recovery has never been demonstrated against a modern hard-drive after even a one pass overwrite. Unless you wear a tinfoil hat and believe the CIA are after your data, one pass of all 0's will do.
hashbrown: 2. Data on solid state disks may still persist due to the way they reallocate storage to distribute writes and extend the life of the disk. ?This could mean a "secure" wipe of a single file may overwrite a completely different section of the drive leaving the original file intact. Of course a full disk wipe would still be?successful.
dclegg: I'd love to hear the reasoning behind requiring multiple writes too. Surely if you are filling all sectors with 0's that would be sufficient. How could the previous data be reconstructed after that?
Please support Geekzone by subscribing, or using one of our referral links: Samsung | AliExpress | Wise | Sharesies | Hatch | GoodSync | Backblaze backup
hashbrown:
The theory is covered here.
http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
dclegg: I'd love to hear the reasoning behind requiring multiple writes too. Surely if you are filling all sectors with 0's that would be sufficient. How could the previous data be reconstructed after that?
hashbrown: The theory is covered here. http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
kyhwana2:
A proper SATA secure erase will erase all the data. (In the drives with AES built in, it just throws away the old key and generates a new one)
dclegg:hashbrown: Data recovery has never been demonstrated against a modern?hard-drive after even a one pass overwrite. ?Unless you wear a tinfoil hat and?believe?the CIA are after your data, one pass of all 0's will do.
I'd love to hear the reasoning behind requiring multiple writes too. Surely if you are filling all sectors with 0's that would be sufficient. How could the previous data be reconstructed after that?
Athlonite: It's been done before where data has been recovered after upto 7 overwrites has occurred so an single zero fill isn't as secure as you think
Athlonite: I recently recovered data from a laptop that had the zero fill done on it by someone not on friendly terms with it's owner
|
![]() ![]() ![]() |