Navigation: /b/ - Random [Archive] | Search | [Home]
RandomArchive logo

alright you 1337 Hackerz how do i delete files on a ssd which

The stories and information posted here are artistic works of fiction and falsehood.
Only a fool would take anything posted here as fact.

Thread replies: 180
Thread images: 21
alright you 1337 Hackerz

how do i delete files on a ssd which are impossible to recover for forensics?
>>
>>702532049
you cant
you have to destroy it
>>
Multi-pass full reformat
>>
just empty the recycle bin m8 you should be fine
>>
Basically smash it
>>
>>702532049
microwave that shit man
>>
>>702532132

is there a programm for that or how can i do dhat?
>>
>>702532049
Use any program which will overwrite the data with 0s; usually known as shredding.
That'll be plenty, there's no need to do multiple passes or any of that bullshit with an ssd.
>>
>>702532213

thats not how it works
>>
>>702532304
yes it deletes the files
>>
>>702532049
Rebypass the ISA drive multifunction.
>>
wipe with dban
>>
>>702532049
ssd is easy format it, magnets, hammer, (my recommended favorit) shredder
>>
youll have to destroy it, burn the shit outta that ssd
>>
>>702532049
privazer
>>
>>702532256
yeah its called cmd, boner
>>
>>702532049
why so paranoid?

you been downloading naughty things?
>>
>>702532304
Well sort of. No it won't physically delete the data (deleting files only marks the space as available to write, it doesn't actually delete the file meaning it can be recovered until something writes over it) but legally i'm sure there has been a case whereby a judge ruled that because the file was deleted they weren't admissible in court even though they were recovered.
>>
>>702532049
there are plenty of programs that can overwrite the entire hard drive and make it incredibly hard to recover anything of value, but if they want it bad enough, theyll get it.

Best bet is to destroy it or encrypt it
>>
>>702532049
SSDs aren't like mechanical hard drives. They are more like flash memory. When you delete something, it's actually deleted.
>>
File: 1468089049395.png (290 KB, 500x464) Image search: [Google]
1468089049395.png
290 KB, 500x464
>>702532049
You can rewrite the data with one and zeros multiple times over, which is the way the Government deletes Top Secret data from their computers. There's a multitude of places on your hard drive, however, where residual data related to the objectional data may be stored. So if you want to be 100% safe, I'd suggest burning the hard drive and then shredding the remains.

What do you have on this hard drive that you don't want anyone to find?
>>
File: 1436883105963.webm (2 MB, 840x473) Image search: [Google]
1436883105963.webm
2 MB, 840x473
Don't care if b8. There's only one way out of this shit. And I love showing it to people
>>
>>702532049
Insert it into your anus. Instantly clears all the files. I'm embarrassed to even be telling you this as surely an internet expert such as yourself would have discovered this technique on your own.

The key is to jam it in as hard as possible with no lube.
>>
File: 7qTYfrp.jpg (73 KB, 736x473) Image search: [Google]
7qTYfrp.jpg
73 KB, 736x473
>>702532399
>>
I used to wipe my drive by deleting all the files and then running a script:
While(1):
Echo "0110010" >> anyfile.txt

I would just run it until there was no space on the drive. Then run it again. It goes faster if you create a longer "01010....1010" string.
>>
>>702532049
You shouldnt be putting data outside your OS onto your SSD, if you want it to last. The writing, and rewriting kills that kinda of harddrive. Save everything to an external HD or have a thumbdrive that could easily be pulled and tossed in the microwave.
>>
>>702532049
do a safe erase, no way to recover anything.
it kills any data on it, though, not only a single file.
>>
>>702532613
season 2 is boring as fuck

also you cant just pull those monitor cables out like that
>>
>>702532613
or you can just get a shredder and not do 30 million things at once
>>
>>702532457
This guy knows whats up.
Nuke & Boot that fucker.
Also op stop watching CP you sick fuck.
>>
>>702532611

Few files. No cp!
Zips from my website.

But wont it hurt the SSD because it has a special life time? I want to use the SSD after that still
>>
File: 1471584178961.jpg (85 KB, 416x576) Image search: [Google]
1471584178961.jpg
85 KB, 416x576
Can you DBAN a SSD?

A full wipe with maximum passes should make any data hard enough to recover to where unless you are literally producing CP or killing people noone is going to waste the time and money required to get any data off that drive.
>>
File: hdat2.png (55 KB, 692x350) Image search: [Google]
hdat2.png
55 KB, 692x350
Use HDAT2 or vivard (DOS) it will work.
>>
>>702532662

on your way to Phloston Paradise?
>>
>>702532842
>special life time
you have a special life time too m8.
it will survive, but just like everything you do, it wears the drive. same goes for hdd.
if its a new ssd from a decent brand = no worries.

protip:
encrypt your drive, police can't do shit :`)
>>
Store all your illegal shit on a RAM disk and always keep your PC on with a battery backup. If the police come then kill your power including the battery and it's guaranteed all your illegal shit is completely gone.
>>
>>702532842
what are you so worried about that you want to wipe it? is it illegal or personal information?
>>
File: image.jpg (35 KB, 250x250) Image search: [Google]
image.jpg
35 KB, 250x250
>>702532476
>>
File: 1472664585302.gif (1 MB, 245x345) Image search: [Google]
1472664585302.gif
1 MB, 245x345
>>702532809
I'm enjoying it myself, as for the monitor cables, that's just unnecessary time taken up. That scene was all about urgency because he was high and thought he got caught
>>
File: arKYwq7_460s_v1.jpg (47 KB, 460x495) Image search: [Google]
arKYwq7_460s_v1.jpg
47 KB, 460x495
>>702532637
Yes, absolutely. The other methods may work (i.e. burning, shredding, microwave, 1-0-1-0, etc), but this is the most effective method. The high pressure environment coupled with the presence of feces - and perhaps semen - totally destroys all data. The other methods work as well, but there's always a chance that the crime lab can recover a sliver of the remains, put it under an electron microscope, and find the offending material.

OP, if you really wanna keep John Law off your back, pop that puppy into the kiester.
>>
>>702533035
WOW NIGGER. If they are fast enough, they can freeze the ram and still access the data.

http://citpsite.s3-website-us-east-1.amazonaws.com/oldsite-htdocs/pub/coldboot.pdf

educate yourself
>>
>>702533219
did he really just drill a few holes in those drives?
that wouldnt do shit lol
>>
>>702532049

many drives have a secure erase command that can be activated by special software. Some drives use hardware encryption allowing the drive to be instantly erased by simply deleting the encryption key.
>>
>>702532997

i have my OS on my SSD and forget to encrypt it with verycrypt back in the day.

I got my 2nd and 3rd HDD fully encrypted so those are safe but not the SSD which i guess i need to reinstall the OS for it.

Also lets make something up.
Police is coming my PC is on but Screen is locked under windows. The SSD and the HDDS are still on power. Well the HDDS are encrypted but the SSD not, they could just snap it off and get all the data, right?
>>
>>702533333

Just for fun.
>>
Reformat it with a Mac file type and more space than it actually has then install a file that is larger than there is actually space on the drive. Repeat until happy
>>
>>702532049
killdisk (dut) com

The free version will do just fine. Writes 0s across the whole disk. Did it for a friend who was accused of having photos of this 17 year old. Local/State Digital Forensic Experts didn't find shit. Even if what you're trying to delete would be investigated on a federal level, our US government isn't particularly good at hacking or recovering information, anything they'd investigate indepth is usually outsourced (aka the San Berdino iPhone). I doubt what you're trying to erase is of that much concern, but yeah, Kill Disk should do the trick.
>>
>>702532601
Depends. Most of the time the SSD waits until the best time to empty the whole block(s), this is called TRIM . Moving and deleting stuff at every operation really wears the drive down otherwise.
>>
>>702533740

alright, thank you m8. I dont live in the US.
The IT in my country is as retardet as an ape but you cant be sure enough.
>>
>>702533313
What are the odds that anyone even knows you have a RAM disk and reacts in seconds to freeze your RAM and persist the data?
>>
>>702532601
True there are diffrences but it still only marks the space as availiable.
ssd's only have a limited writes to each cell therefore completly wipe the space after every time you delete something would drasticly lower its lifespan
>>
>>702533424
if the computer is on, you're still fucked even if the disk is encrypted. The key is stored on your RAM, if there's power to it, that key is still accessible.... I mean of course there's stipulations like how long since you've last signed in, etc.
>>
>>702533964
muh surveilance
muh fbi jumping through the window


im just saying, that you are talking shit.
fulldisk encryption + panic button.
>>
>>702532049
im with anomalous

the correct answer is to use a very strong magnet, it will depolarize the flash memory and scramble the bits
>>
File: haveaseat.gif (2 MB, 395x350) Image search: [Google]
haveaseat.gif
2 MB, 395x350
>>702532997
>encrypt your drive, police can't do shit :`)

if you're in the u.s., it isn't a settled point of law that you have a right to encrypted data, or to refuse to release the encryption key to law enforcement. even if the key will allow access to data that will potentially incriminate you.

http://gizmodo.com/5882811/defendant-ordered-to-decrypt-hard-drive-says-she-forgot-her-password
was thinking of another case but found this one:
http://arstechnica.com/tech-policy/2016/05/feds-say-suspect-should-rot-in-prison-for-refusing-to-decrypt-drives/
>>
>>702534063
true, thats why you should never leave your pc running when you are not using it.
do not use standby (to ram), use hibernate (to ssd / hdd).

if you guys are interested, feel free to ask me, i work as a it security analyst.

>>702534196
well its easy, tell them you encrypted the whole disk to erase the data and that you didn't write down the passphrase. toppest kek.
>>
They sell Self-Destructing SSDs. They have SMS, so you text it your passcode and it literally blows up.
>>
>>702534063

alright, so i dismount the HDD whenever i go away, thanks
>>
theres a program you can use called eraser, it basically writes over the code in random patterns making it 100% unaccessable. look it up.
>>
I'd destroy it, only way to be sure that it can't be recovered
>>
>>702532613
What show?
>>
File: 1441566067407.jpg (94 KB, 639x633) Image search: [Google]
1441566067407.jpg
94 KB, 639x633
>>702534370
The NIST said SMS isn't secure anymore.
Also SMS spoofing still works in certain countries. Id never use such a fucking shit device. Imagine how many backdoors it has.
>>
File: a4Lw68Z_460s.jpg (65 KB, 460x613) Image search: [Google]
a4Lw68Z_460s.jpg
65 KB, 460x613
>>702532049
OP, so long as it's not CP, why don't you go ahead and post a pic of what you're trying to conceal from the Government? We might be able to tell you if it's even necessary to delete it at all.

If you fail to oblige, I, along with the rest of /b/, will naturally assume you're hoarding CP. In addition, the FBI will naturally make that assumption as well. So, in all seriousness, it'd be in your best interest to post pics.
>>
>>702532809
you must be 14
>>
>>702534302

Cool, do you think any IT Forensik would get it if i use a Decoy OS? and behind that there is the encrypted real OS?
>>
>>702534379
>>702534370
>>702533424
securedrives(dut)co(dut)uk
>>
>>702534679
Really depends on where you live.
I know that Police here in Switzerland don't know their shit. Probably the same case in most countries.
Really depends on what you have done, they most likely don't care that much about you, unless its about big things like economy etc.
>>
>>702534302
but you shouldn't have to claim ignorance.

i should not be able to be compelled to use information in my head to aid in my prosecution.
the right to keep secrets is the true right to privacy
>>
>>702532842
>But wont it hurt the SSD because it has a special life time?

you don't need to do multiple passes to securely erase an SSD. The cells have to be cleared by the hardware before new data is written to them. This is what the trim command does. The only problem is erasing the reserve area too.
>>
>>702534917

Alright, i live in a country where you speak the same language as in switzerland ;)

I guess they dont even care that much then about my content i have stored.
>>
>>702534533
I have no idea if they're secure or not, but something to look into, with that idea in mind, you could probably figure out a way to strap an M80 to the board of your SSD and rig some sort of remote detonation via arduino. Couldn't hurt to add this on top of all your other security as a last resort.
>>
>>702534173
Where are they for sale ?
I don't really need them since i'm clean and have nothing to destroy
I'm just curious about your ways
>>
>>702535107
Most likely they don't. Alles gute Brudi :^)

>>702535249
I once though about using a relay hooked to the power socket and the other side to the ssd / mainboard. One switch and the whole fucking PC gets roasted.
>>
Just use a shredder and it should be fine.
And for future reference if you gonna do illegal stuff on your computer use a "virtual machine" that is stored on a usb/drive outside of your main OS
>>
most SSD has a secure erase built into the firmware. because of the way flash memory works, its a lot harder to recover data from them as opposed to magnetic platters.
>>
ATA Secure Erase command. voltage spikes the entire cell bank, resets every bit to zero. unrecoverable data.
(voltage spike sounds scary, but the drive will still work afterwards)
>>
>>702532566

Trolled.
>>
Reformat then fill the drive with nonsense to cover the old files then reformat again
>>
>>702532049
Burn it.
>>
>>702532049
Either:

a) submerge in water
b) smash the fuck out of, separate and discard
c) ????
d) use as cumrag
>>
>>702532049
Power drill, blender, microwave
>>
>>702532049
not sure how much they can recover from secure-erased drive, but if you think this is not enough, there were those military-grade ssds that LITERALLY burned the chips onboard as a last measure.
>>
>>702532662
Made me lol
>>
>>702532049

use what hillary uses, bleachbit
>>
>>702532132
You're retarded.
>>702532476
Magnets don't do shit.
>>702532506
Still retarded.
>>702532613
Drill works, but you need to drill every single memory chip on an SSD.
>>702532611
This guy gets it.
>>702532930
Of course DBAN works on SSDs.
>>702533399
Ever tried to restore data from a drive with holes in it? No? Well, guess what, it's practically impossible.
>>702537201
Water and cumrag will still be very much recoverable by any decent recovery lab for about $1000.

>>702532049
You have to actual options:
1. Overwrite multiple times
2. Smash the platters/memory chips into small pieces. Shredders are fine for this.

Those are the two ways of properly deleting files. First will leave you with a working drive afterwards, second will not. First also takes way longer.
>>
>>702532049
I'd do the following:
Create files of the same size, then overwrite them.
Do this a couple of times, then take a program designed to fill overwrite entire hard drives with garbage / 0's, 1's, etc, and have it write random data a few times.

SSD's (which is what you're asking about) differ from HDD's (Hard Disk Drives) in that an SSD'S is simply RAM (Not really, but for this example) that EMULATES a HDD. HDD's are 1 or more hard platters covered with a type of iron particles that can record magnetic signals being broadcast by the read/write heads.

But I'm paranoid. Just filling the drive up with tons of data might do it.

Digital Forensics take advantage of the fact that the motors, armatures, and read/write heads are all physicle, and so do not always get placed 100% in the same place when writing new data over old data. Think of a snow covered road: All the cars may be driving in the same lanes, but their tire tracks are not perfectly on top of each other. Because a HDD uses physicle devices to record the information, there is 'slop', in the exact placement of the heads. Forensic programs read the same spot over and over and over in order to gather the bits of data that never got exactly overwritten. AKA 'slop'.

Another thing that Digital Forensics does is take advantage of the fact that every time an object is magnetized, that magnetic "image" is never fully overwritten. Think of an old audio cassette tape that you recorded over, but you can still faintly hear the old recording in some spots.

SSD drives do not have the "slop" problem because the recording media is RAM, not a magnetic tape or disk. So there are no bits of data that didn't get overwritten.

Magnetic "memory" may be a whole other matter though, meaning that a memory location that was overwritten MAY retain traces of the signals that recorded previously. I don't know, but it's not impossible.

(Continued in my reply to this message.)
>>
dd-ing dev/zero over the whole device makes it too hard to be worth recovery. hdparm can also take control of the drive at a lower level but I wouldn't use it if you don't want to risk breaking the drive.
>>
>>702532213
/thread
>>
File: 1472799141191.jpg (12 KB, 270x408) Image search: [Google]
1472799141191.jpg
12 KB, 270x408
>>702532049
I know how to, but I can't leak the secret here. Too many pedos. Send me an email at [email protected]

So I know it's you, include your full name, address, and SSN.
>>
>>702538285
Okay, so smash the fuck out of it then, genius. You're a faggot know-it-all. Are you even an expert on this shit or do you just enjoy sucking your own cock?
>>
>>702538369

(Continued from above)

Lastly, these data destroying programs should NOT be left running on SSD drives for days, or even hours, like they are on HDD's! That is because as a piece of computer memory, it has a definite number of times that it can be changed before it breaks. So every time you change the contents of a memory location, that's one less time you can change that memory location. Whereas, since the recording medium of a HDD is a surface covered with magnetic particals, and there is no known limit to the number of times a particle can be magnetized, the moving hardware (bearings, motors, armatures, RW heads, etc) will break before the media wears out. That's why you can send your HDD's in for data recovery after they crash. (BIG $$$, plus no guarantees).

Anyway, that's what I know.
>>
>write zeros to the drive

The problem with many SSD's is that they have slack space beyond the advertised capacity of the drive. This is done so that when a sector goes bad, the drive can redirect data to some of the slack space resulting in no loss of storage.

The faulty sector while not being accessible to the system, is still accessible via forensic means.

Drives may also be programmed to go into slack space just for efficiency sake.
The only REAL assurance you have to data security is to physically destroy the drive and make any forensic attempt impossible mechanically and electrically. This means crushing, shattering, and melting.
>>
>>702538369
While there can theoretically be traces of previous magnetic data on an overwritten disk there has never been a successful restore of as much as a single byte from a completely overwritten disk. For all practical purposes this is a possibility that can be ignored, and a few complete overwrites can be considered 99.999% safe.

>>702538825
Good point, overwriting an SSD 100 times will create significant wear. 2-3 times should be good.
>>
ITT overthinking fagets.
nand based drives are much easier to erase than magnetic platters.
download any linux live cd that has gparted.
boot from live cd (or install it to a usb drive) and boot from it)

run gparted. run the secure ATA erase option on the drive.
congratulations, your drive is now in astate of full erasure and data is unrecoverable.
Bonus: your drive is not bricked and it didn't take 17 hours
>>
>>702539101
also, secure ATA voltage spikes ALL available nand, even the hidden garbage collection stuff your OS can't access.
>>
What about flash drives & smart phones?
>>
>>702532049
Wheb you delete a file you don't actually erase the info, you just mark it as available space for overwriting.

Delete the files then fill the drive with shit.

Repeat several times if you want to be completly safe.
>>
>>702532049
blender
>>
>>702532049
Often misused to satisfy a lamen's ego, the self-proclaimed 1337 will misuse the title, pretending to hold Xtr3m H4x0r capabilties while in fact masturbating to preteen beastiality at 2:00 AM with baggy eyes; anonymously hassling n00b's with better things to do than kill their babies over mindrot such as Everquest and Warcraft. See also "colon debris" and "queefstain"
>"i t0tally pnwed u. u r so a n00b and i am so 1337"
>>
>>702539101
libparted can't take full control of the device, I've had a few devices I could recover data from after this.
>>
>>702539101
Different drives implement ATA erase differently, some are suspected to be partially recoverable.
>>
>>702539383
Same shit goes there, smash or overwrite.
>>
>>702539383
Same principle.
>>
>>702534302
I usually hit the power button before going to bed but it just goes into hibernate, obviously after about a week if that my pc goes slow as shit. Is there a way to shut down my pc with still being able to have all processes open once I turn it back on? I know I'm practically explaining sleep mode but still, tl;Dr is there a way to shut my pc down to stop ling term slowness but to have everything as I left it when I get back on? Also about a year ago I reset my bios memory on my mobo and since then fly power button flashes whenever it's shut down or hibernating, is there a way to stop that? It didn't do it before I reset the memory
>>
>>702539737
>>702539744
Wonder what cell phone providers record as far as what has been downloaded, and sites visited.
>>
>>702535981
this would be good advice for running Windows in general. Virtualization has gotten so good that there's simply no reason to run Windows on bare metal. Using Windows period is considered harmful, but if you gotta use it, at least minimize the damage it's doing.

kek can you fucking believe that windows routinely uses swap space (so-called virtual memory cuz they too good to use the proper name for it) long before you run out of RAM? Can you believe it doesn't even offer a decent FS period, let alone a choice of which one(s) to use? It's like MS only hires hardcore drug addicts and poo in the loos to develop Windows or something.
>>
>>702539843
Im starting to think updating cell phones is a gr8 way to send data back on what you have been doing. As opposed to software patches.
>paranoid
>>
>>702539978
Depends on country and carrier. Most log connections (what IP you visit), but AFAIK few log file DLs and such. That would be kinda hard.
>>
>>702539697
pretty sure all drive made in the last 2 years implemement it correctly after the 2011 study shitstorm
>>
>>702540164
I'm not paranoid about anything I simply want to A. fix my damn power button flashing and B. be able to deal with the speed decay of processes after not restarting my pc for a duration of time.
>>
I sent my info like you asked, but it bounced. Are you sure about that address?

Also, should I include a photo ID?
>>
>>702533109
I run a few darkweb websites and I'm just slightly worried about the possibility of my arrest.
>>
>>702540648
I was just making a comment. Relax
>>
File: 64652126.jpg (104 KB, 500x377) Image search: [Google]
64652126.jpg
104 KB, 500x377
>>702538682
Son, you just fucked up big time. Did you not read the rules back at the beginning of the summer? Asking for dox info is against them. You would have known had you lurked moar and used that time to read over them.
>>
>>702540392
Doubt it. Manufacturers are lazy fuckers. SanDisk, as an example, state on their website that secure erase only deletes the mapping table and not the actual data.
>>
>>702539843
>using hibernate ever

What the fuck is wrong with you?
>>
>>702540826
Well any idea on how to fix either of them? the first (power button flashing) is more of an issue than the other as it's next to me when I sleep and is seriously distracting. Gone to the point where I bluetacced a gift card infront of it to stop it.
>>
>>702540757
next time deniably encrypt your whole drive with boot loader on flash drive.
>>
File: wtf b.png (10 KB, 804x698) Image search: [Google]
wtf b.png
10 KB, 804x698
>>702532110
>answered in first reply
>thread still gets 100+ replies
>>
>>702541193
Disable hibernate and change the power button setting to power off your pc.
>>
You talk like the slack space is some kind of cache, but if it's only ever brought online when parts of the memory go bad, like you say, then if it's used, it will be accessible through normal data access routines. And if it's not in use, then there shouldn't be any data stored in it to overwrite.
>>
DBAN 10 times
>>
>>702540841
It's okay because no one gives a fuck. You can send a formal complaint to 4chan by sending an email woth your name, address, and SSN to [email protected]
>>
>>702541536
Won't that cause it to also shut down all processes?
>>
>>702541556
Stupid question. But when you delete everything on a flash drive. How is data recoverable?
>Mind boggling
>>
>>702541193
If it's a desktop you can disconnect one of the power cables running from motherboard to the power button. Don't disconnect the wrong cables otherwise you wont be able to turn it on using the power button.
>>
Why the fuck wouldn't you just throw away or burn the drive?
>>
>>702532049
>microwave
> magnet
>hammer
>fire
>belt sander
whatever order you want.
>>
>>702538995
Yeah, I just heard it being talked about several years back and figured that it might be viable by now, so I mentioned it. Like I said I don't really know anything about it, except that old audio cassettes hint to me that it's possible.
>>
>>702541922
When computers delete files they don't actually remove them, they just delete it from a list of files on the disk and mark the space as "free" so that new files can be saved over the old ones.
If no new files are saved in the same space it will be possible to recover the deleted file using software that searches for data instead of reading the "file list".
>>
>>702542064
What about a glue that infuses with the parts and makes it impossible to remove.
>apoxy?
>>
>>702541877
Yes, alternatively you can leave your sleep settings and just unplug the led from the board if it is a desktop.
>>
>>702540003
I belive you forgott to mention the general intrusion of privicy as well.
Cortana ... for example.
Anyway the biggest reason for still using MS is its compatability for gaming
>>
>>702539843
No.
>>
>>702532567
>hard to recover

Personally I don't believe that "we can use an electron microscope " shit....over write it 7 times which is military grade....done
>>
File: 20160813_192156.jpg (3 MB, 4032x2268) Image search: [Google]
20160813_192156.jpg
3 MB, 4032x2268
>>702532662
I actually own a multipass
>>
>>702542360
*Epoxy, and no, it won't stop three letter agencies.
>>
>>702532601
Then why do we need TRIM commands? I don't think you are correct
>>
>>702542368
>>702541939
Yeah it's a desktop, should be easily spotted although seeings it didn't come that way would there not be a solution for fixing it rather than disabling my LED lights?
>>
on linux live
dd if=/dev/random of=/dev/sda bs=4096 count=4096

normal 3 passes , if you have time 7
>>
File: 1440377179439.jpg (118 KB, 1600x900) Image search: [Google]
1440377179439.jpg
118 KB, 1600x900
>>702538689

>person wastes his time explaining something for a retard

>retard starts typing random insults that dont really connect in anyway

good job
>>
>>702542706
Usually hibernate will turn off the light, sleep will blink the light. Are you sure it is hibernating?
>>
>>702542778
>time
You hear the doors slam and look out the windows. You have 30 seconds to permently disable this shit.
Thats reality. They arnt coming announced
>>
>>702542706
Stuff like that is usually coded into firmware, making it a true pain in the butt to change. Pulling the wire is far easier, and if you really want it to light up during regular operation you can probably hook it up somewhere else on the mobo with a bit of creativity and some resistors.
>>
>>702538285
this and only this.
>>
>>702543019
Also check the bios to make sure it has s3 power state.
>>
>>702543130
ah yeah it's set to sleep also not sure whether my bios has s3 power state but I can check it the next time I restart my pc,pretty sure I don't though.
>>
>>702543052
in that case . Drill every centimiter .
>>
>>702543819
Set it to hibernate, although depending on what applications you have open your experience may vary. Some programs do not like hibernate and can lock the pc on resume. If you can put the pc into hibernate and everything shuts down; fans, hard drive, lights, etc, then your motherboard supports s3.
>>
>>702543052
If you're afraid of raids get a bolt gun and keep the drives outside the case.
>>
>>702532049
Use what Hillary Clinton used.

https://www.bleachbit.org/features
>>
>>702544258
This just sounds fun. Next drive failure this will happen.
>>
>>702532049
Burn the chips.Microwave them
>>
>>702544548
I prefer my chips deep fried, baked is ok. Never microwaved, they get soggy.
>>
>>702544548
This isn't Mr.Robot silly.
>>
>>702532049
lrn2dban
>>
>>702532457
Dban discs in my house for life. A backup has a backup for its backup's backup motherfuckers.
>>
>>702533424
Just encrypt the OS with bitlocker, you can do that without reinstalling in most cases. Assuming you have a proper Windows-install, none of that home BS
>>
>>702532049
Eraser and Gutmann 37x
>>
0ing
If you dont know what that is kys
>>
>>702544966
they can just call microsoft for your password
>>
Format drive, then run defraggler. It will zero do all empty space. Do this 5-8 times.
>>
>>702545269
That's not how backdoors work.
>>
>>702545577
yeah my bad its actually microsoft who calls to give em the password
>>
>>702538285
Geez what's with you fags not understanding the basics of SSDs?

You cannot guarantee a 100% erasure of an SSD by just overwriting data.

When you delete data from an SSD, the data is'nt actually deleted - its basically just set to "0" so its hidden, but the data can still be recovered if you're not a tard. SSDs are designed to move data around (wear and tear algorithm) to ensure an evenly distributed wear on the chips. That means, you start erasing data, SSD starts moving data to erased part, because hey, a ton of space just opened up for it to move data to. So you can be unlucky and some of those naughty pics wont disappear.

You need a firmware based erasure to properly get rid of data on a SSD. That said, data from burned chips cannot be recovered. So microwave will work if you ensure it takes out every chip.
>>
I wasn't talking about flash memory in general, I was talking about SSD memory specifically.

Additionally, I was replying to a comment that there is "slack", or hidden, memory on SSD drives, and that you need to overwrite that, normally inaccessible, memory also.

I aside from any hidden or normally inaccessible memory locations, a secure delete of Flash Drives, like the SD and MicroSD drives, probably only requires that you simply overwrite every bit of space on them 1 (one) time.

More than that is probably overkill, but doing it a few more times shouldn't hurt anything.
>>
>>702534173
Make an electromagnet, they can be made pretty strong
>>
>>702545943
has nobody here heard of ATA secure erase?
also if you had encrypted the disk you wouldn't need to delete anything.
>>
>>702544258
Enjoy going to prison for evidence tampering and/or obstruction of justice too. Depending on what you've done, it might be better to just accept the consequences.
>>
>>702532710
I've thought about this... But how about allocation units, meaning files that don't take up an entire block or whatever, that remainder doesn't actually get written over with this method correct?
>>
Magnets!
>>
>>702532049
You have to execute the secure erase ATA command... but this will delete the entire drive.

You can't just do one file.
>>
>>702532049
Do a proper wipe twice, in DD dev zero for example. Im a it-forensic
>>
>>702545943
Please read your own post again, your logic makes no sense. Deleting anything is retarded, but everybody here are talking complete overwrites. On a complete overwrite it doesn't matter where anything is stored because EVERYTHING is overwritten. That's the fucking point of overwriting. Please go read man dd.

ATA secure erase is flawed on many drives and can generally not be trusted as a 100% secure method, as the implementation varies from manufacturer to manufacturer. Some simply delete the tables, some perform a simple overwrite (that you claim doesn't work). Good luck making sure the microwave takes out every chip before it catches fire by the way. Metal makes nice hot plasma in microwaves.

>>702546572
We're talking completely hypothetically how to destroy drives here. Besides, if you have videos of yourself molesting kids it's probably better to destroy the evidence.

>>702547062
Doesn't work. At all. Try googling "what is ssd".

>>702546443
Encryption works. ATA secure erase is flawed on many drives, test your drive before you trust it.

>>702546378
Doesn't work. At all. Try googling "what is ssd".
>>
>>702532049
Delete system 32
>>
File: 54303894850.jpg (8 KB, 349x237) Image search: [Google]
54303894850.jpg
8 KB, 349x237
>>702532566
>legally i'm sure there has been a case whereby a judge ruled that because the file was deleted they weren't admissible in court even though they were recovered.
>>
sudo fstrim -v /
>>
Wiping is all about massive writing to the drive, that's not a good idea with flash memory. Besides, SSDs store files in an entirely different way than magnetic media, and wiping just won't work.

Fortunately, most SSDs have the ability to do a drive-wide secure erase. Go to the drive manufacturer's website for specific instructions. You'll probably have to download a program specific to that company. You can also just search on the manufacturer's name and this phrase: ssd secure erase utility.
>>
>>702547287
You're right, but you're also fucking illiterate and I highly doubt you work in forensics (protip: data recovery is not forensics)
>>
File: 1472090708417-b.jpg (37 KB, 500x457) Image search: [Google]
1472090708417-b.jpg
37 KB, 500x457
>>702532049
Nerve gas
Thread replies: 180
Thread images: 21


Navigation: /b/ - Random [Archive] | Search | [Home]
Navigation: /b/ - Random [Archive] | Search | [Home]


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site. This means that RandomArchive shows their content, archived. If you need information for a Poster - contact them.