Navigation: /b/ - Random [Archive] | Search | [Home]
RandomArchive logo

Hey /b/ What would be the quickest and not suspicious way to

The stories and information posted here are artistic works of fiction and falsehood.
Only a fool would take anything posted here as fact.

Thread replies: 213
Thread images: 12
File: WDC-Caviar-Blue.jpg (172 KB, 600x526) Image search: [Google]
WDC-Caviar-Blue.jpg
172 KB, 600x526
Hey /b/

What would be the quickest and not suspicious way to completely erase an HDD from it's contents?

Like, for example, if the police was knocking at my door.
>>
>>707225071

Strong magnet
>>
yup big speaker magnet lay it right on top of it
>>
>>707225071
I work at the largest data recovery company in the world.
The securest and quickest way is to degauss it, but since you dont own one your safest option is to drill a hole through the disk or smash it many times with a sledgehammer.

Water or fire does not work.
Neither does formatting
>>
File: flat,800x800,075,f.u1[1].jpg (77 KB, 800x682) Image search: [Google]
flat,800x800,075,f.u1[1].jpg
77 KB, 800x682
take it and shove it waaaaaaaay up your ass
>>
Make the HDD disappear.

Hillary said it was best to use a hammer
>>
>>707225373
Doesnt work, its too weak. You need an electromagnet that has the power to rip a ring from your finger
>>
>>707225440
What about bulk VHS erasers? The old ones? Magnets are not viable?
>>
>>707225440
Just let one dust particle in and it ruins the disk, because the atari megadrive 20 is at the bleeding edge of technology and contains no user servicable parts inside.
>>
>>707225440
Yeah i know these things don't work

Drill a hole? I love how i wrote "not suspicious"
>>
microwave owen
>>
>>707225071
1's write
0's write
random write.

DoD regulations say do this 8 times.
>>
>>707225665
These are like $20 online. Remove the drive and so forth. Wouldn't it be effective?
>>
>>707225675
Yeah, but the method is to be quick. Dont have time to open a disk and then run it for hours to make it crash so bad so you cant recover it.
>>
>>707225071
You need to write random shit to the entire drive, so it depends on the Drive, speed that the drive can write it's entire surface. You could Ghost a plausible copy of some bullshit hard drive and then just copy the image to the drive you want to erase. I would write zeros first then check to see that the entire drive was in fact zeros then put random shit back on.
>>
>>707225783
Also, if police are already knocking at your door it is far too late.
>>
http://www.noah.org/wiki/Dd_-_Destroyer_of_Disks
>>
>>707225071

>microwave set to defrost
>>
>>707225071
idk ask hillary
>>
>>707225071
If I knew I had some dodgy stuff on my HDD I would just DBAN it
>>
>>707225734
If it has to be quick and non suspicious it is best to hide it or to buy a degausser.
Overwriting is also a very safe option but it takes hours, unless you use an SSD
>>
Honestly, I always wanted to do a proof of concept security system that does this.

Build a home made thermite device, hook it in to a home security system, run the audio alarm cable to an electrical ignition source, use a road flair inside the thermite. Battery backup incase they cut the power.

Someone kicks in a door, and thermite drops through your computer hard drives, memory, etc

Air not getting shit off those drives.
>>
>>707225440
Thermite works
>>
>>707225071
Overwrite with trash a couple of times and you're perfectly safe, unless you're some sort of international spy, nobody is going to go through any effort to recover your shameful porn.
>>
>>707225071
Reformat the drive just because they could technically maybe recover some lost data doesnt mean they would waste the money and time doing that. worry more about your isp.
>>
>>707225071
Overwrite it before doing anything else. Just bombard it with random sector writes before doing anything else to it.

Step two could be bitlocker/truecrypt or some shit like that. Hope you've got that already. Giving up the key would be aiding your own conviction and cannot be forced or held against you under us law.

You could maybe diy an overvolting protocol in case of the need for quick erasing. Think of running a mains line trough a literal killswitch into the 12v and 5v molex input pins.
>>
>>707225842
Takes hours
>>
>>707226073
$250 at the low end. Might be worth it if this were your problem.
>>
>>707226205
Police has high skills on data recovery. Retrieving data from a formatted drives takes minutes
>>
Wipe it with a cloth
>>
get an "electric lifting magnet"

15$ on ebay
>>
>>707225071
If you encrypt the drive and have a wife, you know 50% of the password and your wife knows 50% of the password, she can't be compelled to divulge the password.

5th amendment says they can't force you to reveal the password.
>>
>>707226371
Does that work on SSD's?
>>
>>707226221
Best answer. Just use bitlocker or truecrypt. It has never been cracked.
>>
Just fucking blend it a blender you tards
>>
File: cloth.png (662 KB, 826x950) Image search: [Google]
cloth.png
662 KB, 826x950
>>707225071
I don't know OP. Maybe call Hillary Clinton?
>>
>>707226442
No
>>
>>707226462
Is love to see that.
>>
>>707225071
Pound it with a jackhammer for 30 minutes, then drop it in Lake Michigan
>>
>>707226092
Magnets and damaging the thing isn't guaranteed to wipe all the data. I have changed the disks inside to recover data, if you were up for some major crime they could recover shit from fragments.
I would go for writing random shit to the entire surface of the drive, it might take 20 minutes so I would make a script that looked where the stuff I really didn't want found was, write random shit to the sectors where that is stored first then do the rest of the drive, have a preplanned importance of deletion, then when the police arrive you just have to bullshit them for 20 minutes while it is deleting everything.
>>
>>707225071
CLEARLY, the best way is to post any suspicious content here.
>>
>>707226456
thank you, never been named best answer before. But the one problem with encryption is: intercept now, decrypt later. There are some premium ssd's available that can blow themselves up on command btw. they kinda short out or something like that and crack open the chips. Completely wiped.
>>
>>707225071
VeraCrypt or DiskCryptor if windows.
>>
1) Software destruction. Write 0s and 1s at least 5 times.

2) Physical destruction. As suggested, thermite works obviously.
>>
put it in your recycle bin, then empty that shit
>>
>>707226778
In the army we used thermite to destroy crypto devices in the event the soviets were kicking down our doors.

You just need enough thermite to do the job.
>>
Drill many holes into it, pee on it, set it on fire and bury it.
>>
>>707226442
umm, im not sure, but probably not
it works on hdds thats for sure

just download your cp on a hdd friendo
>>
Try to build a system which frys the PBS of the HDD, so the Chips are destroyed. It is still recoverable, but will take much longer and will cost even more to get some data
>>
File: burning-hard-drive.jpg (136 KB, 550x365) Image search: [Google]
burning-hard-drive.jpg
136 KB, 550x365
>>707225071
DBAN takes hours, but is still pretty much the best way to trash unencrypted data quickly, DoD 3-pass minimum

legit FDE with a very strong key is the only good method. Everyone should be using this on all systems, esp for laptops given theft rates

GNU/Linux w/ LUKS/dmcrypt FDE would be the highest recommendation for running a secured persistent desktop.

if you're still 10 years old and running windows, TrueCrypt is still the best option there

bitlocker is backdoored, so are all windows versions for that matter

you should just consider yourself already fucked if you run windows and save yourself the time.

>>707225212
>>707225373
lolno
>>
>>707226442
You could write random shot to the entire SSD drive quicker than to find your jack hammer, thermite, super conducting magnet etc
>>
Sulphuric acid.
>>
>>707226456
>>707226817
https://www.youtube.com/watch?v=GLxaVFBXbCk

These are the self destruct drives btw, one button press and chips are physically cracked.
>>
toothpaste and microfiber cloth. rub clockwise in small circles
>>
>>707227005

>You just need enough thermite to do the job.
Which is not really that much. And considering that Thermite is fukken cheap atm, it's actually a viable option.
>>
>>707226456
bitlocker is backdoored fuckwit
>>
>>707226778
A degausser has a strong enough magnet and is used by the US government to erase disks. I can guarantee that no byte of data is recovered from them.
>>
>>707225071

NOT SUSPICIOUS

> Make partition for your secret data
> install program that uses statistically random encryption
> have key nowhere else but in your head, and while in decrypted mode, in your RAM
> make absolutely sure there will be no persistent file buffers anywhere in the system
> make sure the in-memory key will never be swapped out, and is on a known address

Police knocking? overwrite key in memory with zeroes, reboot PC. no evidence other than a corrupted partition on your HDD. Make sure the encryption software is well hidden or small enough to quickly erase along with the emergency key erasing procedure.
>>
>>707225071

Just throw it in a microwave for a like 10 seconds. Fries the shit out of it.

>Inb4 ppl sperg in out over metal in the microwave

It'll be fine for ten seconds. A lot of microwaves even have steel racks inside of them.
>>
>>707225071
It doesn't matter how suspicious it is; no evidence, no conviction.
>>
Open it up, shatter the platter, then burn it
>>
File: MTE5NDg0MDU1MjUwMTc1NTAz.jpg (16 KB, 300x300) Image search: [Google]
MTE5NDg0MDU1MjUwMTc1NTAz.jpg
16 KB, 300x300
>>707225758
Not cool.
>>
>>707227092
Encrypting is like burying the victim, there is always a chance they could be found. If I had the time I would write zeros to the entire surface then check the surface for non zeros, trust no one or no program.
>>
drive to the grand canyon and chuck that shit.
>>
>>707225071
Smash it and flush down the toilet. Tell them you were taking a shit.
>>
>>707225071
slag it, full "deletion" takes hours.
>>
>>707225071
Doesn't matter about suspicious if there's nothing on it.

Thermite is the fastest way, but you could smash the fuck out of the platters with a big hammer and make sure it's shattered completely and then dump the bits into the toilet and flush.
>>
Have a secondary hard drive where you do your illegal shit on. When shit hits the fan, simply hide the fucking thing by lowering it in a container filled with highly acidic things (the ones that even corrode metals). This will give t at least a couple of hours before anyone finds it and is much less noticable then scorching thermite.

Bonus points if you throw in a lot of other "fake" harddrives and scrap parts.
>>
>>707227524
ok to make things clear
even if you zero everything and you think you are clean
there is still some information of the last saved value in the zeros.
that is the reason why real whiping includes multiple overwriting including random data
>>
>>707225071
Neodymium magnets on the end of a drill bit.
>>
>>707227883
>dat james bond disposal technique
The fuck is wrong with some of the people in this thread? Just put a hammer to the fucking thing. The discs within hard drives are brittle as fuck.
>>
>>707226442
no, NAND are not particularly sensitive to EM fields.

SSDs have write wearing algorithms which prevent the same bit from being overwritten excessively, which would decrease lifespan. B ecause of this, erase/overwrite methods should be considered unreliable.

Best thing to do is encrypt the entire drive prior to use. If you weren't clever enough to do that in the first place, just smash the thing up with a hammer or put it in a blender or something
>>
>>707228102
you think a nerd could smack a hammer hard enough?
>>
>>707227199
best answer here
>>
>>707228244
just sit on it
>>
>>707228102
Fucking perfect way. Honestly if you smash the thing it will be hard as hell to recover the contents without huge amounts of money and time. and unless you are a very high profile criminal they wont do it.
>>
>>707228244
Have you never pulled out and fucked about with an old hard drive? Shit, drop it on the floor from shoulder height and you'll be lucky if it isn't fucked.
>>
File: 1383463810431.jpg (90 KB, 720x960) Image search: [Google]
1383463810431.jpg
90 KB, 720x960
>>707225071
if you live in a high building you can just toss em out of the window.
the disks will shatter inside the case and not a bit of the data will be recoverable. have your harddrives close to a window if you expect police raids.

tested with 60m fall onto solid concrete with severall drives, always worked so far.
>>
>>707227005
Non suspicious:
>Look officer, my pc just burst into flames. What a pitiful accident. Would you like a tea and cookies?
>>
File: g dreams.png (1 MB, 1348x5805) Image search: [Google]
g dreams.png
1 MB, 1348x5805
>>707225071
>>
>>707228268
No? a fucking human hair can destroy an HDD. thats like using a shotgun to kill a fucking fly. sooo much cancer in this thread.
>>
>>707228647

Can't convict based on suspicion though.
>>
>>707225071
There is no fast way except thermite. DBAN is the only quick way.

Also, police don't knock when they want to seize this kind of evidence. In fact, they often wait for you to open your computer then break and enter to assure you don't have the time to do anything.
>>
>>707228700
but most balding 4chin users don't have a hair to spare. check yoself foo
>>
>>707225071
Store all your porn on polaroid
>>
Some fun about destroying data on HDDs:
https://www.youtube.com/watch?v=-bpX8YvNg6Y
>>
>>707227989
if you are going to do it yourself then you would check the specs out for the drive and it's error correction technology and caching and make sure the drive really is zeroed, fuck using software, the reason they take hours is because they are trying to cover every drive out there.
>>
>>707228851
What about all that hair in their neckbeards?
>>
just kick that drive right in the noots
>>
>>707228833
triple dubs tells the truth
>>
>>707227524
that's a poor analogy.

they already know where to 'dig', the problem is that it would LITERALLY take them thousands to millions of years to do so (provided you use strong encryption)

truth is good encryption means the data is less recoverable than if you physically damaged the drive in nearly every common fashion

if you want to put the drive iin a bonfire afterward, that will help, but your plausible deniability is shot
>>
>>707228976
too toxic to actually be touched by human fingers. you would need a small pair of tongs. too much work
>>
>>707228471
That's literally just paranoia. No technology exists to recover data from a smashed hard drive. The government doesn't have half as much futuristic tech as people assume they do. A physically broken hard drive is gone to the world. Even if they could be put back together, the disk splinters when it breaks and practically explodes in shards. You hit a hard drive with a hammer even the best puzzle master on speed and modafinil couldn't put it back together.
>>
Convert to truecrypt or veracrypt. Create partition with plausible deniability option. If Police knocks, unmount. Done.
>>
>>707225071
throw the drives in a microwave and set it to high power 5 minutes.

the microwave will be destroyed along when the job is complete so you'll need to replace that, but it guarantees destruction.
>>
>>707225071
take out the drive and trow it into your neighbors garden. Legally they can't go in after it.
>>
>>707228733
They probably already have the evidence. It would just be destruction of evidence at that point
>>707227092
Truecrypt is probably backdoored
>>
>>707229126
But, wouldn't said neckbeard hair be highly corrosive to a hard drive platter?
>>
>>707225071
Pot + Water and boil it on max for a good hour or so.
>>
>>707225440
hahaha. that won't do anything idiot
>>
>>707228833
>police don't knock when they want to seize this kind of evidence

Go read some accounts, they do knock. They come during the early hours of the morning to catch you off guard. If you don't answer, they'll use force, but they absolutely do knock first.
>>
get DBAN
>>
>>707229265
Legally, they can protect the neighbors perimeter, get another warrant, and get it. Or, if witnessed, being that part of the investigation of a crime, simply walk over and take it.
>>
am I stupid, or would a bullet through the hard drive completely destroy it? Not talking about cops at the door scenario, but is it possible to get information from the physical fragments of a disk? Whenever I replace an old laptop I take it out and shoot it for fun, not that I have anything to hide, but I figured if somebody pulled it out of the trash they couldnt get any personal info on me, right?
>>
>>707226776
Any reason in particular for Lake Michigan? Lake Huron is nearest to me.
>>
>>707226350
http://www.hostjury.com/blog/view/195/the-great-zero-challenge-remains-unaccepted

>Recovering data from a zeroed hard drive is impossible. Legitimate data recovery firms know this. They will not take the challenge. Neither will a national government agency. Lastly, it is noble and just to dispel myths, falsehoods and untruths.
>>
>>707229510
never heard of a "no knock" warrant? Educate yourself, fool. If there's a reasonable expectation of the destruction of evidence, police will be granted a warrant that does not require knocking. They simply smash their way in.
>>
>>707225071
Just give it to your six-year old kid to play with for a couple of minutes.
>>
>>707229752
>formatting is not the same as overwriting
>>
>>707229184
mostly agree

power off system though, no guarantee that the keys aren't still in ram. Remeber that USB has DMA channels. hbgary and snowden docs show they can dump system ram to a usb device
>>
>>707228928
the reason why it takes hours is because writing a lets say 1TB hdd with lets say 100MB/s ONE time takes fucking 2h
now think about doing this 7 times and we are talking
no chance you can zero a drive faster with it's own writing heads
>>
You encrypt and store it in a safe.
>>
>>707229593
See
>>707229177
Once a hard drive is physically broken, even just snapped into two halves (wouldn't work due to them being so brittle, but hypothetically) the data on it is unrecoverable.
>>
>>707225440

Since avoiding suspicion (presumably for destruction of evidence laws) is the priority I can't recommend putting a hole through it.
Moving it around above a large magnet is probably your best bet for not causing viable damage but there's no guarantee if they get a good data recovery team working on it.

I don't have anything to hide but I keep everything encrypted on a small memory stick running Tails. Worst case scenario and you do need to get rid of it, swallow it or flush it.
>>
>>707229053
You are assuming the encryption works and is not compromised by you or the developer, if there is no data on the drive then there is no chance whatsoever of it being found. I could bury a body in Alaska some place and the probability of it being found could be tiny but as with encryption, there is always a chance. And with a human safe guarding the password then someone could drug you, hook you up to a brain scan and ask you questions about it, so the chance of encrypted data being found is not the advertised probability figures.
>>
>>707229907
Little bit of tnt in the safe with a health monitor trigger, (it goes off when your heart stops)
>>
>>707226456
Truecrypt has also been compromised. Source: Truecrypt's website.
Fuckwit.
>>
Simply encrypt it. There are very simple encryption methods which are easy to brake in but you could enctypt it so you need to type in a password at the bootup of yourpc to decrypt it. When police knocks on your door, give them your pc and when they ask you for the password simply say you forgot it.

Another alternative would be to use 2 hdd, one that is unencrypted and has a os + sone bullshit like steam and games on it. Keep all semsible data on the encrypted hdd.

"Ive forgot the password for my second hdd a while ago, but since the os is on the first one i didnt care to format it."
>>
doesn't have to be non-suspicious...
if they have no evidence then they can't do anything about it.

magnets probably won't do it. you'll need to open up the hard drive and scratch the surface of the disk fully.
>>
>>707229752
correct, but it takes hours to days to do so even to minimum standards depending on the drive
>>
>>707229771
I'm not saying they can't, but after having read literally two or three hundred stories over the years, I can say that they almost always do.
>>
>>707230240
I dunno if it was 100 percent confirmed but if you're paranoid enough to encrypt stuff you you're not gonna touch it
>>
>>707226352

This.
>>
>>707230223
Dobwhat the swiping devices do. Shorting the drive. Open the drive and do connections.


Also use solid states or rent space
>>
>>707229856
A full format in any windows after vista will write over the entire drive..
>>
>>707225574
honestly, not a bad move in this case

as long as you shatter the discs, you should be in the clear
>>
>>707230240
Its not compromised. The algorythms used in truecrypt are only crackable by quantum computing.

The software company maybe stopped developing software and their underlying protocols might be vulnerable - the raw data is safe.
>>
>>707225440
Partial data reconstruction can still be accomplished from damaged HDD platters using special machines. Where I work we had to send a dead drive in and they got all the data off. Cost $700.
>>
>>707226405

You can't be forced to give the password either since it would be incriminating yourself. No need to get your wife involved. Also you've got the right to remain silent.
>>
Put everything on a flash drive (assuming your totally-not-illegal-stuff will fit) and just blend the fucking thing if the cops come knocking.
Hell, throw it in an air vent. Cops are lazy and unless you are a murder suspect they aren't going to tear your house apart.
>>
>>707225071
Microwave it
>>
>>707230513
Backdoor skeleton keys, fool. They're not a secure solution.
>>
>>707230069
I'm not assuming anything of the sort. I stated that Bitlocker is backdoored and modern Windows systems have backdoors which can (at least theoretically) read keys out of memory.

I suggested dmcrypt because its open source. learn c and review the code and compile it yourself if you want to be sure
>>
>>707225071
Use a virtual machine for whatever you are trying to be sneaky with. Delete it (and the virtual drive) when they show up. You could even have a script prepared that all you have to do is double click. Just a thought.
>>
>>707225071
forget about it OP
NS A has allready infected your computers and copied all your shit on they're servers
>>
>>707225071

IN THE MICROWAVE YOU GO
>>
Disassemble the disk carefully, and get the platers out, "rub" every plater with neodymium magnet, assemble back together.
Done
>>
>>707227224

Depending on the country that might be covered under destruction of evidence laws.
>>
>>707230839
You can recover that as you can recover any other file that has been deleted but not overwritten.
>>
>>707230069
All the good encryption algorithms are open source and with a little bit of practice you can implement them yourself.

Also you don't understand probability regarding this apparently.

And if you yourself don't know the password then no one can extract it from you. Just google for passwordless or keyless encryption.
>>
>>707225566
but what if the airport implemented new scanners that detect things inside your butt
>>
>>707230839
That virtual machine data could be recovered, but only if they thought to look for it.
>>707230579
I really like this idea too.
>>
Keep your hd somewhere else. Use proxy where the hd is located, remotely connect to hd to use. Knock on door? Initiate write sequence on remote drive. They'll find it, but you can write 32 pass zeros by the time they do. Just watch your ram and temp shit. Theory anyhow. I'm sure someone else could explain this better.
>>
>>707225071
just drag 'n drop the content into the recycle bin and bam - immediately gone.
i tried it with a 30gb folder and it was really quick
>>
>>707231059
>implying it hasnt already been done
>>
>>707226405
This. Just encrypt the drive.
>>
File: 1454813111191.gif (977 KB, 500x281) Image search: [Google]
1454813111191.gif
977 KB, 500x281
>>707230513
Fact-checked myself because I'm an Enlightened Gentleman. I must concede you are correct; the data is safe. The problem found with TrueCrypt is a privilege-elevation exploit tied to the encryption drivers.

So... your data will likely remain unrecoverable, but any random shitlord with guest account access can potentially administratively compromise your PC.
>>
>>707230681
There is only a slight chance that volume headers can be decrypted by bruteforcing them when only mildly complex passwords are used. The method for encrypting the volume header is only run around 1000-2000 times. You habe to be very unlucky - but its possible to crack that. Its still just a volume header though.
>>
>>707230865
Ram not HDD nub
>>
>>707225071
Microwave for 15 minutes on high.
>>
>>707231109
>but only if they thought to look for it.
Any large file will be suspicious. Even if they don't recognize it at first.
>>
dban.org
wipes drives
>>
>>707230999
You could have a small partition set up with that virtual HDD and then immediately create a new one on top of it. It would be awfully tricky for them to recover that. Also, by using a virtual machine, you are eliminating all temp and cache files that they could use to trip you up. The best approach is to take multiple approaches. DBAN is the best option, but is too slow in this hypothetical solution. This gives you a quick way to (hopefully) cover your tracks.
>>
>>707227524

there are ways to encrypt a drive so that it looks like its filled with random data. You could just deny there is anything on it and it would be difficult to prove otherwise.
>>
Encrypted drive, Small hidden safe that's plastic lined and filled with salt water, under desk, keep it cracked.
If SHTF, Yank the drive, toss it in, slam it shut.
They can't force you to give up the combination, a high enough quality safe has fail-safes that bolt the thing shut if you try to force it.
Anything they use to crack the safe (If they even fucking find it) will destroy the drive, that's if it isn't wiped by sitting in salt-water for hours.

There you go, about a $600 setup. Cheaper than legal fees.
>>
Incinerate it.
Or reduce the disk to powder. Idk how. Mortar and pestle or something. I would be amazed if anyone can put together power ( just the hard drive's disk) back together.
>>
>>707228471

If you smash the drive then they know you've got something to hide and if any fragments survive you can be sure as hell they'll do their best to recover the data on them.

I assume OP is asking for illegal porn related reasons and if that's the case they'd only need to get a fraction of a photo to show what he was guilty of and depending on the kind of porn a single photo could get him the best part of a decade in prison.

Encrypt beforehand, smash if necessary.
>>
>>707226442
>SSD

some SSDs have built in encryption based on a random generated key. This allows you to 'erase' the drive almost instantly by simply deleting the key.
>>
Mail it to Africa.
>>
the answer is a magnet, the answer thats been in the back of my mind is an oxy-acetalyne torch i have a feeling it may be hard to read data from a puddle of molten steel
>>
>>707225071

If they're at your door, it's too late. But otherwise, use a bootable CD to go in and multiple format the drive end to end.

If you have literally no time, microwave it. You'll be accused of evidence tampering but at least the evidence itself will be destroyed.
>>
>>707230240
nope, pay attention to your fucking history faggot

the NSA issued a NSL to the truecrypt devs demanding they insert a backdoor. the devs could not refuse, so like LavaBit they shut down the project to avoid having to comply.

They released a final version which CANNOT ENCRYPT and wrote a dog-whistle warning on the website to scare people away from the new version and to comply with the demands.

"Using TrueCrypt is not secure as it may contain unfixed security issues"

TrueCrypt is Not Secure As...
NSA

If you do use it, check your version and checksum -- better yet, switch to fucking linux already and use luks
>>
>>707225440
would thermite work?
>>
>>707231006
If the data has been removed there is no chance of finding it. The more human operation and lines of code to run the more chance of a mistake in encrypting it.
If you never want to be found out for murder you destroy the body, not hide it and so it is with data.
>>
File: 4L_6dL3rPjG.png (395 KB, 693x614) Image search: [Google]
4L_6dL3rPjG.png
395 KB, 693x614
>>
>>707232279
watch
>>707228909
>>
>>707231204
Deleting data also requires lines of code, written by a human.
>>
>>707225071
giant magnets.
Then, hide the magnets.
>>
It astounds me how stupid some of the people in this thread are...

"Formatting doesn't delete the data."
"You need to run multiple passes of X program to zero out data."

First of all, *QUICK* formatting doesn't delete data but a full format will.

You also only need to do one zero pass.. anyone who thinks otherwise simply doesn't know how anything works, period.

If writing a zero to a sector didn't stick the first time, don't you think we would have major problems during normal usage?
>>
>>707230476
nope
you fucking suck at opsec
>>
Idk, probably take it apart and put the platters in a blender.
>>
>>707231965
>if any fragments survive you can be sure as hell they'll do their best to recover the data on them
As mentioned above, we don't live in Minority Report. The technology doesn't exist. Even removing the disk from its shell and getting dust or a fingerprint on it will fuck the data on it. With that in mind, imagine taking a wine glass, throwing it against a wall so hard that parts of it are reduced to not shards, but powder, then trying to piece it back together again so that no cracks are visible. Once a hard drive has been destroyed, it is completely and utterly useless.
>>
>>707229265
And you think cops are bothered about legalities?
>>
>>707232210
but the data is not stored on steel.
>>
File: 1474620314208.jpg (6 KB, 206x245) Image search: [Google]
1474620314208.jpg
6 KB, 206x245
>>707231123
best answer so far
>>
>>707232611
I should also mention that if you're using a modern SSD and not an HDD then due to the way SSDs handle data (TRIM) once you delete something it's gone forever.

You don't even need to wipe it with zeros.
>>
>>707227334
best answer so far..
>>
There is a reason facilities that have classified data make a zero run on hdds at least 20 times.

Even one pass of zeroing a hdd can take longer then you think. With cops in your home you need to do something that takes seconds at max.
>>
File: 1440465918255.gif (1018 KB, 233x199) Image search: [Google]
1440465918255.gif
1018 KB, 233x199
>>707225071
Tell us anon: what´s in the HD?
>>
>>707225734
what's suspicious about it? Its your property, maybe you heard the police banging on your door maybe you didn't. Maybe you had headphones on while drilling a hole through your HDD that may or may not have CP on it. You have the right to remain silent during an investigation...I'd talk to a lawyer for more advice on these matters though
>>
File: 1475804585572.jpg (394 KB, 770x1027) Image search: [Google]
1475804585572.jpg
394 KB, 770x1027
I accidentally saved a straight shota pic from /b/ and freaked out . got so paranoid ill go to jail so I formatted my HD 8 times then throw out the PC and got a new one. A $2500 mistake.

Never again.
>>
>>707232049
should know this method is already compromised

the mfg has master keys built into the firmware. it like the the modern day Clipper chip
>>
>>707232611
To be sure you would get the spec sheets for the drive and see how it implements error correction and what type of cache it uses then write a custom zero script to allow for this, fucking writing zeros enough times to cover all eventualities is stupid.
>>
>>707233185
Its true that ssds are not wiped with zeroes, but the trim logic is calculatable to a degree. So not 100% safe.

Most ssds nowadays have a encryption build in. You simply wipe sectors that store the key and the data is gone for good. Easily doable by a script in ms
>>
>>707226534

>indiction

Doesn't surprise me one bit the subhuman retards in the GOP wouldn't know this.
>>
>>707232293
>false equivalency
>>
>>707225071
Microwave
>>
>>707233185
TRIM doesn't change the NAND state retard, it's still recoverable. THATS the whole fucking point of TRIM -- it doesnt perform a state-change
>>
>>707229053

>modern encryption
>thousands or millions of years

Try about 20-30.
>>
>>707227240
yeah wasnt that like day 2?
>>
>>707230579
To add to this, I got in some trouble a few years back because the officer in charge of the case was a twat. Cops came to take computers, list of things they took:
>my laptop
>family computer
>dads laptop
>second family computer
>4-5 old floppy drives sitting in a cabinet
>3 DVD drives sitting in a cabinet
>3 EMPTY computer cases
>bunch of old ass (like 10-15 year old) HDDs

Things they didn't take:
>~10 flash drives scattered around the house in plain sight
>3TB portable external drive PLUGGED INTO a TV
>4TB backup external HDD
>phones

The warrant was for "any and all computer related equipment that is capable of storing data or accessing the internet".

So yeah, cops are usually lazy/retarded.
>>
>>707233862
Says you comparing mathematical logic to human logic
>>
>>707234324
>4-5 old floppy drives sitting in a cabinet
Because you never know when someone might be pirating Doom.
>>
>>707225071
USB drive and a jar of honey and a dog.
When the police come, put the USB stick in the honey then give it to the dog.
>>
>>707225071
>completely erase an HDD from it's contents
Vaporize the HDD.
>not suspicious
Replace it with a different HDD.
>>
>>707235019
yep, just google HDD sublimation
>>
>>707225071
A sledge hammer
>>
>>707234141
Google has their own quantum computer.

Imho in 10 years max we have the first quantum computers built for brute forcing. They dont even need more then a few minutes to crack any encryption method used today.
>>
>>707234103
You obviously have no idea how TRIM works.

Data in an SSD must be erased before a cell can be written to so when you delete something on an SSD it's not 'instantly' erased but gets TRIM 'flagged' to increase performance, which works in the background.

Depending on whether or not you're using discard affects how long it will take for TRIM to kick in.

Either way, TRIM most certainly WILL zero out the cells.
>>
>>707235384
You obviously have no idea how wear algorithms work
>>
>>707233443
What's a straight shota? I don't mean to sound like a retarded 10 year old but based off of your post I ain't lookin it up.
>>
>>707235636
Not gonna bother anymore, you're either trolling, ignorant, and/or stupid.
>>
>>707225071
buy a degausser. They are only like 250

3 cranks and your done.

If you kept your HDD outside your case.
It would literally take less than 45 seconds

YANK, toss in the degauser cause you keep the lid open, CRANK fast 3 times. that's it.

Come on in officers, how can I help you?

oh i was just recently formatting my computer, oh ya. I use a degausser, cause i have banking info on my computer
>>
>>707235708
Anime drawings of boys being molested
>>
>>707225071
open it up, blow some dust on it and close it back up
>>
>>707233443

Shota is legal you fucking retard.
>>
>>707225071
Microwave it
https://www.youtube.com/watch?v=HIyZeB5H9WQ
>>
Literally if u open it up and put platters in a blender it will fucking turn that shit into dust
>>
>>707226221
trucrypt is not safe anymore. and i guess cops will try and get the encryption password out of him in a way or another.
best way would be use external drives and a bucket of acid you can drop the drives into if needed
>>
>>707228591
Bonus points if they don't see the flight trajectory. At that point the disc is not even yours.
>>
>>707225071
Why not just buy a another old one, and throw the first away?
>>
>>707226462
will it blend?
>>
>>707225071
press the restart button
Thread replies: 213
Thread images: 12


Navigation: /b/ - Random [Archive] | Search | [Home]
Navigation: /b/ - Random [Archive] | Search | [Home]


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site. This means that RandomArchive shows their content, archived. If you need information for a Poster - contact them.