Securely Erase Data to Effective Techniques and Tools

  • Thread starter Thread starter fox26
  • Start date Start date
  • Tags Tags
    Data
Click For Summary

Discussion Overview

The discussion centers around techniques and tools for securely erasing data from digital storage devices, including hard disks, SSDs, and USB flash drives. Participants explore various methods, their effectiveness, and the implications for data security, particularly in contexts such as resale or disposal of devices.

Discussion Character

  • Exploratory
  • Technical explanation
  • Debate/contested
  • Experimental/applied

Main Points Raised

  • Some participants propose that securely erasing data requires multiple passes of writing random strings of 0's and 1's to effectively eliminate residual data.
  • Others argue that for magnetic storage devices, residual magnetism can allow for the recovery of overwritten data, suggesting that cycling between 0's and 1's may be necessary to obscure previous states more effectively.
  • A participant notes that the physical characteristics of hard disk writing heads can lead to residual data remaining even after overwriting, which complicates the erasure process.
  • There is mention of differing opinions on the sufficiency of writing all 0's or 1's for SSDs and USB drives, with some suggesting that these methods may be adequate in certain cases.
  • Participants discuss the importance of physical destruction of drives for highly confidential information, as overwriting may not be trusted in all scenarios.
  • One participant shares personal practices for securely disposing of failed drives, emphasizing physical destruction methods to prevent data recovery.

Areas of Agreement / Disagreement

Participants express a range of views on the effectiveness of different data erasure techniques, with no consensus on the best approach for all types of storage devices. There is agreement that physical destruction is advisable for highly sensitive data, but opinions vary on the necessity and effectiveness of multiple overwriting passes.

Contextual Notes

Participants acknowledge that the effectiveness of data erasure techniques may depend on the type of storage medium and the specific circumstances of data sensitivity. There are unresolved questions regarding the best practices for SSDs and the implications of residual data on magnetic drives.

fox26
Messages
40
Reaction score
2
I have read in several places, I don't remember exactly where, that to effectively and securely erase stored date from most modern digital storage devices, it is necessary (or at least this is one often-used technique) to repeatedly, in several, maybe dozens, of passes, write randomly selected strings of 0's and 1's over the data. My Bitdefender antivirus app now has what is called a "file shredder" to do just that. (I imagined from the name that it used this technique, and a call to Bitdefender indicated that it probably did.)

My question is: Why is it necessary to use such a time-consuming technique, when, it seems, just writing all 0's (or all 1's) would be quicker and even more effective? It is true that the ultimate limit set by quantum mechanics on the accuracy with which the state of every atom, free electron, etc. in the storage device after writing the 0's could be known would allow, at least in some situations and for some storage locations, the determination of whether a 0 or a 1 had been stored there before writing the 0's, but this could not be done with present technology, or any likely future technology. I could be wrong about this. Am I wrong, or were instead the descriptions I read of erasing techniques, and the Bitdefender phone tech person, both wrong, or, more unlikely, are the erasing techniques used generally, including by Bitdefender, obviously needlessly complicated and time-consuming?
 
Computer science news on Phys.org
For magnetic storage devices, such as hard disks, there is residual magnetism that can be measured. So even if all bits are set to 0 or 1, with the proper tools one can still read the information that was there before. Cycling many times between 0's and 1's reduces this residual magnetism, making it harder to find the previous state of each bit.

I do not know if the same is true of other types of memory, like SSD, but I assume it could be. You have to remember that each bit is not held by a single atom/molecule, but by a huge bunch of them, such that writing a new bit doesn't change completely the state of the underlying medium (most atoms/molecules change their state, not all of them).

As for Bitdefender's approach of using random strings, I don't know if this is more efficient than just cycling 0's and 1's.
 
  • Like
Likes   Reactions: QuantumQuest, Greg Bernhardt and FactChecker
When data is written to a hard disk, it is streamed to a magnetic head while the disk spins underneath it. An actuator moves the head from track to track as it writes your data. Each track has a predefined width that the head travels in. Because of vibration the head doesn't travel in a simple circle but randomly wiggles back and forth a bit.as the track is written.

https://en.wikipedia.org/wiki/Hard_disk_drive

Whether you writing zeros or ones there will still be some residual data because the head never passes over the same spot on the track to completely overwrite/erase the prior data written there meaning it could be read back so multiple writes of random data obscure it more completely.

The other part is that when you delete files on your hard disk they aren't actually deleted. The file is unlinked from the filename to disk sector mapping but the data will still be there for awhile (hence recovery programs can often bring back deleted files in the near term). In the longer term, the OS will begin to reuse the deleted tracks once its cycled thru its free tracks.

Imagine having a column of names on a whiteboard new names are added to the bottom of the list and deleted names are simply erased. Once you hit the bottom of the whiteboard writing new names then you go back to the top and fill in the blanked/erased rows with new names. That's kind of how a hard disk works. THis strategy also benefits the hard disk in not reusing the some areas more than others which could lead to faster hard disk failures as the head may scrap the disk surface slightly with each pass and and disk shock.

http://www.explainthatstuff.com/harddrive.html

SSDs and USB sticks are electronic memory based with different operating characteristics from hard drives. I don't think they have the same issue when overwrites are done. However, they do practice the notion of minimal writes to a given location to preserve the SSD.

https://en.wikipedia.org/wiki/Solid-state_drive
 
  • Like
Likes   Reactions: QuantumQuest
DrClaude and jedishrfu,

Thank you for your answers. Since I read them I've been looking online for more articles about erasing data, and found, as is often the case online, considerable differences of opinion about what techniques are best in different situations. Without going into tedious details, the consensus, to the extent it exists, seems to be that to erase moderately sensitive data on magnetic drives that are going to be resold or junked, several, but not dozens, of passes writing randomly selected 0's and 1's is desirable and also sufficient. For highly confidential information, destruction of the drives is advisable. For personal computers being resold or junked, maybe just writing all 0's or all 1's is good enough.

Actually what I had in mind by my "most modern digital storage devices" were SSD's and USB flash drives. For them, although it's not entirely clear, writing all 0's or all 1's may always be sufficient in those cases where it can be done, but often the construction and programming of such drives makes the overwriting of certain data on them about impossible, so different techniques, such as encryption of the data before storage or destruction of the drives, should be used. You probably already know more about this than I do.

Wiggling of the write head on a hard disk is something I hadn't thought about.
 
  • Like
Likes   Reactions: jedishrfu
I think you summarized the state of data erasure well.

If the computer has been used to conduct online banking, shopping, home finance, tax preparation... then I'd be inclined to remove the hard drive.

There are folks who buy junk computers just to see what they can find on the hard drive.

I wouldn't want to risk that scenario so I remove the drive and destroy it instead.
 
  • Like
Likes   Reactions: Laurie K and FactChecker
DrClaude said:
For magnetic storage devices, such as hard disks, there is residual magnetism that can be measured.
There was some experiments where overwritten data could be restored based on residual magnetism, but that was back in the MFM era. Around 30 (or more) years ago.
These days, it's true that with complicated instruments remnants of previous data can be identified, but that's all. It can be identified, and things stops at this point. Like a skeleton can be identified - it is a skeleton, see?

fox26 said:
For highly confidential information, destruction of the drives is advisable.
Overwriting is completely safe for sensitive data too. What makes the difference is, that for sensitive data the staff who does the overwriting is not to be trusted, so it is a requirement to identify the wreck of the drive before disposing it.

The very point is, that for magnetic storage it has to be physical overwriting. Just logical 'delete' won't do.
 
I think you need to decide who you want to keep from reading your stuff. A random tech-savvy criminal? Or a major world government? That will determine the steps you need to take in protecting it. For me, a secure erase followed by a few hammer blows is plenty.

The more interesting question is what to do with a failed drive that used to have sensitive data on it.
 
  • Like
Likes   Reactions: rkolter and QuantumQuest
For my failed drives, I crack the drive open using a hammer, and for drives with platters, I grind the surfaces down with a belt sander. I physically break up the rest of the drive and put the pieces into a crock pot full of salty brine overnight. I let them cool in the brine after that until it's trash day, then throw the parts out. Any working drive I am disposing of, I tend to follow the above steps for as well. I work in IT. The last thing I want is someone one-upping me on drive security.

I second Vanadium's response - in general you are probably good with even a basic secure erase that overwrites the drive with random data 1-3 times. If you're a bit paranoid, or a perfectionist, overwrite ten times.

I would add one more thing - if you are truly worried about your data being taken, encrypt your drive - both because if the drive is stolen it cannot be read, and because if you later wipe the drive, the data you are obscuring is encrypted - if someone did get the data, it wouldn't be much good to them.
 
  • Like
Likes   Reactions: FactChecker and jedishrfu
CCleaner has a Drive Wiper tool.
So does the Paragon Hard Disk Suite.
I seem to remember several freeware tools that do the same thing.
 
  • #10
Svein said:
CCleaner has a Drive Wiper tool.
I don't believe CCleaner can erase your Local Disk, though...?
It won't on my computer, anyway...

upload_2018-3-14_0-17-24.png


.
 

Attachments

  • upload_2018-3-14_0-17-24.png
    upload_2018-3-14_0-17-24.png
    8 KB · Views: 815
  • #11
Then get a Linux stick and use the BADBLOCKS program in destructive mode.

Better to have some cooling for the drive, because it'll get some heat...
 
  • #12
OCR said:
I don't believe CCleaner can erase your Local Disk, though...?

No Windows program can erase the boot drive since the code it needs to run is on that drive.
 
  • #13
Vanadium 50 said:
No Windows program can erase the boot drive since the code it needs to run is on that drive.

:check:... Those were my thoughts too.
 
Last edited:
  • #14
I don't know why Svein recommends the CCleaner tool , only those who have used it know that it is a waste of time. I've used a tool that's helpful but it's not freeware.
 
  • #15
Another approach to allow for secure erasing data on a drive is to employ encryption on the full drive or selected files from the start and then securely erase the key when the disc or files are to be erased.

For devices such as SSD that may not overwrite the same physical memory block when you overwrite the logical blocks belonging to a file, encryption (and physical destruction) is a much more secure choice for erasing data than overwriting. Also, some USB drives come with built-in encryption and secure reformatting.
 
  • #16
Physically destroying the drive is an order of magnitude faster than over-writing the drive even once. Over-writing several times would take a very long time. Unless you are worried that a professional spy will be trying to get your data, you can do a reasonable job of "destroying" it in 10 minutes with a sledge hammer or a drill.

A year ago, I had to discard 15 to 20 old drives. If I over-wrote them, I would still be working on it. (an exageration)
 
Last edited:
  • Like
Likes   Reactions: Stephen Tashi
  • #17
Gaserpas said:
I don't know why Svein recommends the CCleaner tool , only those who have used it know that it is a waste of time. I've used a tool that's helpful but it's not freeware.
Well, I only said that CCleaner had the option to wipe a drive. I also said that Paragon Hard Disk Suite has that option, which I am currently using - it takes 4.5 hours to wipe a 74Gbyte drive!
 
  • Like
Likes   Reactions: FactChecker
  • #18
I don't think anyone has answered the question with respect to solid state drives and USB "thumb" drives. On these devices, the data is stored in floating gate non-volatile memory cells. Unlike magnetic drives, I don't think there is any way to recover the data from these devices once it is erased. So a one-pass simple erasure (with all 1's, all 0's, or any random pattern) should be sufficient. Does anyone know differently?
 
  • Like
Likes   Reactions: FactChecker
  • #19
phyzguy said:
So a one-pass simple erasure (with all 1's, all 0's, or any random pattern) should be sufficient. Does anyone know differently?

I would image that a general flash drive tool would have difficulty ensuring that any bad blocks on the drive has been securely erased. A bad block would not normally be readable, but if bad block management (BBM) is only implemented in the host computer driver and not the on on-chip controller (I am not aware if all flash drives have on-chip BBM, though I think most have) then it seems plausible that special hardware readers may be able to read sensitive data that has "gotten stuck" in those bad blocks. For drives with on-chip BBM special data forensic equipment may still be able to recover content of some of the bad blocks on the drive.
 
  • #21
The only completely sure way:
 
  • Like
Likes   Reactions: Greg Bernhardt
  • #22
@ Fact Checker, it's true that the most reliable way to destroy data is to destroy the integrity of the physical medium that holds it, e.g. by extreme heat, perhaps by lowering it into a molten metal crucible as the video clip you posted illustrates, or maybe by tossing it into a magma pool of an active volcano ...

Orodruin12.jpg
 

Attachments

  • Orodruin12.jpg
    Orodruin12.jpg
    23.1 KB · Views: 515
  • Like
Likes   Reactions: FactChecker
  • #23
Gaserpas said:
I don't know why Svein recommends the CCleaner tool , only those who have used it know that it is a waste of time. I've used a tool that's helpful but it's not freeware.
I saw this on Google yesterday.maybe you can get what you want ...
 
  • #24
Gaserpas said:
Gaserpas said:
I don't know why Svein recommends the CCleaner tool , only those who have used it know that it is a waste of time. I've used a tool that's helpful but it's not freeware.
I saw this on Google yesterday.maybe you can get what you want ...
It looks to me like you're panning well-established freeware and plugging a trial of something that is less well-established. The freeware version of CCleaner is able to implement the same erasure options as are listed at the site at the location a link to which you posted.

From a https://www.ccleaner.com/docs/ccleaner/ccleaner-settings/changing-ccleaner-settings:
CCleaner has four methods of secure deletion: a Simple Overwrite (1 pass), DOD 5220.22-M (3 passes), NSA (7 passes), and Gutmann (35 passes). A 'pass' refers to how many times CCleaner writes over the spot on the hard drive. The more times CCleaner writes to that spot, the harder the file will be to recover by any means. The drawback is that it will take CCleaner longer to complete the job.​
 

Similar threads

  • · Replies 15 ·
Replies
15
Views
2K
Replies
7
Views
2K
  • · Replies 18 ·
Replies
18
Views
3K
  • · Replies 3 ·
Replies
3
Views
3K
  • · Replies 11 ·
Replies
11
Views
2K
  • · Replies 6 ·
Replies
6
Views
4K
  • · Replies 51 ·
2
Replies
51
Views
6K
  • · Replies 24 ·
Replies
24
Views
11K
  • · Replies 11 ·
Replies
11
Views
2K
Replies
2
Views
3K