On 3/23/24 22:02, Anthony de Boer via talk wrote:
And on disposal, the golden standard has always been physical destruction.
I don't know if it's been mentioned, but what about the shred command?
---
Post to this mailing list talk@gtalug.org
Unsubscribe from this mailing list
If the data that will be stored on a new drive is confidential enough that a
privacy leak would be Bad then the current standard of care would seem to be
encryption so that if the media did go walkabout it would not be readable.
If you’re going to reuse a device for a new project then losing
On 2024-03-23 10:50, Giles Orr via talk wrote:
I have, for many years, used "Darik's Boot and Nuke" on a USB stick to
securely wipe spinning hard disks. It takes a long time, but I mostly
understand and trust the process.
I'm now at the point that I have to wipe and dispose of SSDs, and I'm
The original request was for a Linux command line utility. However, if
any O/S and control interface is acceptable (E.g. Windows GUI
program), and possibly having to trust closed-source code, then you
may wish to check if the manufacturer of the SSD drive has a utility
targeted to wiping your
In addition to 'hdparm', I have 'shred' and 'blkdiscard' on my computer.
Other distros may vary.
--
On 2024-03-23 10:50, Giles Orr via talk wrote:
I have, for many years, used "Darik's Boot and Nuke" on a USB stick to
securely wipe spinning hard disks. It takes a long time, but I mostly
It depends on your paranoia level.
In the good old days, there were no levels hiding the disk sectors from
the computer.
Then came automatic sector mapping for bad blocks. Really convenient.
But how are you going to wipe those mapped-out blocks? As far as I know,
there is no way to do so.
Not that long ago I had to erase an SSD, and found that DBAN doesn't
work with SSDs :-( . So, I did find the following, which does seem to
happily erase (securly I hope) SSDs, HDs and other read/write media
(different code base, but exactly the same concept as DBAN) :
https://aban.derobert.net/
We used to have a simple wipe and an enhanced wipe on SunOS. The first
one overwrote the disk with a fixed bit pattern, the latter wrote and
rewrote it with different patterns. The idea was to make it hard to
detect residual magnetism from some older data. Definitely spinning-rust
stuff.
For
How to implement persistence:
https://wiki.debian.org/DebianLive/LiveUsbPersistence
Ivan.
---
Post to this mailing list talk@gtalug.org
Unsubscribe from this mailing list https://gtalug.org/mailman/listinfo/talk
I have, for many years, used "Darik's Boot and Nuke" on a USB stick to
securely wipe spinning hard disks. It takes a long time, but I mostly
understand and trust the process.
I'm now at the point that I have to wipe and dispose of SSDs, and I'm
feeling a bit shaky on the methodology. Here's
Thanks to Len Sorensen, Hugh Redelmeier and r...@bclug.ca for taking
their time offering suggestions, all of which I have investigated.
* * *
* * *
Paranoia and low tolerance for anxiety have me deciding on this
strategy, to get to a Debian 12 configuration with root filesystem
11 matches
Mail list logo