Yeah, either DD or the dm-crypt trick for filling the drive with crypto-grade randomness wiki.archlinux.org/title/…/Drive_preparation
Comment on Proper HDD clear process?
IsoKiero@sopuli.xyz 11 months ago
Dd. It writes on disk at a block level and doesn’t care if there’s any kind of filesystem or raid configuration in place, it just writes zeroes (or whatever you ask it to write) to drive and that’s it. Depending on how tight your tin foil hat is, you might want to write couple of runs from /dev/zero and from /dev/urandom to the disk before handing them over, but in general a single full run from /dev/zero to the device makes it pretty much impossible for any Joe Average to get anything out of it.
And if you’re concerned that some three-letter agency is interested of your data you can use DBAN which does pretty much the same than dd, but automates the process and (afaik) does some extra magic to completely erase all the data, but in general if you’re worried enough about that scenario then I’d suggest using an arc furnace and literally melting the drives into a exciting new alloy.
Static_Rocket@lemmy.world 11 months ago
waspentalive@lemmy.one 11 months ago
I claim my new rock band name “exciting new alloy”
Tangent5280@lemmy.world 11 months ago
hi, is the image AI generated?
waspentalive@lemmy.one 11 months ago
Indeed - Meet Exciting New Alloy, playing on tour near you soon!
MonkderZweite@feddit.ch 11 months ago
Just overwrite with /dev/zero and be done.What dd always has to be abused i incredible.
cmnybo@discuss.tchncs.de 11 months ago
The one thing DD won’t overwrite is bad sectors. If the disk has any reallocated sectors, the data in the original sectors may still be there.
If there are reallocated sectors, then the disk is reaching the end of it’s life and is not worth reusing anyways.
IsoKiero@sopuli.xyz 11 months ago
And if you’re concenred on data written on sectors since reallocated you should physically destroy the whole drive anyways. With SSDs this is even more complicated, but I like to keep it pretty simple. If the data which has been stored on the drive at any point of it’s life is under any kind of NDA or other higly valuable contract it’s getting physically destroyed. If the drive spent it’s life storing my family photos a single run of zeroes with dd is enough.
At the end the question is that if at any point the drive held bits of anything even remotely near a cost of a new drive. If it did it’s hammer time, if it didn’t, most likely just wiping the partition table is enough. I’ve given away old drives with just ‘dd if=/dev/zero of=/dev/sdx bs=100M count=1’. On any system that appears as a blank drive and while it’s possible to recover the files from the drive it’s good enough for the donated drives. Everything else is either drilled trough multiple times or otherwise physically destroyed.
waspentalive@lemmy.one 11 months ago
Some SSD drives can do a secure erase via block encryption where the key is stored on the drive itself. There is a command that simply generates a new key - Voilà your drive now contains random bits. I don’t know if newer spinning rust drives have this feature too.