[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/diy/ - Do It Yourself

Name
Options
Comment
Verification
4chan Pass users can bypass this verification. [Learn More] [Login]
File
  • Please read the Rules and FAQ before posting.

08/21/20New boards added: /vrpg/, /vmg/, /vst/ and /vm/
05/04/17New trial board added: /bant/ - International/Random
10/04/16New board for 4chan Pass users: /vip/ - Very Important Posts
[Hide] [Show All]


[Advertise on 4chan]


File: storage.png (279 KB, 790x944)
279 KB
279 KB PNG
how to make a storage drive completely irrecoverable before disposing of it ?
>>
Depends on the storage type, but fire is pretty universal.

Alternatively you can use DBAN or something similar to run DoD-spec wiping which in theory should completely eliminate all the data on the drive while leaving the drive itself usable.
>>
>>2946536
Send it to space where it can be rekt by solar flares and cosmic radiation n shit. It definitely won’t work after reentry.
>>
DoD has a protocol for wiping with random writes 37 times over or so before they use essentially a large drill press to pulverize the platters
>>
>>2946536
Write zeros to the drive, swipe a huge electromagnet over it, then physical destruction. Not even nation-states are going to be able to recover useful data from that.
>>
Tell the NSA it has the Epstein client list on it
>>
Encryption wipe it
>>
>>2946536
Why would you need to completely wipe it? If you've got nothing to hide then youve got no reason to wipe it
>>
>>2946536
1. be someone nobody would care about doing nothing anything would care about
>>
>>2946536
A hard drive?
Take it apart, and chuck the disk platters into the ocean. The data is on the fragile surface layer of the disks, and any kind of tarnish will ruin it. You can sand it off. You can use acid. You can bury it in the garden. Just don't protect them from harm.

An sd card or ssd drive?
Melt it.
>>
fill it with zeros a few times then throw it in a black hole
>>
>>2946724
You're supposed to alternate 0101010101010101 and 1010101010101010 several times to overwrite magnetic media.
>>
>>2946724
>falls into the black hole and out of the mirror universe it's quantum entangled with and slowly gains all it's data back
>>
>>2946740
Yea this happened to me once. Hell of a pickle I got in when that data was leaked.
>>
>>2946625
Spoken like a typical liberal faggot redditor. Kill yourself.
>>
>>2946536
Drill holes through it
>>
>>2946536
Smash the living shit out of it with a sledge hammer. But you should zero fill it at least before hand.

There is a good program called Macrowrit Data Wiper Pro that I use. It's not free though. It has up to 35x overwrite capability (Peter Gutmann's Algorithm). There is DoD 5220.28-STD (7 passes), 5220.22-M (3 passes), fill with zero & ones, fill with psudo-random, fill with zero. You can wipe free space only, the recycle bin or the entire drive or disk.

Another good piece of software is Active KillDisk. It's more expensive than Macrowrit but it used to have a bootable DVD/CD now USB key that you could use so you didn't have to be within Windows. It was not free obviously. Don't know what is free or open source out there that can do this. Would be worth researching if there is such a solution.

PS, do this overnight while you're sleeping. Depending on the drive size it could take a long time...
>>
>>2946824
https://www.killdisk.com/killdisk-freeware.htm

https://macrorit.com/free-data-wiper.html

So they both do offer free editions but they're super gimped so you might have to find a warez version. Sanet.st has macrowrit I know as I've used it before...
>>
>>2946826
https://rutracker.org/forum/viewtopic.php?t=1931170

This is an oldie from 2009. Works fine if your machine has a CD/DVD drive. Might have to look elsewhere for an up to date version.
>>
File: 1558215764037.gif (1.26 MB, 640x480)
1.26 MB
1.26 MB GIF
>>2946824
>>2946826
>>2946827
fcportables.com
>>
File: 1515200426985.jpg (255 KB, 1280x960)
255 KB
255 KB JPG
The simplest way is to drill a hole in it or throat it into a shredder. This is also good advice >>2946538
>>
This question seems so stupid. How is "smash it into a million pieces and toss it in a few trash cans" not the only answer?
>>
>>2946536

A single pass of zeroes is unrecoverable. Flat out. No "unrecoverable unless you have nation-state budget" caveat, it is flat-out impossible to recover data that's been overwritten by anything. Very old (like before you were born old) hard drives may have had recoverable bits and pieces IN THEORY, but modern drives already have to employ borderline magical levels of precision and extensive error correction in order to work at all.

Regardless of what you choose to wipe it with, be that all zeroes, ones, a pattern, or random values, there's no known technology that can recover what was on there before. As far as I can find, all of the "you have to go over it 20 times with random data" paranoia stems from a single paper from the 80s. And that wasn't even saying recovery was possible, just theories on how it MIGHT be possible and ideas on what would be needed to truly wipe data if it were.
>>
>>2946824
I fucking hate how much this shit has been repeated over and over.

5220.28 doesn't actually exist. The 7 pass was from bruce schneier's old book it being any sort of standard was entirely made up by retarded companies selling data wiping software. The 3 pass was never actually a part of 5220.22-m, which doesn't specifiy a wiping method at all. The 3 pass was from some other DCSA standard which was deprecated in 2007 https://web.archive.org/web/20100401055524/http://www.oregon.gov/DAS/OP/docs/policy/state/107-009-005_Exhibit_B.pdf

The 35 pass was never a standard of any kind, it's from some retarded conference paper 30 years ago, and was specifically designed for old MFM coded disks which stopped being produced in the 1980s. Any magnetic drive from the past 20 years is dense enough that one pass of zeros would work.

No wiping standard active today even accepts just overwriting the drive since almost all solid state storage does weird shit with wear leveling and the bad block table that make it useless. Even the stupid 35 pass method can leave large portions of a SSD recoverable
Almost all drives made since the rely 2000s have a built in secure erase command that wipes all blocks. Any low level disk access tool like hdparm or nvme-cli should be able to do it.
Also here's the actual active guidelines for data erasure https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-88r1.pdf lists
>>
>>2946536
I hooked my grindstone up to a petrol engine and just grind them to dust
>>
>>2946625
Financial data, credit card numbers etc make drives worth destroying.
>>
At delete the extra word at the end that I accidentally left there after rewriting the last part of the post if you're going to spam it like a retard



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.