Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Hardware
Hardware Troubleshooting
How do I securely wipe data on a laptop with a SSD ?
Message
<blockquote data-quote="RoboMan" data-source="post: 665876" data-attributes="member: 53544"><p>On my HDD i always perform secure erases, but i really find Guttman algorithm or similar <u><strong>unnecessary</strong></u>. A couple of passes will make the data unrecoverable mostly. 35 passes is a waste of time and writes. Correct me if i'm wrong. I've even contacted Data Recovery Companies to prove my point and they told me that in most cases, after 2 passes they're not able to recover any data.</p><p></p><p>EDIT: i was able to find this quote on the web:</p><p></p><p>"Gutmann himself has responded to some of these criticisms and also criticized how his algorithm has been abused in an epilogue to his original paper, in which he states:<a href="https://en.wikipedia.org/wiki/Gutmann_method#cite_note-Gutmann-1" target="_blank">[1]</a><a href="https://en.wikipedia.org/wiki/Gutmann_method#cite_note-security-and-usability-2" target="_blank">[2]</a></p><p></p><p>In the time since this paper was published, some people have treated the 35-pass overwrite technique described in it more as a kind of voodoo incantation to banish evil spirits than the result of a technical analysis of drive encoding techniques. As a result, they advocate applying the voodoo to <a href="https://en.wikipedia.org/wiki/Partial_response_maximum_likelihood" target="_blank">PRML</a> and EPRML drives even though it will have no more effect than a simple scrubbing with random data. In fact performing the full 35-pass overwrite is pointless for any drive since it targets a blend of scenarios involving all types of (normally-used) encoding technology, which covers everything back to 30+-year-old <a href="https://en.wikipedia.org/wiki/Modified_Frequency_Modulation" target="_blank">MFM</a> methods (if you don't understand that statement, re-read the paper). If you're using a drive which uses encoding technology X, you only need to perform the passes specific to X, and you never need to perform all 35 passes. For any modern PRML/EPRML drive, a few passes of random scrubbing is the best you can do. As the paper says, "A good scrubbing with random data will do about as well as can be expected". This was true in 1996, and is still true now.</p><p></p><p>— Peter Gutmann, Secure Deletion of Data from Magnetic and Solid-State Memory, University of Auckland Department of Computer Science."</p></blockquote><p></p>
[QUOTE="RoboMan, post: 665876, member: 53544"] On my HDD i always perform secure erases, but i really find Guttman algorithm or similar [U][B]unnecessary[/B][/U]. A couple of passes will make the data unrecoverable mostly. 35 passes is a waste of time and writes. Correct me if i'm wrong. I've even contacted Data Recovery Companies to prove my point and they told me that in most cases, after 2 passes they're not able to recover any data. EDIT: i was able to find this quote on the web: "Gutmann himself has responded to some of these criticisms and also criticized how his algorithm has been abused in an epilogue to his original paper, in which he states:[URL='https://en.wikipedia.org/wiki/Gutmann_method#cite_note-Gutmann-1'][1][/URL][URL='https://en.wikipedia.org/wiki/Gutmann_method#cite_note-security-and-usability-2'][2][/URL] In the time since this paper was published, some people have treated the 35-pass overwrite technique described in it more as a kind of voodoo incantation to banish evil spirits than the result of a technical analysis of drive encoding techniques. As a result, they advocate applying the voodoo to [URL='https://en.wikipedia.org/wiki/Partial_response_maximum_likelihood']PRML[/URL] and EPRML drives even though it will have no more effect than a simple scrubbing with random data. In fact performing the full 35-pass overwrite is pointless for any drive since it targets a blend of scenarios involving all types of (normally-used) encoding technology, which covers everything back to 30+-year-old [URL='https://en.wikipedia.org/wiki/Modified_Frequency_Modulation']MFM[/URL] methods (if you don't understand that statement, re-read the paper). If you're using a drive which uses encoding technology X, you only need to perform the passes specific to X, and you never need to perform all 35 passes. For any modern PRML/EPRML drive, a few passes of random scrubbing is the best you can do. As the paper says, "A good scrubbing with random data will do about as well as can be expected". This was true in 1996, and is still true now. — Peter Gutmann, Secure Deletion of Data from Magnetic and Solid-State Memory, University of Auckland Department of Computer Science." [/QUOTE]
Insert quotes…
Verification
Post reply
Top