Serious Discussion How do you nuke an SSD?

Studynxx

Level 4
Thread author
Jan 20, 2023
279
So if I understand correctly, if you want to destroy an HDD, you drill some holes into it and anything that was on it (data) will be un-recoverable.

But what if it's an SSD? Do you use Darik Boot And Nuke? SSDs use 'flash memory' if I understand correctly, they're not mechanical unlike HDDs

So how do you make any data on an SSD unrecoverable even for a forensic IT pro?
 
  • Like
Reactions: Sorrento

Bot

AI-powered Bot
Apr 21, 2016
4,783
To securely erase an SSD, you can use software that implements the Secure Erase command, which is designed to remove all user data from a drive. Some SSD manufacturers provide utilities for this. Another method is to encrypt the entire drive, and then erase the encryption key, making the data unrecoverable. Drilling holes or physically damaging an SSD is not recommended as it's unsafe and may not effectively erase all data.
 
  • Like
Reactions: Dimitriss

Zero Knowledge

Level 20
Verified
Top Poster
Content Creator
Dec 2, 2016
916
Drilling holes in hard drives, using Thermite or Acid to destroy hard drives or using a shotgun to destroy a hard drive is pretty stupid. But do what you want.

If your such a high value target i would expect you don't use connected devices or computers at all and if you do use such devices expect to be owned each way until Sunday.

Bot is right, encrypt data using 256 number random passphrase using words/numbers/special characters/foreign languages and destroy the key, you can also remove/delete the header.

If your even more paranoid just use a magnet to destroy data after encrypting.

The only software I would trust is BcTotalWipeOut. It' still updated unlike Dariks N&B which is ancient.
 

oldschool

Level 85
Verified
Top Poster
Well-known
Mar 29, 2018
7,902
The only software I would trust is BcTotalWipeOut. It' still updated unlike Dariks N&B which is ancient.
Or BleachBit.

Are these features secure?​

Concerned about the security of my house, once I asked a locksmith whether I should upgrade the standard lock on my front door. Not a good salesman, he replied, “Why bother? A burglar would just break the window.”

Is driving a new car with air bags and a good crash test rating safe? Probably. How about when the car is operated by a 15-year old on a busy road at night while texting on his cell phone? Probably not. This analogy demonstrates two things. First, security is not black or white: there is always risk ranging from near (but not completely) zero to near 100%. Indeed, sometimes people even walk away from catastrophic car accidents. Second, the context is important: what is good in one situation is not good in another. Therefore, a better question is…

How secure are BleachBit’s methods?​

When used appropriately, BleachBit’s data wiping features are generally enough to hide traces of most data from most people.

Even more important than asking how secure an application or technique is, start by asking yourself

  1. What am I trying to hide? Is worth a lot of money? A few thousand that is in your bank account? A one million dollar trade secret?
  2. How much harm could it do if disclosed? Embarrass someone? Hurt a relationship? Break compliance with HIIPA or SOX? Bankrupt a large company? Shift global political power?
  3. Who would try to find it? A family member? A powerful rival company? A superpower government?
  4. How much time, money, and skill does that entity have? How much is it willing to spend to find your secrets?
The answers to these questions will lead you to the appropriate level of caution.
 
Last edited:

bazang

Level 12
Jul 3, 2024
551
So how do you make any data on an SSD unrecoverable even for a forensic IT pro?
The only method proven by real-world practice that guarantees data is non-recoverable from a SSD is to physically destroy it. Usually pulverization, followed by incineration.

But hey, that does not help if you used a cloud service provider. If you did, then your best option is cryptoerasure. Use strong cryptography to encrypt the data and then completely destroy the encryption key. Even with this method forensic experts can obtain metadata on other infos that could turn out to be insightful and revealing.

The easiest and cheapest way is to not collect or create the data and store it on a SSD in the first place.

To keep track of and fully destroy all data requires an extreme amount of discipline and effort.
 

Digmor Crusher

Level 26
Verified
Top Poster
Well-known
Jan 27, 2018
1,502
Drilling holes in hard drives, using Thermite or Acid to destroy hard drives or using a shotgun to destroy a hard drive is pretty stupid. But do what you want.

If your such a high value target i would expect you don't use connected devices or computers at all and if you do use such devices expect to be owned each way until Sunday.

Bot is right, encrypt data using 256 number random passphrase using words/numbers/special characters/foreign languages and destroy the key, you can also remove/delete the header.

If your even more paranoid just use a magnet to destroy data after encrypting.

The only software I would trust is BcTotalWipeOut. It' still updated unlike Dariks N&B which is ancient.
I trust zero software, shotgun works for me. ( Simmer will have to lend me one of his, I'm in Canada, we don't do guns here .)
 
Last edited:

Amnesia

Level 2
Aug 23, 2021
55
Hit it with a hummer, microwave it, stab it, burn it, cook it in the oven, fry it etc…
In my workplace we delete the old HHDs break the PCB with a screwdriver or a cutter, then we go down and smash it with a hummer(and make sure the disk is smashed). The same goes with SSDs, except the hummer part.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top