[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

Hello. I need to completely wipe a hard drive and make the data

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 49
Thread images: 5

File: not_fbi.jpg (6KB, 225x225px) Image search: [Google]
not_fbi.jpg
6KB, 225x225px
Hello. I need to completely wipe a hard drive and make the data unrecoverable. How would /g/ approach this issue? Also, it must not take 20 hours to do it. It is 1TB 5400 rpm so I know it will take a while, but I just want to know the quickest way.
>>
Install gentoo.
>>
File: 0.2.jpg (2MB, 4095x2046px) Image search: [Google]
0.2.jpg
2MB, 4095x2046px
>>58250665
magnets
>>
>>58250665
dban
>>
Daily reminder cat is faster than dd.
>>
>>58250665

boot into a linux live USB and run shred -fvuzn 3 /dev/sdx
>>
>>58250665
Magnets.
>>
>>58250665
do you have a hammer?
>>
>>58250665
>NSA trying to find out the fastest way so they can be even faster
>>
File: 0E4.jpg (71KB, 960x720px) Image search: [Google]
0E4.jpg
71KB, 960x720px
>>58250691
>>58250707
>>58250708
guess i need to mention I still want to be able to use it afterwards.
>>
>>58250762
then why is time an issue?

time spent figuring it out now could be chipping at that week long 37-pass
>>
Acid wash it like Hillary. :^)
>>
>>58250762

Then use shred
>>
>>58250762
Not going to make it unrecoverable unless it's destroyed
I'd recommend thermite
>>
>>58250938
:|
>>
>>58250665
thermite

or a volcano if you have one near by
>>
Nice try stonetear
>>
Killdisk, right? I don't know how long that would take but I think it will make all data unable to be recovered, and still allow you to use it afterwards.
>>
>>58250665
Just format it anon :^)
>>
>>58250938
>Not going to make it unrecoverable
Wouldn't writing data over the entire drive make it unrecoverable?
>>
>>58250665
take it apart with a screwdriver and shatter the platters with a hammer.
>>
>>58251230
that's what the government would like you to believe
>>
>>58250665
pour molten aluminum on it then post it on youtube then get 10000000 views then buy a 2 tb hard drive
>>
>>58250665
Unless you are on top 10 wanted I'd say a 1 pass overwrite is enough. To be really sure a US DoD 5220.22-M (8-306./E) 3 passes. Paranoid? Do US DoD 5220.22-M (8-306./E, C & E) 7 passes and then do full disk encryption.

You shillary clinton needing to erase sensitive stuff? Gutmann 35 passes and then obliterate the hard drive in a shredder. Take the dust and throw it into the ocean.
>>
>>58251327
>throw it into the ocean.
No, throw it into the sun it's safer.
>>
>>58251327
Going off this if they really cared long term they should have had encryption from the start so they can 1-pass nuke it without concern.

I think courts now (or have?) seen encrypted drives as evidence and will pressure for it to be decrypted (or themselves die trying). It would explain OP's need of it being quick and still usable otherwise it'd seem like destroyed evidence.

Just a guess though.
>>
What is your threat model ?
>>
>>58250665
You're using loonix right? Boot up some live disc and <dd if=/dev/urandom of=/dev/sdX bs=4M && sync> and then reinstall. (Where /dev/sdX is your hard-drive, typically /dev/sda)
>>
>>58250665
>How would /g/ approach this issue?
switch it with another hard drive and stick the original hard drive in a sealed container
>>
>>58251725
Actually after looking at it the program shred that other people are suggesting may be a better idea.
>>
'When in doubt, C4' - Jamie Hyneman
>>
>How would /g/ approach this issue
With a bomb
>>
>>58250665

1. Use the debian installer and encrypt the entire disk.
2. Boot a livecd and just run the command:
cat /dev/zero > /dev/sda1

which should be the unencrypted /boot partition. Let this run until it's finished, which shouldn't take too long as /boot should only be ~200-500MB.
3. Now run the same command to the /dev/sda2, which would be the encrypted part. Once you run the command, wait a few seconds and stop it. That would remove the header and the disk is basically random data at this point.

You could also just setup the entire disk as encrypted and format the header, but I only realized that after I typed the above up.

And that's it, you can now format the drive with ext4 and go on with your life.
>>
File: 1471894262340.jpg (18KB, 385x481px) Image search: [Google]
1471894262340.jpg
18KB, 385x481px
[SOLVED]
thanks /g/ looks like i will be using shred command with only 1 or 2 passes :^)
>>
Use:
# cryptsetup open --type plain /dev/sdXY container --key-file /dev/random

# dd if=/dev/zero of=/dev/mapper/container bs=<whatever>

Faster and just as random
>>
>>58251315
EXPERIMENT Glowing 1000 degree KNIFE VS HARD DRIVE
>>
File: 1469290727895.jpg (299KB, 640x905px) Image search: [Google]
1469290727895.jpg
299KB, 640x905px
>>58250665
>>
>>58250665
Drill.
>>
>>58250665
Industrial shredder
>>
>>58250665
Zero out the drive. Shred to pieces not greater than half inch. Burn the pieces at 800 or more degrees for 5 minutes.
>>
thread reported to the authorities. rot in hell you're piece of shit
>>
>>58250693
This

>>58251230
You might still find trace differences which CAN theoretically be filtered out and used to see what you have.

One alternative is full disk encryption because it writes seemingly random 1s and 0s over the whole disk. Might be very difficult to see what was originally there.
>>
>>58250705
Only correct answer
>>
>>58250665
If you're using windows bitlocker the drive and then format it. This is what I do to SSDs I sell on eBay.
>>
don't forget about bad sectors they can't be wiped
just smash the platters if its glass and throw it in the recycle bin if platters are aluminium drill holes then
bend them into as many pieces as possible
>>
a program called blancco claims to able to wipe bad sectors but its paid
>>
>>58254805
bend them with pliers
>>
>>58254614
The only good use bitlocker has.
>>
download ransomware which encrypts your entire computer.
Thread posts: 49
Thread images: 5


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.