Hello. I need to completely wipe a hard drive and make the data unrecoverable. How would /g/ approach this issue? Also, it must not take 20 hours to do it. It is 1TB 5400 rpm so I know it will take a while, but I just want to know the quickest way.
Install gentoo.
>>58250665
magnets
>>58250665
dban
Daily reminder cat is faster than dd.
>>58250665
boot into a linux live USB and run shred -fvuzn 3 /dev/sdx
>>58250665
Magnets.
>>58250665
do you have a hammer?
>>58250665
>NSA trying to find out the fastest way so they can be even faster
>>58250691
>>58250707
>>58250708
guess i need to mention I still want to be able to use it afterwards.
>>58250762
then why is time an issue?
time spent figuring it out now could be chipping at that week long 37-pass
Acid wash it like Hillary. :^)
>>58250762
Then use shred
>>58250762
Not going to make it unrecoverable unless it's destroyed
I'd recommend thermite
>>58250665
thermite
or a volcano if you have one near by
Nice try stonetear
Killdisk, right? I don't know how long that would take but I think it will make all data unable to be recovered, and still allow you to use it afterwards.
>>58250665
Just format it anon :^)
>>58250938
>Not going to make it unrecoverable
Wouldn't writing data over the entire drive make it unrecoverable?
>>58250665
take it apart with a screwdriver and shatter the platters with a hammer.
>>58251230
that's what the government would like you to believe
>>58250665
pour molten aluminum on it then post it on youtube then get 10000000 views then buy a 2 tb hard drive
>>58250665
Unless you are on top 10 wanted I'd say a 1 pass overwrite is enough. To be really sure a US DoD 5220.22-M (8-306./E) 3 passes. Paranoid? Do US DoD 5220.22-M (8-306./E, C & E) 7 passes and then do full disk encryption.
You shillary clinton needing to erase sensitive stuff? Gutmann 35 passes and then obliterate the hard drive in a shredder. Take the dust and throw it into the ocean.
>>58251327
>throw it into the ocean.
No, throw it into the sun it's safer.
>>58251327
Going off this if they really cared long term they should have had encryption from the start so they can 1-pass nuke it without concern.
I think courts now (or have?) seen encrypted drives as evidence and will pressure for it to be decrypted (or themselves die trying). It would explain OP's need of it being quick and still usable otherwise it'd seem like destroyed evidence.
Just a guess though.
What is your threat model ?
>>58250665
You're using loonix right? Boot up some live disc and <dd if=/dev/urandom of=/dev/sdX bs=4M && sync> and then reinstall. (Where /dev/sdX is your hard-drive, typically /dev/sda)
>>58250665
>How would /g/ approach this issue?
switch it with another hard drive and stick the original hard drive in a sealed container
>>58251725
Actually after looking at it the program shred that other people are suggesting may be a better idea.
'When in doubt, C4' - Jamie Hyneman
>How would /g/ approach this issue
With a bomb
>>58250665
1. Use the debian installer and encrypt the entire disk.
2. Boot a livecd and just run the command:cat /dev/zero > /dev/sda1
which should be the unencrypted /boot partition. Let this run until it's finished, which shouldn't take too long as /boot should only be ~200-500MB.
3. Now run the same command to the /dev/sda2, which would be the encrypted part. Once you run the command, wait a few seconds and stop it. That would remove the header and the disk is basically random data at this point.
You could also just setup the entire disk as encrypted and format the header, but I only realized that after I typed the above up.
And that's it, you can now format the drive with ext4 and go on with your life.
[SOLVED]
thanks /g/ looks like i will be using shred command with only 1 or 2 passes :^)
Use:
# cryptsetup open --type plain /dev/sdXY container --key-file /dev/random
# dd if=/dev/zero of=/dev/mapper/container bs=<whatever>
Faster and just as random
>>58251315
EXPERIMENT Glowing 1000 degree KNIFE VS HARD DRIVE
>>58250665
>>58250665
Drill.
>>58250665
Industrial shredder
>>58250665
Zero out the drive. Shred to pieces not greater than half inch. Burn the pieces at 800 or more degrees for 5 minutes.
thread reported to the authorities. rot in hell you're piece of shit
>>58250693
This
>>58251230
You might still find trace differences which CAN theoretically be filtered out and used to see what you have.
One alternative is full disk encryption because it writes seemingly random 1s and 0s over the whole disk. Might be very difficult to see what was originally there.
>>58250705
Only correct answer
>>58250665
If you're using windows bitlocker the drive and then format it. This is what I do to SSDs I sell on eBay.
don't forget about bad sectors they can't be wiped
just smash the platters if its glass and throw it in the recycle bin if platters are aluminium drill holes then
bend them into as many pieces as possible
a program called blancco claims to able to wipe bad sectors but its paid
>>58254805
bend them with pliers
>>58254614
The only good use bitlocker has.
download ransomware which encrypts your entire computer.