Secure erase = 1 pass?
Posted by townaroundtown@reddit | sysadmin | View on Reddit | 24 comments
Is one secure erase one pass if not, how many passes does it take to makeup for one pass on an ssd?
Posted by townaroundtown@reddit | sysadmin | View on Reddit | 24 comments
Is one secure erase one pass if not, how many passes does it take to makeup for one pass on an ssd?
MNmetalhead@reddit
SSDs are different from HDDs in how data is stored and accessed. On an SSD, the encryption key can be removed and the data ins basically unrecoverable. With a HDD, the platters have magnetic fields which can have residuals that require multiple “passes” to make the latent magnetism unreadable.
nickerbocker79@reddit
SSDs wipe by pretty much zeroing out all the charges. Which is why they wipe so fast.
TurtleOnLog@reddit
No. There is no “wipe all the charges” feature.
SSDs can wipe fast because either a) they are fast or b) if it’s encrypted you can just delete the key.
nickerbocker79@reddit
From HP's FAQ on wiping SSDs
Basically SSDs have a command to purge all memory cells. This is generally done using the wipe option in the BIOS. We have used a 3rd party tool, Parted Magic, when manufacturers don't offer that command in the BIOS. It happens in seconds.
73-68-70-78-62-73-73@reddit
There are different types of erasure which are supported, depending on the manufacturer and implemented features. Some support types of cryptographic erasure, in which a key is discarded, others support block erasure where voltage is raised to a specific level on an cells. I assume he was referring to Block Erase.
TurtleOnLog@reddit
Apologies you’re correct, some ssds do support a bulk “secure erase” function.
73-68-70-78-62-73-73@reddit
See also NVMe spec for
SANITIZE
commands. Support varies pretty widely, depending on which version of the spec was implemented. In early versions, you'd be stuck using overwrite commands per namespace, and the types of erasure which were available in the spec differed. For example, 1.2.1 only supported user data erase, which could be fulfilled by erasure and overwriting, or sanitization through key discard. Version 2.2 supported block erase, overwrite, and cryptographic erasure. To make matters worse, not all drives support all sanitization methods per spec.There's a lot of misinformation floating around about solid state media erasure, probably because of different specs, and manufacturer implementations.
townaroundtown@reddit (OP)
I was Samsung magician
73-68-70-78-62-73-73@reddit
Which SSD and firmware revision?
townaroundtown@reddit (OP)
990 pro, and a I’ll check but it’s the latest firmware installed
TurtleOnLog@reddit
Thanks for that
townaroundtown@reddit (OP)
If the data is basically unrecoverable then why do so many “forensic experts” claim “we can still find data”
TurtleOnLog@reddit
Usually they aren’t dealing with a wiped device…
townaroundtown@reddit (OP)
Okay but what about “experts” dealing with a nvme drive securely erased once
TurtleOnLog@reddit
Is that part of your threat model?
Again if it’s a cryptography based wipe there is nothing coming back from that.
townaroundtown@reddit (OP)
What is the data wasn’t encrypted before hand and no not my threat model
TurtleOnLog@reddit
That wholly depends on the OS accessing the SSD and how it’s configured. Very unsafe to assume all drives are encrypted.
But it is true that if a drive is encrypted then destroying the key is all that’s required.
CountGeoffrey@reddit
all modern SSDs are encrypted at the SSD level.
TurtleOnLog@reddit
Have you got a source for that? That all modern ssds are encrypted?
El_90@reddit
The first Q is, secure against who.
Someone stealing and using it Someone stealing it to spy on you A hardware manufacturer checking for hardware failure Or advanced government threat with unlimited funds
It's a different answer for each
townaroundtown@reddit (OP)
Honestly against anything under the sun
03263@reddit
1 pass with a drill should be enough
Smith6612@reddit
For an SSD you use the NVMe Secure Erase or ATA Secure Erase Function.
Unless you really want to do a 30 pass erase with random data (The Guatmann Wipe). Even that on modern drives doesn't guarantee that you have actually destroyed every trace of data on an SSD.
Apachez@reddit
The Gutmann method is based on ALL kind of storage media including older wide magnetic tapes (you know those seen in movies and documentaries about NASA from the 60s and 70s aka "mainframes").
Basically one standard to rule them all.
When it comes to regular harddrives (spinning rust and newer) one pass is enough. Or rather multiple passes wont solve anything.
The main "threat" on modern drives is the HPA and spare sectors. And on flash the fact that each write will go to a physical new block (to limit amount of wearleveling since each cell can only be written 1000 or so times depending on SLC/TLC/QLC etc). Flashdrives are often underprovisioned to prolong their lifetime.
For example when the drive detects a bad sector it will remap itself so LBA 12345 actually becomes LBA 20001 internally (OS accesses LBA 12345 but whats actually being accessed on the platters (or the flash) is LBA 20001).
This gives that when you attempt to overwrite LBA 12345 you are actually overwriting LBA 20001 (and when it comes to flash it will be physically a new cell for each write).
This gives if you remove the platters or desolder the flashchips and can do a raw dump from first to last physical sector then the data you have wished to have overwrite might still exist on the drive and can be recovered.
So one overwrite is enough for HDD and newer and for flashbased media using the ATA Secure Erase is the way to go (if the drive already used internal encryption).
And if you really need to get rid of the data then physical destruction (shred + melt) of the storage is the only way left.
Doing a soft erase is nowadays not enough to guarantee that the data (or well part of data) cannot be recovered. Its good enough to be used to reuse a drive within the same information domain but I wouldnt count on it if you want to reset drives (who have stored sensitive data) to then be sold on Ebay or such.
Another workaround (before starting to use drives) is of course to apply your own encryption (preferly FDE - Full Disk Encryption) which the OS provides for you or apps such as VeraCrypt and similar.
This way even if parts of the storage is recovered its still in an encrypted form.