Fine. But don't you have any reservations about presuming that cracking the encryption is a requirement in this scenario?cpoakes wrote:My Samsung drives use AES256 which I don't believe any government can crack...pylkko wrote:If the data is only encrypted, then it sound like that such a "secure erase" will render the data unusable for normal users but not governments.
Scheduled Maintenance: We are aware of an issue with Google, AOL, and Yahoo services as email providers which are blocking new registrations. We are trying to fix the issue and we have several internal and external support tickets in process to resolve the issue. Please see: viewtopic.php?t=158230
Howto: Cleaning /Wipping Hard Disk/Files
Re: Howto: Cleaning /Wipping Hard Disk/Files
Re: Howto: Cleaning /Wipping Hard Disk/Files
^Point taken. But I'm concerned about new users when I resell/redistribute old drives, not government agencies using encryption/manufacturer backdoors to snoop on my used equipment. If my acivities generate government interest, I think they are more likely to get a warrant and sieze my equipment, or seize my equipment at a border crossing than wait for me to post it for sale on craigslist.
Re: Howto: Cleaning /Wipping Hard Disk/Files
the command that you posted varied slightly from the one I posted a few posts earlier in this thread and I was wondering why. I searched a bit and found nothing fully explanatory. But this:
If your drive supports enhanced erase, you may want to substitute security-erase-enhanced for security-erase. The difference, according to the HDDerase.exe FAQ:
Secure erase overwrites all user data areas with binary zeroes. Enhanced secure erase writes predetermined data patterns (set by the manufacturer) to all user data areas, including sectors that are no longer in use due to reallocation.
Re: Howto: Cleaning /Wipping Hard Disk/Files
hdparam, messed all my computer, i lost my table partiton and i couldnt recover my windows installation, i also lost a virtual XP installation ,pylkko wrote:Ok, so what about:Will resetting the cells of an SSD leave anything that can be recovered?Code: Select all
hdparm --user-master u --security-erase-enhanced password /dev/device name
please, dont post dangerous linux virus. (hehe, i was sure there wasn't virus for linux, obviously i was pretty wrong )
At least, you should warn people about the dangerousing of this command line.. i think.
hopefully i could use testdisk and my skills to be able to recover my linux installation and other NTFS partitions, It wasn't easy at all, i had to apply some tricks of my own cos table partition become a really disaster.
bester69 wrote:STOP 2030 globalists demons, keep the fight for humanity freedom against NWO...
Re: Howto: Cleaning /Wipping Hard Disk/Files
I used swap partition just in case to see what happend, and then it came into swappening, i got terrified and shut down inmediattly my computer, then it all was gonewizard10000 wrote:No disrespect, bester- but there's a really good reason you shouldn't run things as root unless you understand what impact it will have.bester69 wrote:At least, you should warn people about the dangerousing of this command line.. i think.
You're probably not gonna be able to recover data off that drive; a security erase is *designed* to make the data unrecoverable.
Measure twice, cut once
bester69 wrote:STOP 2030 globalists demons, keep the fight for humanity freedom against NWO...
Re: Howto: Cleaning /Wipping Hard Disk/Files
Yeah, and the Principia hasn't been updated in over 300 years, so I guess force no longer equals mass x acceleration.wizard10000 wrote:All respect to you, but read it a couple years ago and dismissed it.dasein wrote:Edit: For the benefit of those too farqing lazy to search for it: http://forums.debian.net/viewtopic.php? ... 15#p446550
Why? Glad you asked
1. It's ten years old.
2. It's unclassified.
But ungrounded, baseless speculation is simply too shiny to resist.wizard10000 wrote:I have no direct knowledge that the information in that NIST doc is incorrect but...