![]() Unless you're talking about a 2TB or larger HDD, I'd just run a drill bit through the platters and throw them away. SSDs have no residual magnetic pattern to recover. I presume since we're talking about disk erasure, these are HDDs and not SSDs. In the end, nothing short of a disk recovery lab with equipment that is affordable only to a national intelligence organization is going to get that data back and probably then only partially. ![]() You mentioned you want to reuse the drives, so I'll just say, Active Killdisk works. Many use DBAN to wipe disk Opens a new window. That works fine but if the CIA looked hard enough they may get at the sectors that have been swapped out and any residual data left there could be looked at but would not make much sense. I boot up Linux and issue a dd command to write zeros on it. ![]() If you want to reuse the hard drives then you need to fill all the bits with zeros or random data and whilst some authorities say write over 5 times this is unnecessary with modern drives because the data is so compact. This technique will work even if the disk are unusable in a PC because it has died. If you want to make certain that the data is destroyed then get a chisel and hammer it through the hard drive to go through the platters a three of four times and I don't know of any way of recovering the data because the disks cannot be spun in any way to recover the data. As I understand it NIST 800-88 does not cover SSD where you only need to set a password on it and forget that.
0 Comments
Leave a Reply. |