TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

ShredOS – Secure disk erasure/wipe

56 pointsby arunc5 months ago

11 comments

cedws4 months ago
Software erasure is no good on modern hardware, it pulls too many tricks internally and the data could easily stick around in a region of NAND not accessible. There’s an easier way - use full disk encryption with a TPM. Data effectively erased upon destruction of TPM key.
评论 #42565909 未加载
评论 #42568080 未加载
评论 #42567135 未加载
评论 #42566472 未加载
upofadown4 months ago
From the nwipe (what this uses) page:<p>&gt;In the current form nwipe does not sanitize solid state drives (hereinafter referred to as SSDs) of any form (SAS &#x2F; Sata &#x2F; NVME) and &#x2F; or form factor (2.5&quot; &#x2F; 3.5&quot; &#x2F; PCI) fully due to their nature: ...<p><a href="https:&#x2F;&#x2F;github.com&#x2F;martijnvanbrummelen&#x2F;nwipe">https:&#x2F;&#x2F;github.com&#x2F;martijnvanbrummelen&#x2F;nwipe</a><p>The ShredOS page suggests the use of hdparm for SSDs but things are fairly complicated:<p>* <a href="https:&#x2F;&#x2F;github.com&#x2F;martijnvanbrummelen&#x2F;nwipe&#x2F;blob&#x2F;master&#x2F;ssd-guide.md">https:&#x2F;&#x2F;github.com&#x2F;martijnvanbrummelen&#x2F;nwipe&#x2F;blob&#x2F;master&#x2F;ssd...</a>
评论 #42565763 未加载
评论 #42568038 未加载
slicktux4 months ago
“In the current form nwipe does not sanitize solid state drives (hereinafter referred to as SSDs) of any form (SAS &#x2F; Sata &#x2F; NVME) and &#x2F; or form factor (2.5&quot; &#x2F; 3.5&quot; &#x2F; PCI) fully due to their nature: SSDs, as the transistors contained in the memory modules are subject to wear, contain in most cases additional memory modules installed as failover for broken sectors outside of the host accessible space (frequently referred to as &quot;overprovisioning&quot;) and for garbage collection.”<p>Interesting and that they don’t mention Enhanced Security Erasure; that SATA command would take care of the broken sectors and firmware reserved sectors. HDPARM is capable of issuing the command if the SSD&#x2F;HDD supports it and HDPARM is the tool they seem to be using. Not sure what they are using for NVME though as they use PCIE…not SATA commands. Maybe sedutil from OPAL? Anywho, tor most drives whether SSD, HDD or NVME you can ‘erase’ it by simply setting and deleting my the KEK and UEK but to securely erase you want to do security enhanced erase data command that runs locally in the drive and is independent of the OS.
评论 #42568801 未加载
borlox4 months ago
Pretty cool UX, however it seems to follow the approach to overwrite data once or multiple times.<p>As far as legends on the high magic of contemporary flash memory goes, you would want to simply tell your SSD&#x2F;NVMe to secure erase the drive instead of writing data yourself. ShredOS doesn‘t seem to implement this.
robobro4 months ago
DBAN for a new generation. This is pretty cool. So far DBAN is still getting the job done for me, but this looks like a solid replacement.
评论 #42565840 未加载
amelius4 months ago
&gt; PRNG Stream - Fills the device with a stream from the PRNG.<p>How are you going to explain to the TSA officer that the disk does not contain encrypted data?
评论 #42567409 未加载
评论 #42566801 未加载
评论 #42567168 未加载
daneel_w4 months ago
Barebones alternative for *nix people: just &quot;dd&quot; random data over the entire disk. A single pass suffices because there is no such thing as &quot;gleanable history&quot; on the sectors of magnetic storage - nor for flash storage, but the complexity of spare&#x2F;reserved memory blocks on SSDs may result in data escaping the procedure.
评论 #42568288 未加载
blackeyeblitzar4 months ago
Is this very different from using a bootable Linux distribution from a disc or USB drive to then wipe a disk drive? And as someone else pointed out here, with solid-state drives being more popular these days, these techniques are not sufficient.
0dayz4 months ago
I always wondered what is the difference between OS level secure erasure and software level secure erasure?
评论 #42566160 未加载
m3kw94 months ago
how hard is it to just flip bits on every single available memory? Is it because you have to use the manufacturer&#x27;s black box controllers and you don&#x27;t really know if they actually do what you asked?
评论 #42567157 未加载
fmajid4 months ago
It&#x27;s 2024, and you have:<p><pre><code> nvme format -s1 &#x2F;dev&#x2F;nvme0n1 </code></pre> to use secure erase on your NVMe drives, with similar commands available under hdparm for SATA drives:<p><a href="https:&#x2F;&#x2F;grok.lsu.edu&#x2F;Article.aspx?articleid=16716" rel="nofollow">https:&#x2F;&#x2F;grok.lsu.edu&#x2F;Article.aspx?articleid=16716</a><p>The &quot;DoD style&quot; erase commands no longer provide adequate security for highly virtualized I&#x2F;O devices like SSDs where blocks may be remapped as spares out of the directly accessible range and thus skipped by the pass. In fact, the DoD itself stipulates only physical destruction of hard drives is acceptable, and many bases have secure warehouses where old drives are stocked awaiting destruction.
评论 #42568394 未加载
评论 #42566477 未加载