0

As far as what I understand there are different approaches and I have a few doubts regarding each of them:

  • On the one hand, it seems that factory reset does not securely erase itself data from SSD storage for certain operating systems and devices. However, in case data are first encrypted and then the factory reset is executed, the data will remain in the storage as encrypted, thus they cannot be recovered (as long as the encryption scheme remain secure). My doubt is that this approach does take into consideration the fact that a portion of data may have been deleted before being encrypted, so they are not involved in the encryption once executed and they are recoverable. Is this a potential problem?

  • On the other hand, it seems that for SSD the traditional method of filling the whole storage with zeros or random data is not the reccomended approach because intense writing may reduce the life of the device and the reccomended approach is one exploting some magic related to the physics of the hardware that "erases" the electrons used to represent data at once. While the traditional method of filling the whole storage is not reccomended, is it still secure (as secure as the reccomended one)?

Lorenzo
  • 1
  • 2
  • 1
    Does this answer your question? [Is it enough to only wipe a flash drive once?](https://security.stackexchange.com/questions/5662/is-it-enough-to-only-wipe-a-flash-drive-once). See also [ATA security erase on SSD](https://security.stackexchange.com/questions/41676/ata-security-erase-on-ssd), [How to erase ... SSD ...](https://security.stackexchange.com/questions/145950/how-to-erase-as-much-as-possible-an-ssd-without-ata-secure-erase), [Does the ATA Trim ...](https://security.stackexchange.com/questions/109916/does-the-ata-trim-command-irrecoverably-delete-data-on-an-ssd). – mentallurg Mar 30 '21 at 22:21
  • Just partially, thanks however. – Lorenzo Mar 30 '21 at 22:25
  • What do you mean by "partially"? What part of your question is not addressed is one of these 4 answers? – mentallurg Mar 30 '21 at 22:26
  • While I get that it reduces the life of the device, I do not get how filling the whole storage is in terms of security with respect to the reccomended approach. – Lorenzo Mar 30 '21 at 22:31
  • Any write operation reduces the life of the device. When you are normally using it, many parts of it will be rewritten **many times**. And you want to avoid one more time for erasure of the whole disk? – mentallurg Mar 30 '21 at 22:55
  • *"While the traditional method of filling the whole storage is not reccomended"* - Not recommended by whom? Please provide a link to the source. Besides, how do you want to erase data without overriding it (except of encrypting the whole disk before usage)? – mentallurg Mar 30 '21 at 22:59
  • For example [this](https://security.stackexchange.com/questions/5662/is-it-enough-to-only-wipe-a-flash-drive-once). Maybe they do not reccomend to fill the storage many times for secure deletion, but only once is not a deal. Regarding second question, [this](https://www.micron.com/about/blog/2017/april/the-easy-and-fast-way-to-securely-remove-all-data-from-your-ssd) gives an idea: _"Each targeted storage element is raised to an erase voltage (significantly higher than the standard program voltage), then that signal is dropped to ground, leaving no trace of the previous signal."_. – Lorenzo Mar 30 '21 at 23:11
  • By the way, what I am interested in is the security aspect. – Lorenzo Mar 30 '21 at 23:14
  • 1
    Then, as these answers suggest, start with naming your threats. Do you want to protect your erased data from some governmental or some other very powerful organization with huge resources? Then the most reliable way is to destroy the disk. Restoring of data after overriding is only possible in some specific cases and if an expensive equipment is used. If you want to protect erased data just from talented hackers, then even a single overriding of data will be sufficient. – mentallurg Mar 31 '21 at 02:44
  • [This] (https://security.stackexchange.com/a/156972/126227) might help. – Ugnes Mar 31 '21 at 06:20

3 Answers3

2

A picture says a thousand words ...

Picture of an Apple smartphone that has been partially destroyed by burning

brynk
  • 832
  • 2
  • 13
0

What about using a data recovery tool first, then encrypt everything and finally delete whatever you don't need? Thus, you'd make sure that whatever recoverable data your SSD has, will at least be encrypted.

Of course, the caveat to this approach is that one could use more sophisticated recovery tools than you and, thus, get access to unencrypted data you weren't able to recover.

  • I believe it depends on the software for recovering you are using if the recovered data are simply unmarked as deleted or written in a new location. In the second case, the data may be still recovered. Moreover, recovering data requires a considerable effort and doing it may not be a good idea if the purpose is securely delete them instead. – Lorenzo Mar 30 '21 at 22:49
0

Most trusted method of secure deletion in SSD is physical destruction. This include, incinerations, sheading...etc.

My doubt is that this approach does take into consideration the fact that a portion of data may have been deleted before being encrypted, so they are not involved in the encryption once executed and they are recoverable. Is this a potential problem?

Exactly yes. Encrypted data also recoverable but it is not readable. If your data is unencrypted it is possible to read. In addition to that SSD has built in secure deletion commands, unfortunately these commands are not fully trusted.

You can read this article and take advanced level knowledge about SSD sanitization. Additionally NIST 800-188 also provide comprehensive details about media sanitization.

Infra
  • 650
  • 1
  • 6
  • 19