Erase SSD

How would you erase your SSD completely on a MacBook Air? (besides the OS recovery partition)

So that no one, including government agencies and the best computer scientists, could recover any data?

Attached: Macintosh-OSX-Disk-Utility-300x300.png (300x300, 69K)

Other urls found in this thread:

backblaze.com/blog/how-to-wipe-a-mac-hard-drive/
twitter.com/SFWRedditImages

open the drive and scratch the plates

acid

If you want zero recoverability you'll have it destroy it. My company sends all of our drives to another facility whew they are melted down.

If you are end user then you can't.

The plates of a SSD?

Implying that bundling up loads of suspicious Disks together and sending them to an uncontrolled third party where they are "processed" is somehow less dangerous than just wiping them normally and selling them anonymously and having them reused.

How about simply removing the files and then writing nonsense data to it until it is full?

Everybody who disagrees probably uses gold plated audio cables, too.

dd if=/dev/random of=/dev/myssd

There's a secure erase option in disk utility via recovery.

backblaze.com/blog/how-to-wipe-a-mac-hard-drive/

I've done that, then deleted the nonsense files, then secureerase free space, then 3 pass swipe and fresh install of new OS.

Will this leave the recovery partition intact? I feel like writing 0s will not change the wear levels but instead random data is a better option.

It's our facility dingus. They never leave the company's custody.
t. Aerospace

High voltage

> I've done that, then deleted the nonsense files, then secureerase free space, then 3 pass swipe and fresh install of new OS.

So what the fuck are you paranoid about, jesus

why? Do u have CP on it?

use thermite you fool

>I've done that, then deleted the nonsense files, then secureerase free space, then 3 pass swipe and fresh install of new OS.
So what are you expecting to find on a recovery attempt?

SSD are pretty much impossible to recover once you overwrite them with random data. The way an SSD works is not the same as how an HDD works. HDD you can recover data magnetically, so it requires you to repeatedly re-write the magnetic data so the original data can't be read. But an SSD uses electron traps; trap is empty, it's 0. Trap has electrons in it, it's a 1. If you zero the drive, you've emptied all the traps; they could possibly read the residual charge and reconstruct the data of the previous cycle, but if you just completely fill the drive with random data after zeroing it out, it completely fucks any chances of data recovery.

Better yet, zero the drive, then fill it with stupid (legal) shit like gay porn, old Jow Forums .swf files, 5 hour loop of taking a piss on law enforcement emblems in uncompressed 4K, etc. Whatever you want to force the agents to watch, just change the filename to CP, they'll have to watch it no matter how retarded it is.

Encrypt the entire drive and then format it.

Kek

Make sure you use filevault then just erase the first few mb of the disk just to make sure nobody can read it.

Don't do this if you live in britbongland and anticipate the government will want to decrypt your laptop - you might get locked up for not doing the now impossible task of not providing the key to "decrypting" your laptop.

>downloading suspicious shit
>fear of getting v&
>hear knock on door
>"user, OPEN UP"
>ohshit.jpg
>they have come at last
>open computer
>rip ssd out
>smash with hammer
>knocking louder and yelling my name, now my full name
>hurry faster
>run SSD underwater in sink
>throw in microwave
>run to door
>open it
>it was just my roommate locked out in the rain
>loud popping in the background as I realize I just my rare pepe ssd
>mfw

Attached: 34642323.jpg (540x511, 59K)

fake as fuck

Same question but for a flash drive?

the good ol' drill and microwave

Attached: hackerman_by_shiiftyshift-dan31sc.png (1920x1080, 3.17M)

>trusting software

Smash it to pieces.

>it's an appletoddler subhuman thinks Jow Forums is his personal tech support forum

Attached: 1512674391547.jpg (600x736, 288K)