SSD BTFO

>On solid-state drives, wiping is very difficult, so I carry a laptop that has a standard hard drive and wipe it with at least thirty-five passes. File-shredding software does this by overwriting random data hundreds of times in each pass over a deleted file, making it hard for anyone to recover that data.
>I used to make a full image backup of my device onto an external hard drive and encrypt it. I would then send the backup drive to the United States. I wouldn’t wipe the data on my end until the drive was confirmed to be received by a colleague in readable condition. Then I’d securely wipe all personal and client files. I wouldn’t format the entire drive, and I’d leave the operating system intact. That way, if I was searched, it would be easier to restore my files remotely without having to reinstall the entire operating system.

Attached: 4a10978db3e6bc88968c84d6139aa267-d.jpg (510x680, 114K)

Anything you wouldn't want to be found would be encrypted, and there's no reason to wipe that.

>Invisibility
>Leaving a bread crumb of encryption

Invisibility is an illusion and encryption is unbreakable. Nothing to worry about.

ok, you're a rat. you find 2 bread crumbs on the outside of an 8,000KG safe
Are you any closer to gaining the loaf of bread?

got a pdf?
looks like an interesting read

>the world's most famous hacker teaching you how to not get noticed

search it on libgen

Let's say I'm a human.
Let's say I torture you for the pass to the safe.
How useful do you think your encryption is now?

>OK so we picked up this guy and we're pretty sure he's got information that would lead to [redacted] but he's a known cryptography expert and we couldn't find any traces of the information, in fact large portions of his hdd contain nothing but random data. We were going to torture him but I guess we'll just let him go. Have a nice day sir.

Show me a single example of a 1 pass zero'd out drive being recovered from.

ITT: kevin mitnick is a clueless fucking retard
imagine my shock discovering mitnick doesn't know how an ssd works! amazing. this lamer only knows a few things:
> compulsive lying
> police informing
outside of those two areas he's expert at, he's 100% a fucking lamer. continue on with that chapter with how he lies/tells a story about using "social engineering" with canadian border guards. it's absolutely ridiculous.
kill yourself, retard.

>>On solid-state drives, wiping is very difficult
Lo, no it's not. And wiping it thirty-five times would take much less time than a hard drive.

I mean, sure, If you did just a couple of passes on an SSD you're much more likely to have data left over due to the multi-cell approach of drives, but when you're talking about placebo tier 30+ passes that data is all gone.

>lamer
Is it 1998 again?

nobody can do it.
i can't recover data after 1-pass on any drive. anything more than 4-pass is overkill. overwriting the free space off the drive with a randomly filled file that is the size of the remaining free space on the hard disk has the same effect. you're unable to recover anything.
fuck off, lamer.

I just read this story. To avoid the border guards searching his phone he said he asked "hey, you can't search my suitcase, right? it's locked :^)" so they focused on his suitcase rather than his phone.

I'm also clueless about how ssd work underneath the hood but my understanding is that shred doesn't work because the data written on it is spread throughout the map.
But I'm just parroting what I've read online and I have no idea what I'm talking about.
Can you explain it to me? Or at least provide brainlet friendly resources?

>so they focused on his suitcase rather than his phone
except the entire story is pure fantasy that never happened. believing the stories of police informing snitches.. this a thing in 2019? sad.

>I'm also clueless about how ssd work underneath the hood
it works like any flash memory, once the data has been overwritten/zero'd out it's gone. there's no recovery.

If you're actually in fear of torture or even more mundane coercion, the right thing to do is to have a decoy container using a plausible deniability system. Veracrypt supports hidden containers for this.
>Oh no you fucking got me, all my hardcore bareback gay porn has been discovered!
You could conceivably torrent something other than hundreds of GB of manhole smashing I guess, but I'm not sure what would be more fun to show to some spooks. Be sure to sprinkle something actually relevant to an attacker in there too (but something that would be pretty useless). Also be sure to open the decoy every now and again to set fresh last accessed times.

>going to jewSA in the first place

>ITT: kevin mitnick is a clueless fucking retard
Complete and clueless fucking retard.
Found a way to wipe a drive in one pass.
All data completely unrecoverable...

Everytime I tell someone, I have never heard "Oh that will never work." even once.

With an SSD and Secure ATA Erase, it sends an electrical pulse through all the cells on the drive returning them to a zero state where there's absolutely nothing to recover, and it takes like 3 to 15 seconds depending on the capacity of the drive.

Fuck doing a 35-pass wipe on a 2TB+ hard drive, that's like a week to process.

Mitnick, well, he *was* the world's most famous hacker till he got himself all busted and shit, and as for being invisible, one doesn't do such things by writing books and putting on seminars telling people you can teach them how to be invisible.

I mean really, think about it.

So what's the reason why the idea that shredding files on SSD is useless so popular?
I remember getting laughed at in a previous thread month (years?) ago when I mentioned I was using shred to secure delete files on my ssd.

You know that encryption looks like random data, right?
\thread

dunno, from my experience after 1st wipe on ssd there is nothing to recover

Shredding a single file will usually just write data to the other free cells
Wiping the entire drive might not overwrite some cells but it will overwrite most of them
In the first case recovery requires deep and low level hacking (not in the cracking sense) of the controller, making it quite hard to most actors
Anyways, most modem SSDs encrypt everything by default, making it impossible to recover anything if the drive was securely wiped (using the wipe ATA command) unless you had the plaintext key this drives have before it was destroyed