[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Wiping an unencrypted SSD in preparation for encryption



David Wright wrote:

...
> I don't work for the CIA, so "basic" erasure methods are sufficient,
> ie so-called logical and digital sanitisation, but not analogue
> sanitisation/purging. I'm just encrypting stuff like personal bank
> records etc, and not looking for anything like plausible deniability.

  i don't think this really matters, but the overriding issue
is that the technology of SSD means that sometimes things are
moved around (wear leveling) hidden from the user and will not 
be seen again in normal use, but they are still there.

  you will have to see if the SSD manufacturer releases a 
deep erase utility or something like that for it to be a sure
thing (and even then i'd have my doubts).

  personally, i wouldn't bother going beyond the simple format 
and setting up of file systems.  like you i have nothing on
this machine i consider sensitive so i don't need to worry
about what is left where.


  songbird


Reply to: