Communities

Writing
Writing
Codidact Meta
Codidact Meta
The Great Outdoors
The Great Outdoors
Photography & Video
Photography & Video
Scientific Speculation
Scientific Speculation
Cooking
Cooking
Electrical Engineering
Electrical Engineering
Judaism
Judaism
Languages & Linguistics
Languages & Linguistics
Software Development
Software Development
Mathematics
Mathematics
Christianity
Christianity
Code Golf
Code Golf
Music
Music
Physics
Physics
Linux Systems
Linux Systems
Power Users
Power Users
Tabletop RPGs
Tabletop RPGs
Community Proposals
Community Proposals
tag:snake search within a tag
answers:0 unanswered questions
user:xxxx search by author id
score:0.5 posts with 0.5+ score
"snake oil" exact phrase
votes:4 posts with 4+ votes
created:<1w created < 1 week ago
post_type:xxxx type of post
Search help
Notifications
Mark all as read See all your notifications »
Q&A

How to securely erase data from a thumb (solid state) drive

+0
−0

How do you securely erase data from a thumb (USB/flash) drive?

With traditional (magnetic/spinny) hard drives, it used to be that you could use various tools to simply overwrite with random data, and make it unrecoverable. You even have tools like shred that can do it for a specific file.

Many of these don't work on solid state devices (which most thumb drives are) because those have less predictable patterns over where data get written.

Does that mean that it's impossible to erase an SSD beyond recovery? Or is there a way to do it? Can you do individual files too, or is it only possible for the whole drive?

Note: I want to still use the drive after the erase, so no melting it in the raging flames of Mt. Doom.

History
Why does this post require attention from curators or moderators?
You might want to add some details to your flag.
Why should this post be closed?

0 comment threads

1 answer

+1
−1

Answering your question as written, this is a hardware-specific question. Since solid-state storage chips typically keep the details of which cells are being used to write data hidden from the OS, never mind the user, in order to be sure you've erased any unit of data beyond recovery, your hardware vendor would need to have written that functionality into its drivers somehow, and then you'd need a way to access it, from Linux. And you would need to trust that your hardware vendor is both competent at this task (which is rarely verified by consumers, after all) and uncompromised by the threats you're concerned about.

In my experience, the best approach is to encrypt a solid state device before ever using it, and store the key, or a passphrase used to decrypt the key, on a device from which it is more difficult to recover. Wetware works well.

History
Why does this post require attention from curators or moderators?
You might want to add some details to your flag.

1 comment thread

Of course, you would still have the secure erase problem if you leaked the key, because you can no lo... (6 comments)

Sign up to answer this question »