👽
Erase takes the address off your mailbox and leaves the mail in it for the next resident to use. Secure erase opens it and scritches off all the words from your mail. Takes time though.
Submitted 6 months ago by mypasswordis1234@lemmy.world to [deleted]
https://lemmy.world/pictrs/image/a20df800-9654-48dc-8d8f-a6312036d272.png
👽
Erase takes the address off your mailbox and leaves the mail in it for the next resident to use. Secure erase opens it and scritches off all the words from your mail. Takes time though.
Perfect ELI5
Your disk is like a file cabinet, there’s also an index folder where for example it says that “your file.txt” is in cabinet C7. You go there and there’s a sheet of paper written in pencil with the contents of your file. In this analogy here’s how several solutions work:
It’s worth mentioning that the OS index is what gets deleted when a file is deleted, the SSD is untouched by this, but SecureErase is a special command sent to the SSD controller inside the unit that deleted its own index of what entries correspond to which 1s and 0s on which separate internal NAND flash chips (and dies, planes, blocks and pages) and in what order. This makes recovering data very very difficult even if the actual data is not overwritten in any way, because SSDs will often write in parallel for speed, which renders the oldest most bruteforcry digital forensic technique in the book on HDDs - simply transplanting the platters into a different drive, imaging them into hex and looking for file headers and subsequent zeroes and reading in files as if they were written linearly to see what comes out.
That’s as I understand it though.
Most of these answers are mostly right: deleting a file on disk doesn’t actually erase the data, it just marks the space as available to write over - meaning that so long as nobody’s used the space since, you can go retrieve the contents with an undelete utility.
Most of the time, people don’t care - but if for instance you’re selling the PC or there’s highly sensitive information involved, that might not be good enough.
As such, there are utilities that can go out and specifically overwrite the contents of a file with all zeroes, so ensure that it’s dead-dead - and there are other utilities that can do the same to an entire disk.
There’s one wrinkle: Magnetic HDDs don’t reliably erase and overwrite completely in a single pass; just like rubbing out pencil writing, it can leave faint impressions under the new content, and it is actually possible (with serious effort by forensic recovery people) to glean some of the previous content. If there’s serious money / security at stake, a simple overwrite is not enough, so there’s software that certifiably-randomly scribbles over each bit, seven times over, making the chances of recovering the original astronomically slim. Again, this can be done for individual files or the entire disk.
SSDs aren’t prone to leftover impressions, thankfully - what’s gone is gone. And they have one other neat feature: while a magnetic disk can only be erased one bit at a time, so large disks can take hours - SSDs can just open the floodgates and ground every cell at once, fully erasing the entire disk in an instant.
This instant-erase, while comprehensive… returns before you’ve even taken your finger off the ENTER key, so fast it feels like it can’t possibly have done anything, it must be broken, how can I trust it? So BIOS manufacturers hype it up, call it something impressive to underline that it’s big and powerful, and actually impose a 10-second countdown to make it feel like it’s doing something complicated.
Any of these different things have been called ‘secure erase’ at various points, so it’s a little context dependent. But from the end-user perspective: this data is getting shredded then incinerated then added to cattle feed; it’s not coming back.
There’s one wrinkle: Magnetic HDDs don’t reliably erase and overwrite completely in a single pass; just like rubbing out pencil writing, it can leave faint impressions under the new content, and it is actually possible (with serious effort by forensic recovery people) to glean some of the previous content.
No, it’s not. At least it has never been done on more than single bits, with an accuracy higher than 50% (which means even when trying to restore a single byte, your chances of it being correct are 1/256).
ELI5 albeit a long one:
Your storage is like a book, with an index at the beginning. This index tells whatever computer reading it “the contents of “Math Homework 5.odt” start on page 100 and ends on page 125”, for example.
When a new file needs to be stored, the computer only has to quickly read the index, find a spot in the book with empty pages, and write the file on those pages.
Nkw, when you delete a file, the computer will only erase the index, which is much quicker. Math Homework 5.odt is gone so more another file can be written onto pages 100 through 125!
A thief getting their hands on your storage could still read the part with your file’s content on it, though, so it’s not safe!
“Secure delete” means the computer will not only erase the index entry, but even every letter from every page related to your file’s content. This takes a long time, but a thief trying to read those pages will simply see blank pages, so that’s why it’s safe!
Normal delete just marks things as deleted, freeing up that space to be overwritten later, but the original data is still there until it is overwritten. Secure delete overwrites the data with random 1’s and 0’s, so it is actually gone and can’t be recovered. It’s the difference between throwing a physical document into the trash, but not taking the trash out, and putting the physical document through the shredder and then burning it. In the first example anyone with access can reach into the trash can and read your document, and in the second example it’s unrecoverable.
It depends on the who made it.
If your hard drives are encrypted then it doesn’t delete the data, it deletes the encryption key which makes the data effectively unrecoverable, while others will take the existing ones and zeros of data and turn them all into ones, then turn them all into zeros and repeat 3 or 4 times just to be sure.
One thing other answers have missed is that some ssds encrypt data before writing and obviously after reading (this prevents a swap the storage controller type attack) A secure erase on such a device consists of changing the read/write key. Takes milliseconds. Irrevocable (unless you find a way to read previous contents of the key storage)
With an HDD, your operating system can (mostly) directly access bits on the magnetic disks, so you can wipe them by just writing 0 to it over and over (historically, there was a paper saying 7 times would make any bits unrecoverable - this changed as density got higher)
With SSDs, your operating system has very little control over what bits a write is touching, a lot more was moved into the firmware on the flash memory itself
So SSDs need a special command “Secure Erase” to wipe them
It’s worth it to mention that after a single pass it was possible to recover single bits with an electron microscope, but not even a full byte. One pass has always been enough to delete actually meaningful data.
Yeah, and as densities have increased, fewer passes have been needed to even do that
Hot take: It’s what old farts used to use back in the day.
These days you should just use encrypting file systems with per-file keying (like eg APFS) and stop worrying about deletion leaving file data around.
I don’t want to encrypt my drive in case I forget the encryption key and lose all my data
Yeah, I’m having a hard time deciding about that.
On the one hand I’m often in business trips and want to be at least able to recover my data easily if something happens.
On the other hand getting the laptop stolen with all the data is a nightmare.
Didn’t look into current solutions for quite some time though. As I’m currently waiting for a new laptop, this could be a good time to check something out.
Anyone with some suggestions? (Will look into the encrypted FS OP recommended, but having options and opinions never hurts)
Fair point. Data integrity and availability concerns often trump confidentiality.
Still, if your main concern is safe disposal rather than preventing unauthorized access, most major operating systems have ways to ensure continued access.
I’ll take a shot at the metaphor. Delete: telling someone they can use the whiteboard (but you didn’t erase it) Secure: cleaning it off when you’re done for the next user.
Where do people see a secure erase option?
This is an option in the BIOS (UEFI) of certain PCs. I can confirm it exists on a number of HP Elitebook models.
Less of an option and more of choosing the right tool to do the trick.
In day-to-day life I might not care how files are deleted. But when I intend to sell my drive on ebay or so I would make sure that really all the data ia gone.
But how do you choose secure erase? A program or what
There’s a map that shows where every file on your disk is. Doing a regular trash just erases the map pointer for that file, but the 1s and 0s that the file is made of are still sitting there on your disk. Secure erase writes 0s into that area on the disk, so even if you knew where that file used to be located on the disk, now you’ll just find 0s there, instead of finding the 1s and 0s of the old file.
Computers use an address to tell it where the data is stored on your memory drive
Erase just deleted the address referencing the location, meaning other things can overwrite it.
Secure erase actually deletes the address and overwrites the data that was at where the address was pointing to. Sometimes it’s all zeros, some programs will right random crap over it
Darorad@lemmy.world 6 months ago
When you normally delete a file, it doesn’t actually delete it to save time, it just marks the space as free, so any new files can be written into that part of your drive.
But the actual data just remains there until a new file is written to the storage.
SecureErase does the second part without making an actual file.
Normal delete:
File: 01010101 -> no file:01010101
Secure erase:
File: 01010101 -> no file:00000000
KISSmyOSFeddit@lemmy.world 6 months ago
That’s overwriting on a HDD. secure erase on an SDD throws away the key telling the controller what 01010101 means.