ercards.blogg.se

Ata secure erase
Ata secure erase













ata secure erase

Regarding step 3, the thing about performing random wipes on SSDs is that it is only justifiable if you're trying to gain additional protection against flawed Secure Erase implementations.

ata secure erase

If you're already at the point where you're disposing of the disk, and you forgot step 1, then you're in a worse position than you could be, and this is a lesson for next time. It also causes wear on the flash cells, which is why Secure Erase exists in the first place. This is rarely justifiable in practice, and is not a safe sanitisation practice on its own due to flash wear-levelling and overprovisioning.

  • If you are paranoid, perform a single-pass random wipe over the SSD afterwards.
  • This renders the data on the underlying flash unreadable. Modern SSDs have transparent encryption at the cell level, and ATA Secure Erase simply discards the key and generates a new one.
  • Utilise ATA Secure Erase to wipe the disk.
  • BitLocker, dm-crypt) for the whole lifetime of the disk, and do not write plaintext data to it. The most effective policy to ensure safe and responsible disposal of SSDs is: This approach to data destruction is theatrical and has little grounding in reasonable threat models.















    Ata secure erase