I understand traditional methods don’t work with modern SSD, anyone knows any good way to do it?

  • ramble81@lemm.ee
    link
    fedilink
    arrow-up
    0
    ·
    8 months ago

    That doesn’t work with SSDs anymore. Their controllers map “bad” blocks which are put in an RO state and writes no longer go there but data still exists. There is usually a buffer of extra space so you do see the capacity loss, but if you bypass the controller you can still read the data there.

    • Greg Clarke@lemmy.ca
      link
      fedilink
      English
      arrow-up
      0
      ·
      8 months ago

      That’s fair, I can appreciate an attack vector in cases where there are bad blocks and the drive was unencrypted. Luckily bad blocks are less common with modern SSDs and assuming the disk was encrypted, a few bad blocks are unlikely to expose any contents. So knowing the number of bad blocks and what data was stored would inform if a fill and empty approach would be suitable to sanitize the drive.