back to article Flash drives dangerously hard to purge of sensitive data

In research that has important findings for banks, businesses and security buffs everywhere, scientists have found that computer files stored on solid state drives are sometimes impossible to delete using traditional disk-erasure techniques. Even when the next-generation storage devices show that files have been deleted, as …

COMMENTS

This topic is closed for new posts.
  1. Flocke Kroes Silver badge

    TRIM command a better choice than overwriting

    If you overwrite a piece of data on an SSD, the wear levelling algorithm will write the data to a block that is not full, and record that the original data is cruft to be forgoten when the block it is stored on gets moved to create free space by the garbage collector. Overwriting multiple times and overwriting the entire disk adds lots of extra wear and will eventually activate the garbage collector. The garbage collector creates a lot of internal activity within the SSD, so there will be less performance available to the host computer.

    One trim command will mark the data as cruft, and leaving the drive powered up and idle will activate the garbage collector. This method will make more space available to the wear levelling algorithm so it will be able to make better choices to prolong the life of the SSD.

    If you are concerned that the police will bang on your door, and you will have to wipe an entire SSD full of incriminating data in a hurry, check the manufacturer's web site for a tool that will re-flash the firmware. The chances are the instructions will say something like: 'Back up and test that you can restore your data before you use this tool because it will erase every block in the SSD.'

  2. Robert A. Rosenberg
    Grenade

    How About Erase Free Space?

    One thing that I do not note being mentioned in the article is doing an Erase Free Space (ie: Overwriting the blocks that are not shown in the Directory as containing files). Will that target the physical blocks that contain the old data? How about writing one large file (until there is no more Free Space) with the random data that normally gets written for a secure erase. Since I am ONLY writing to Free Space when I write the large file I should hit a new physical block each time (unlike the erase free space which MIGHT map the same physical block more than once as the backing for the logical blocks while not affecting other physical blocks).

    1. Tom 13

      OK, I get that you are too lazy to read the article,

      but aren't you at least reading the posts here? The issue is the redundancy the drive makers build into the SSD drives to ensure your 1T drive still has 1T of memory cells 10 years from now. With at least 4 times the data space as the "native" capacity and a controller in the SSD controlling which memory pieces are overwritten, there's no way for a software program to guarantee the data has been overwritten.

  3. Anonymous Coward
    FAIL

    Nothing new here, move along.

    I hate it when academics "discover" something commonly known in the industry. The issue is that the wear leveling algorithms that make it so that NAND cells which can only be written to maybe 100,000 times before they die, don''t render a flash drive useless in a day or two as the FAT can easily be written to that number fo times in days. And those wear leveling algorithms mean that while logically it appears you are overwriting a file, you physically are not.

    As EVERYONE in the flash business has known from the get-go, the only way to "wipe" a flash drive is to fill the entire drive up with randon data until it is entirely full. That is the only way to insure that all blocks were physically overwritten.

    1. GrumpyJoe
      Thumb Down

      RTFA

      It is already covered in the article, overwriting the data STILL leaves data to be retrieved.

      Am I the *only* one reading AND comprehending the articles here?

      1. adamsh
        Thumb Up

        No --- you are not alone! We proved it a year ago!

        Have a look at http://forums.theregister.co.uk/post/992361.

        Regards, HA

  4. Doug Glass
    Go

    Three Solutions

    Hammer, hammer, hammer.

    1. sT0rNG b4R3 duRiD

      Yet to try it, but...

      microwave.

      Probably a little more impressive (and possibly unhealthy for the oven).

      1. Jimbo 6

        Why not...

        ...get it ejected from the International Space Station's airlock. Should burn up nicely in the atmosphere.

        What d'ya mean, 'expensive' ?

  5. Anonymous Coward
    Anonymous Coward

    IronKey

    I use IronKey devices (ironkey.com), the best secure implementation I have ever encountered, for data which has any value.

  6. Yet Another Anonymous coward Silver badge

    @IronKey

    How do you know? Did they give you the source code? Can you compile it yourself and download it into the device?

    There was a story on here about a big name tape company that promised 256bit AES encryption on their tape drives - turns out they simply AES encrypt the password and then XORed the 256bit result with the data!

  7. C 2
    Go

    Plasma torches work well too..

    With one of these baby's you can dice a hard drive if you fancy. I know someone with a CnC plasma cutter, he opens every window, door and the big bay door when he runs it because vaporized metal is decidedly unhealthy.

    Here's a video of one :)

    http://www.youtube.com/watch?v=aFT__gESOfc

  8. John Tserkezis

    Call me old fashioned...

    ...but ancient rotating magnetic disk media is looking real good right about now.

  9. Anonymous Coward
    Grenade

    Burn it, trash it etc.

    I agree that the only solution (until someone comes up with devices that include a guaranteed self-erasure feature) is destruction. But doesn't the Weeeee! directive have something to say about how you do it? Could drop them off at the local waste transfer station, I suppose, but that doesn't seem quite right. How does the average person get access to the necessary secure and environmentally-friendly destruction faciity?

  10. Martin Huizing
    Grenade

    ccleaner has this option.

    Wipe: Entire drive.

    Simple overwrite (1 pass), DOD 5220.22-M (3 passes), NSA (7 passes) and Gutmann (35 passes)

    Anyone tried this yet? If that doesn't work, strap your stick to a hand-grenade.

    1. Anonymous Coward
      FAIL

      RTFA

      and the comments. Yes, they tried it. No, it doesn't always work. Sometimes it does, but will take a week or so to finish.

  11. copsewood
    Flame

    Funny it needed research to uncover this dirty little secret

    Interestingly I also figured this problem out myself yesterday after reading an article describing results from the independent reverse engineering of some of these devices: http://lwn.net/Articles/428584/ (warning: subscription needed until 28 Feb 2011).

    Here we have hardware being developed under closed source/trade secrecy which violates all of our previous assumptions about how storage works in relation to data cleanliness, very likely leading to loss of privacy for individuals (a human right) and loss of data which to be protected by organisations under data protection laws.

    Security by obscurity is no security at all once the cat is out of the bag. Didn't the industry creating these devices understand that customers needed to know about this dangerous inbuilt device behaviour before these devices were marketed and sold ?

    Self regulation of manufacturer behaviour didn't seem to work here, and this massive failure creates a strong argument for forcing publication of design details (circuit diagrams and source code) prior to supply, if the supplier expects to benefit from normal commercial assumptions providing legal protection (e.g. in relation to related copyrights, patents etc.).

    Another conclusion is that the only way to keep much of this activity accountable to the wider consumer and public interest is to scrap laws which restrict reverse engineering.

  12. Anonymous Coward
    Anonymous Coward

    True crypt

    I make it a standard practise to encrypt anything sensitive before putting it on a flash drive. The passwords are more than 32 alphanumeric characters long.

    Comments WRT iron key and source code, yes, absolutely.

  13. Anonymous Coward
    Jobs Horns

    virus

    just load it with thousands of viruses and chuck it in the bin, who ever finds it will have plenty of fun

  14. Ged T
    Flame

    Flash Flash drives for real...

    ...by momentarily powering them with 240VAC instead of the usual whimp-like 12v & 5v DC.

    Using a 'SSD Destructo-Harness' (TM*) - A SATA power plug, in an open-ended enclosure, with a mains lead wired to 'power' the inserted SSD. A push switch will be required, operated after drive insertion, to 'connect' the drive with some raw, alternating mains voltage power.

    Quick and secure.

    I love the smell of fried chips in the morning...

    *TM - Ged T, 2011 Pat Pending...

    1. Anonymous Coward
      Thumb Up

      Blast furnace/thermite.

      a blast furnace or thermite.

      http://www.theregister.co.uk/Design/graphics/icons/comment/thumb_up_32.png

      http://www.theregister.co.uk/Design/graphics/icons/comment/boffin_32.png

      http://www.theregister.co.uk/Design/graphics/icons/comment/black_helicopters_32.png

      http://www.theregister.co.uk/Design/graphics/icons/comment/alert_32.png

      http://www.theregister.co.uk/Design/graphics/icons/comment/paris_hilton_32.png

      Paris because some men end up with a blast furn..

    2. Anonymous Coward
      Anonymous Coward

      Doesn't work

      More likely just to burn off the power regulators or a few input capacitors..

      Now a Tesla coil on the other hand...

      1. Kanhef
        Alert

        Something like

        this: http://www.electricstuff.co.uk/esd.html

        or maybe: http://www.electricstuff.co.uk/surge.html

  15. Dr. Mouse

    Interesting

    I had not considered this from a security point of view before.

    But do drives not have an "Erase everything" now? I have heard them mentioned alot for performance reasons (i.e. as performance degrades due, you can backup, fully erase, and restore, setting the drive back to "factory" performance levels) and I was fairly sure that this performed an erase on all flash chips in the device.

    One thing I do think should be done is allow the drive to be set as a "pure" flash device, maybe using an extension to the ATA/SCSI command set. That way, these devices could be managed using traditional flash filesystems. Or something similar... I'm sure ZFS could easily be tweaked to work well on semi-raw flash. It would be nice if we were given the option, at least, to have more control below the emulated-hard-disk layer (and if drives would stop pretending to have 512b sectors, reporting the true sector size or page size to the OS),

  16. Ted Treen
    Happy

    Easy!

    Just give it to an employee of HM Gov't, and it will soon go to the limbo where countless pendrives and similar have gone in recent years, never to be seen again.

  17. Stumpy
    Coat

    Can I just be sensible for a moment...

    And suggest that maybe, the real solution is one that the manufacturers could implement? Surely, all it needs is a jumper on the drive board that instructs the electronics to perform a complete erasure of the flash chips as soon as power is applied ... y'know, like we used to have for wiping BIOS settings on motherboards?

    ... right, I'll get my coat now ...

    ... yes, that's right - it's the sensible, beige mac hanging in the corner.

    1. Ted Treen
      Pint

      Beige Mac?

      You are Sam Spade & I claim my prize...

      1. Chris Miller
        Coat

        You got a light, mac?

        No, but I've got a dark brown overcoat. (Viv Stanshall)

    2. Anonymous Coward
      Anonymous Coward

      You idiot! Here we all were, just about finished with the

      proposals so we can get our own firing ranges and explosives licenses, and you go and spoil it all by suggesting something sensible!

    3. . 3
      Heart

      Absolutely right

      It's sloppiness on the part of the SSD controller firmware that the ATA security erase command does not directly translate to an erase all pages command to each nand flash chip. The operation takes about 3-5 seconds to complete on the nand flashes I'm familiar with and every last bit can be guaranteed to have been reset to a 1 unless it is already worn out, in which case the odd zero in a sea of ones is hardly going to convey meaningful data.

      1. adamsh
        Stop

        Behaviour is correct according to ATA standard

        Have a look at the ATA standard, or at topic 4) in http://forums.theregister.co.uk/post/992361.

        Regards, HA

  18. TakeTheSkyRoad

    Hang on.... serious question here

    Ok so previous posts have established that heat works (eg. thermite) but VERY few people or companies have access to the ability to dispose of drives in such a way.

    So for myself at home how do I wipe/destroy usb drives ?

    Working and non functional since I have a broken drive which my pc no longer reconises but I'd like to "destroy" the data on the chips before I bin it. Any suggestions that don't include specialist chemical supplies, oxy torches or a furnace ?

    I think this is a much bigger issue for home users than corperate !

    1. Anonymous Coward
      Thumb Down

      You are having a giraffe?

      Use your favorite "impact adjustment" device or any "percussive maintainance" tool..

      Or just an effin hammer you plonker...

      1. TakeTheSkyRoad
        WTF?

        Ok, for the flame hungry....

        So hitting something very hard solves all problems mentioned in earlier posts and also destroys data held on the silicon ?

        I'm going to resist a sarky response and simply say that I'm not convinced you do more than bend a few pins and maybe destroy the board the chips are attached to. Yes, you're making like hard for someone but no the data isn't destroyed.

    2. Michael Dunn
      Headmaster

      Thermite

      A Thermite reaction is actually fairly easy to implement iirc - Aluminium powder, Potassium Permanganate and an inch or two of Magnesium ribbon, all available on ebay.

      1. Anonymous Coward
        Anonymous Coward

        Thermite

        You forgot the other main ingredient, iron oxide rust, in plentiful supply.

        It's also good for cracking safes, though not so good for the contents.

  19. Anonymous Coward
    Anonymous Coward

    Ok...

    I spoke to EMC, our disk supplier, about this a couple of months ago, I was curious but not really concerned because we (major UK bank) shred all our disks anyway. The EMC guy said that their arrays self-erase functionallity (as of a certain version in firmware) deal with this on their self erase. However SATA drives have their own self-erase command, this deals with proper erasure. I believe that SAS/SCSI/FC drives will be getting a proper self erase, indeed they may already have one.

  20. Anonymous Coward
    Thumb Up

    A possible solution?

    http://uk.sandisk.com/misc/secure-access

  21. Fuu Baa

    Simple Solution

    Use the same methods which allowed the researchers to recover the data and overwrite it.

    No problem.

    Unlike magnetic media, where heads can take slightly varying paths, leaving trace of previous data, we're dealing with a digital medium.

    Or, as one of the posters said - always encrypt your all drives, without the key they're random data.

  22. Anonymous Coward
    FAIL

    @GrumpyJoe

    If you bothered to read the real paper (http://www.usenix.org/events/fast11/tech/full_papers/Wei.pdf) , rather than the Register's Reader's Digest version, you'd know that:

    "First, built-in [sanitation] commands are effective, but manufacturers sometimes implement them incorrectly. Second, overwriting the entire visible address space of an SSD twice is usually, but not always, sufficient to sanitize the drive. Third, none of the existing hard drive-oriented techniques for individual file sanitization are effective on SSDs."

    So much for your "comprehension".

    Thank you for your attention.

  23. Jeff 11
    WTF?

    Insert key here

    "Wiping happens by deleting the encryption keys from what's known as the key store, effectively ensuring that the data will remain encrypted forever."

    That is absolutely NOT wiping the data. That's merely removing the encryption keys! Just because you've lost the keys to the safe doesn't mean the contents of the safe disappear. If someone can extract the data and get the correct encryption key using brute force or exploits in the key's cryptographic algorithm, then they can get the data.

  24. Anonymous Coward
    Happy

    Don't worry someone will come out with a solution

    Like encrypt the whole drive of an uncrypted ssd drive. Also put it a press and just crush it. I have seen flash drive where the chips are cracked and it no worky at all. No dangerous flames, no dangerous gases but wear a gas mask for the dust produced.

  25. adamsh
    FAIL

    Already discovered a year ago - wiping a flash device need not work

    1) Marko Rogge discovered this effect trying to wipe out an USB stick, a flash device like a SSD. He published his discovery in https://www.xing.com/net/priedb263x/sicherheit/application-layer-bio-crypto-pen-voip-uce-was-19413/verschlusselung-kann-trugerisch-sein-28202781/p0 and published a white paper http://www.marko-rogge.de/truecrypthinweis.pdf.

    2) I was able to verify this effect with older USB sticks and was able to explain this effect due to wear levelling procedures, see https://www.xing.com/net/priedb263x/sicherheit/application-layer-bio-crypto-pen-voip-uce-was-19413/verschlusselung-kann-trugerisch-sein-28202781/28223883/#28223883.

    During research against SSD the ATA command set enlightened the background:

    3) ATA command 0xf3, "security erase unit", requires only overwriting of USER DATA AREAS, cite "....When Normal Erase mode is specified, the SECURITY ERASE UNIT command shall write binary zeroes to all user data areas (as determined by READ NATIVE MAX or READ NATIVE MAX EXT). IDENTIFY DEVICE or IDENTIFY PACKET DEVICE word 89 gives an estimate of the time required to complete the erasure."

    Bingo. They just use their routines for "write sectors" / "erase sectors", writing only to "user data areas" obeying their own wear levelling strategies... See point 2) ;->

    4) "The Enhanced Erase mode is optional" and "In Enhanced Erase mode, all previously written user data shall be overwritten, including sectors that are no longer in use due to reallocation..."

    To make it clear. Only if and if a feature beyond the standard ("optional") has been implemented, AND the device driver checks against a bit pattern and sets it, the ATA-drive might indeed clear all previously written data .....

    5) To summarize it:

    Above mentioned behaviour is correct in the sense of the ATA command set.

    Everyone could have learned it if they read the data sheets and standards.

    Best, Hans Adams

  26. Paul Powell

    Surely it's about appropriate measures?

    Your security is only as good as it's weakest link.

    When I decommission HDDs I wipe the drive with random data, take it apart, score the platters, take them out, dispose of the electronics separately, and then if I don't need a new coaster I use a pair of pliers to bend the platters.

    It's possible that someone could still get data from that drive - but really, how much effort would that be? How much would that cost - just following the tracks round a warped surface that you could never flatten would be bad enough.

    It would, I suggest, be much cheaper and easier to break into my office and steal the HDDs from the running servers, or to hack in.

    On the other hand if you carrying missile plans etc then your office is probably more secure than most. In that case, destroy it. utterly.

    The thing is that most data loss (at least that which we hear about) is due to leaving unencrypted devices on trains or sending CD's through the post, or selling on old PCs without making sure that they are wiped first. Flash drives don't get decommissioned - they get lost.

    All this making sure there are no large chip fragments is rubbish except for the highest grade - if you have broken the devices electronics then you've eliminated all except those that are prepared to solder. If you break each chip then my guess is that you'd need some pretty hefty hardware along with some dedicated boffins and a large payroll to get anything out of it.

    Anyone got an idea of the technique, an approximate price list for the equipment?

    1. ted frater

      Recent destruction work

      Im lucky to have a 275lb drop forging hammer that can fall under gravity about 1 yard some 5 times a minuite. When you stop it dead in say 1/16th in ,

      It delivers some 50 tons of instant energy between 2 hardened steel heads some 5in square. Thats 10 tons a square inch.

      Ok its a minting tool and I can make pound coins on it ,thats not economic, but it is economic to flatten hard drives or SSD's crushing any chip to powder,

      I had 250 verisign terminals to destruct recently. Completely reduced to 1/4in thick. inc all plastics, circuit boards chips etc.

      customer was happy.

      Cost to destroy, £1.00 each .

      time taken 1 hour.

      Get your hard drives or SSD's to me plus payment, work guaranteed.

      Hope this helps.

      .

      1. Michael Dunn
        Headmaster

        5-inch square

        Sorry, 50 tons on a 5-inch square is actually 2 tons per square inch.

  27. Joe User

    Perfect at the target range

    Set the drive about 50 yards out and put a few high-velocity rounds through it. Good luck getting any data off it afterwards (and a great stress reliever, too).

  28. NoneSuch Silver badge
    Thumb Up

    Thermite

    Cheap and effective.

    5 star suggestion.

  29. Keith Doyle
    WTF?

    Jeez...

    It's pretty clear the confusion here is that some are talking about overwriting ALL the files on the disk, where a reformat (as long as it's not "quick") or complete sector overwrite enough times would likely do the job, and others talking about a single file erase, where all unallocated sectors would also have to be overwritten to insure wear levelled copies are hit as well. Wear levelling need not include "extra" space, only the smart reuse of the space you have. Extra space is only necessary if you expect a high failure rate. In any case, a whole filesystem erase is somewhat simpler than a single file erase.

  30. Argus Tuft

    omg

    does this mean the russian mafia could spend thousands to extract the spreadsheet of my shopping expenses for the last month...?

    my life is sooo boring I'd welcome the attention.

    (pps - hydrofluoric acid - just don't get it on you...)

This topic is closed for new posts.

Other stories you might like