News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Please advice on proper SSD data removal : OpSec | Torhoo darknet markets

Does anyone know of any methods/tools to erase all data from SSD which leaves no traces and no possibility for recovery?
You can for example use disks and low level format the SSD "Overwrite existsing data with zeroes (slow)" other techniques are the "dd" command or other disk utilities.

Be aware that any defect sectors wil not be formated. Safest method is disk destruction.
/u/ringct
1 points
1 week ago
ATA Secure Erase is also an option for SSDs supporting it. Good balance between erasure time and erasure effectiveness.
The best thing OP could do to protect the data in the first place, is to encrypt the data while storing/using them (with a good passphrase of course). This would give some peace of mind whenever a later removal of the data is necessary and the drive itself needs to be reused.
If you need to get rid of the data permanently without a chance to recover them, snap it in half and proceed with an hammer.
/u/deanonymize 🍼
1 points
1 week ago
Right. But you forgot wear leveling that's the real problem.

Even if you "zero out" or use dd, most SSDs won’t touch overprovisioned or remapped sectors. That’s where the traces remain. Firmware level garbage collection makes it impossible to guarantee full wipe with software.

If threat level is high: physical destruction is the only option. Degaussing won’t help SSDs don’t store magnetically. Disassemble, shred the NAND chips, grind or use thermite.

If low threat: full disk encryption from day one, wipe keys, then low level overwrite. Not perfect, but viable.
First, I know who you are and why you try to confuse...

1. Only trust FOSS software for deleting a SSD
2. Use native methods, users are about ensuring that data on the disk is erased, "unnecessary ware-leveling" does not matter, the storage must be erased.
3. By writing zeros and ones into the whole storage the probability for successful forensic analysis are significantly reduced.
4. The only 100% safe method is storage destruction

By using manufactory software there is no guarantees, nobody external has free access to the forensic labs where the truth are kept.
/u/deanonymize 🍼
1 points
5 days ago
You're misunderstanding my point not trying to confuse anyone.

We're in agreement on point 4: destruction is the only 100% safe method. No debate there.

Regarding wear leveling: this isn’t about manufacturer software vs FOSS. It's about how SSD firmware handles writes at the controller level, even if you're using dd or open-source tools. Overprovisioned space and remapped sectors can be untouched, regardless of how many times you overwrite the drive, because the controller decides where data physically lands.

Yes, writing zeroes reduces recovery probability, but “significantly reduced” ≠ secure under high-threat. Agencies with advanced capabilities (think IC-level) have shown partial data recovery from NAND due to this.

If the threat model is moderate to high, software wipes are not enough. Full disk encryption + key destruction is viable at lower levels, but again only physical destruction guarantees data elimination.

Let’s keep it technical. If you’ve got evidence or sources showing full user level overwrite reliably reaches all NAND, I’d be genuinely interested.
It's about how SSD firmware handles writes at the controller level
Exactly this, nobody external besides that SSD manufactory has a clue what that firmware actually do.

Therefore use a FOSS solution and if still in doubts, use the manufactory software for a final erase.

full disk encryption from day one
This is solid, any storage "spill" will be more or less useless if it's encrypted.
Turn you SSD into a dust. Disperse the dust into an ocean. Complete SSD wipeout, 0% traces/chances for recovery ensured 100%.
/u/alwaysfire
1 points
1 week ago
Encrypt the drive with Veracrypt, and an extremely long password. After it is fully encrypted, destroy the password forever. Thats as good as any erasure will get on an SSD. The DD command is not recommended on an SSD. The alternative and less secure option is to use ATA secure erase if the drive has ATA secure erase built into it by the manufacturer.