• We should now be fully online following an overnight outage. Apologies for any inconvenience, we do not expect there to be any further issues.

Best way to destroy a harddrive's data in about 30 seconds?

Page 6 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

smack Down

Diamond Member
Sep 10, 2005
4,507
0
0
Originally posted by: ConstipatedVigilante
Originally posted by: smack Down
Originally posted by: MikeyIs4Dcats
Originally posted by: Pheran
Originally posted by: RedSquirrel
They can still crack the encryption though, we are talking FBI. Encryption will help in addition to physical destruction, but software stuff alone wont be enough.

This is not the movies, and the FBI is not magic. While I have no doubt that the FBI and NSA have some impressive forensics capabilities, cracking AES-256 by brute force is beyond the capability of the total computing power on earth.

IIRC the government has access to all the encryption cyphers commercially available.

Really, show me one court case where evidence has been introduced based on breaking strong encryption? If the CIA/FBI/etc has the ability they are not going to use it and confirm that they have that ability.

wat?

Wat??? You can only publicly use the data from breaking encryption once. Once the encryption is broken no one use it anymore.
 

Shawn

Lifer
Apr 20, 2003
32,236
53
91
Originally posted by: RedSquirrel
But what if they do find a crack in say, 10 years from now? They'll have the data. It's all crazy talk at this point, but it's best to just assume they can do it, and play it safe. ;)

Also do tin foil hats REALLY work? :p

Statute of limitations?
 

Jeff7

Lifer
Jan 4, 2001
41,596
20
81
Originally posted by: JoeKing
Buy a HD Degausser
What about salvaging the degausser out of a good quality monitor, or building your own? Rig it to a capacitor bank and an appropriate switching circuit.

Knock on the door.
Hit the switch.
Capacitor bank sends an EM blast through your hard drive.



Turns out it was only UPS at the door.

 
Oct 27, 2007
17,009
5
0
Originally posted by: smack Down
Wat??? You can only publicly use the data from breaking encryption once. Once the encryption is broken no one use it anymore.

:confused: That's like saying no one will ever use locks after the first one is picked.
 

irishScott

Lifer
Oct 10, 2006
21,562
3
0
Originally posted by: Farang
Originally posted by: skyking
30 seconds? You could empty a 9MM magazine into it, I doubt they'd have a fun time with 15 holes through it.

If feds are coming in your door and you're blasting off 9MM rounds, the data on the hard drive is probably the least of your worries.

silencer?
 

Mark R

Diamond Member
Oct 9, 1999
8,513
16
81
Originally posted by: GodlessAstronomer
:confused: That's like saying no one will ever use locks after the first one is picked.

Insititutions with very high demand for security have been known to change all the locks in their buildings, if someone can demonstrate sucessful picking, decoding of that type of lock.

It's all in the cost/benefit. Mechanical locks are expensive and difficult to replace, and potentially difficult to attack (in that it requires a physical presence at the site), and only one person can work on one lock at a time. This makes it expensive to resolve a weakness in a deployed system, but at the same time, the risk is more diffuse, as there may be other physical barriers or security measures.

In the case of electronic encryption, the speed at which you can attempt to break it depends only upon the resources you are willing to commit. Similarly, if an encryption technology is demonstrated to be vulnerable, those people with the greatest need for security can deploy something else via software updates.

 

alkemyst

No Lifer
Feb 13, 2001
83,769
19
81
Originally posted by: GodlessAstronomer
Originally posted by: RedSquirrel
Originally posted by: GodlessAstronomer
There is no known way to crack 256 bit AES, period.


... By the general public. We don't know what the FBI/goverment knows.

Now your right chances are they can't either, but you can't assume that either, don't take the chances.

Like Pheran said, the FBI isn't magic. There is no good reason to think they have a crack for AES. I tend not to believe in things for which there is not a shred of evidence.

The only thing that's stopping it from being cracked is computing power. With something like a typical windows / Linux /etc install they can target certain items and reverse code break.

They have some pretty impressive super computers.

The main thing though is no one is really using 256/AES.
 

Mark R

Diamond Member
Oct 9, 1999
8,513
16
81
Originally posted by: Gamingphreek
False - US DoD standard is to zero fill a drive 8 times.
-Kevin

That's a very old standard based on old MFM drives - these machines didn't use servo tracking heads, and as a result, the heads could slip out of alignment and result in the zeros being written off center - leaving a strip of old data that could be extracted if the head alignment was then adjusted slightly in a clean room.

In modern servo drives, with their complex PRML storage algorithms, there is virtually no 'slack' space between cylinders or, indeed, enough residual magnetisation after a zero fill to usefully reconstruct such data. Perhaps, it could be reconstructed on a patchwork basis - but it would require custom made controllers, and data processing systems.

I'm not aware of anyone having extracted useful data after a zero fill from a modern drive (multi GB). Indeed, the current teaching in modern computer forensics, is that if the data has been zeroed, it's toast. That's not to say, that recovery compnaies haven't tried and have found data on supposedly zero filled drives - there are a definitely a number of broken zero fill utitilities out there, that can end up missing significant portions of a drive - or perhaps the comp crashed, or rebooted during the zero fill, and the person supervising the fill didn't notice.
 

alkemyst

No Lifer
Feb 13, 2001
83,769
19
81
Originally posted by: GodlessAstronomer
Keep a drill with a sharp bit handy. Drill as many holes into the platter as you can in 30 seconds. If your HDD happens to be in a workshop with a drill press you could probably get 10 holes through it. A hand drill maybe 2 - 5 which is probably enough to make it damn near impossible to get any data off of it.

The FBI would mount the platters in a scope to 'read' it, not try an use the HDD intact at this point.

If the FBI is at your door and you have 30 seconds only, your data is going to be theirs more than likely.

 
S

SlitheryDee

Rig something beforehand that would inject a highly corrosive substance directly onto the hd platters at the touch of a button. You'd need your own clean environment to take the drive apart and install the apparatus, but I imagine that you could use some plastic bags and a sealed fishtank or something.
 

alkemyst

No Lifer
Feb 13, 2001
83,769
19
81
You don't HAVE to have a clean room to open a drive. My brother swapped platters in a dead HDD to the chassis of another one. He didn't continue to use it, but was able to get his data.
 

Red Squirrel

No Lifer
May 24, 2003
70,592
13,808
126
www.anyf.ca
Actually would a plasma cutter work? If the drive is external you pop the external case open take the drive run to your shop, cut it in 4 and just keep cutting until they break into your house. You'd want to have a camera so you can check who's at the door without actually going. If they see you and see that you're not opening up they'll just open fire right there and then but if they just don't hear any response they'll either figure nobody's home or its just taking you long to answer the door.

Though that thermite stuff really sounds like fun.

Another option, though way more expensive is to have a seperate building with a server where you store all your data, then a very regular looking PC that you work from. All you then have to do is disconnect all network drives and hand them the PC. Show a bit of resistance or they'll figure you have something up your sleeve by being too willing to give up that PC.

They'll power on, crack your windows/linux password, log in, and only see what looks like a very normal windows install. Keep a few non personal/confidential photos/documents though so it at least looks like an average PC. To avoid them from recovering stuff like your browser history just do all your browsing through a VNC session on the server. (you could write a script for this and store it on the network drive - deletes all evidence leading to your server, then removes drive).

They may or may not find out from this point that all your stuff is done through a server, but at least it gives you LOT of time to run a shred or what not on the server's drive, without physically destroying it, or you can still physically destroy it. (I'd do both, and trash the pieces over a period of 2 months in different places/garbages)
 

alkemyst

No Lifer
Feb 13, 2001
83,769
19
81
If the FBI were coming for you they'd do it crack of dawn coming in full force. During the MOD/LOD war this is how MOD was taken in...many still living at home. Chances are in reality you aren't getting 30 secs, you ass is probably getting woken up to a shotgun/M16 in your face.

 

Red Squirrel

No Lifer
May 24, 2003
70,592
13,808
126
www.anyf.ca
Don't they at least knock first? lol. That's pretty bad. Glad I'm not in the states, don't have to worry about that stuff. We have the RCMP but they don't really use high powered guns. Would scare their horses away. :p
 

MrDudeMan

Lifer
Jan 15, 2001
15,069
94
91
Originally posted by: Nocturnal
Originally posted by: moparacer
Well not so much the data but if you want to screw it big time so its not "plug and play" force the power connector in upside down with the machine turned on.

I seen someone do that once with a drive and it had a nice burnt smell to it after that and it was toast.....

They'd just take the platters out in a clean room and put it into another drive. Wala, data recovery is in progress.

I think you meant "Voila".
 

MrDudeMan

Lifer
Jan 15, 2001
15,069
94
91
Originally posted by: TridenTBoy3555
Originally posted by: SSSnail
Originally posted by: Dumac
Other than melting it in lava or blowing it up, nothing. Techies can recover erased hard drive data pretty easily, despite being wiped, magnetized, or other extreme methods.

Uh, no.

Let's just say I work VERY closely with digital forensics, and let me tell you it's not that easy to recover data as Hollywood made out to believe, nor it is easy to get rid of it (as suggested in popular movies by running magnets along the rigs).

In all seriousness, if you want to be a criminal and not get caught, it's very easy.

1. Open your wireless router.
2. Acquire boot CD or any of the light OS variant (Helix, BART PE, etc...)
3. Perform illegal activities in that environment.
4. ...
5. Profits?

Disclaimer, I do not condone any illegal activities that may be the results of what I post. All this information is freely distributed and easily found on Google. Tomorrow's lesson: Offshore Dynamic DNS.

This!

It is NOT easy to get all that evidence back... You put it up to a magnet or wipe it with DBAN and you are good to go. :)

lol...in your quest to sound smart in every topic you enter, you always miss the obvious stuff. You agreed with what he said and then completely contradicted his advice. Nice.
 

videogames101

Diamond Member
Aug 24, 2005
6,783
27
91
Originally posted by: Jeff7
Originally posted by: JoeKing
Buy a HD Degausser
What about salvaging the degausser out of a good quality monitor, or building your own? Rig it to a capacitor bank and an appropriate switching circuit.

Knock on the door.
Hit the switch.
Capacitor bank sends an EM blast through your hard drive.



Turns out it was only UPS at the door.

win
 
Mar 22, 2002
10,483
32
81
Hm, is there something I'm not getting here or would a fairly strong electromagnet not do the trick? Flip a switch. Data = boned.
 

Perknose

Forum Director & Omnipotent Overlord
Forum Director
Oct 9, 1999
46,873
10,668
147
It'd obviously take longer than 30 seconds, but the only SURE way to guarantee that no data could ever be recovered from your hard drive would be to drop it off at your nearest CompUSA for repair.
 

LordMorpheus

Diamond Member
Aug 14, 2002
6,871
1
0
Originally posted by: ed21x
it will spark up and burn in the microwave. The whole HD will be melted within a minute.

Have you tried that? I doubt the microwave electronics can produce enough energy to melt a hard drive in a minute. I imagine you'll ruin the electronics and break the microwave, but not actually kill the platters.

Here's another question. Isn't destruction of evidence a felony, too? How do you make it look like an accident?

And what about just using an encrypted file system. Until a supercomputer is invented, you don't have to worry about someone cracking a modern encryption scheme.

I think there was a court case somewhere that ruled that not giving up an encryption key wasn't protected by the right to remain silent.

Maybe encrypt the disk with a USB key holding the key, and destroy the key when the feds show up.
 
Sep 29, 2004
18,656
68
91
keep questionable data on CD/DVD. Shatter it to pieces and throw it on the stove i na pot (no water). DONE