[cryptography] Reliably Erasing Data From Flash-Based Solid State Drives

Alexander Klimov alserkli at inbox.ru
Mon Feb 21 01:48:22 PST 2011


<http://www.usenix.org/events/fast11/tech/full_papers/Wei.pdf>:

  We empirically evaluate the effectiveness of hard
  drive-oriented techniques and of the SSDs' built-in
  sanitization commands by extracting raw data from the SSD's
  flash chips after applying these techniques and commands. Our
  results lead to three conclusions: First, built-in commands
  are effective, but manufacturers sometimes implement them
  incorrectly. Second, overwriting the entire visible address
  space of an SSD twice is usually, but not always, sufficient
  to sanitize the drive. Third, none of the existing hard
  drive-oriented techniques for individual file sanitization are
  effective on SSDs.

-- 
Regards,
ASK
_______________________________________________
cryptography mailing list
cryptography at randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

----- End forwarded message -----
-- 
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE





More information about the cypherpunks-legacy mailing list