[cryptography] Reliably Erasing Data From Flash-Based Solid State Drives
Alexander Klimov
alserkli at inbox.ru
Mon Feb 21 01:48:22 PST 2011
<http://www.usenix.org/events/fast11/tech/full_papers/Wei.pdf>:
We empirically evaluate the effectiveness of hard
drive-oriented techniques and of the SSDs' built-in
sanitization commands by extracting raw data from the SSD's
flash chips after applying these techniques and commands. Our
results lead to three conclusions: First, built-in commands
are effective, but manufacturers sometimes implement them
incorrectly. Second, overwriting the entire visible address
space of an SSD twice is usually, but not always, sufficient
to sanitize the drive. Third, none of the existing hard
drive-oriented techniques for individual file sanitization are
effective on SSDs.
--
Regards,
ASK
_______________________________________________
cryptography mailing list
cryptography at randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography
----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
More information about the cypherpunks-legacy
mailing list