Readit News logoReadit News
jsheard · 2 years ago
If you happen to find yourself destroying SSDs, try not to make this mistake: https://i.imgur.com/XBbLQEQ.jpeg
JadeNB · 2 years ago
I'm sorry to be an idiot—I can't tell if I'm looking at multiple views of one thing, or one view each of multiple things, or what. Is this just demonstrating that hard drives are commonly enclosed in oversized enclosures, so that it's easy to position the punch in a way that totally misses the actual electronics?
jsheard · 2 years ago
Those aren't hard drives, they're solid state drives in the SATA form factor which was originally designed for hard drives. SSDs are much more compact than HDDs, so the components are usually all bunched up at one side near the connectors and the rest is just air, thus punching a hole in them at random probably won't achieve anything. Punching a hole through the PCB might not destroy the data either depending on where exactly you hit it but it would at least make it difficult to recover.
rwmj · 2 years ago
I usually "dissolve" mine in a bucket of non-diet cola. Cheap & easy to source. The acid to damage electronics, and the sugar gums up mechanical parts.
greenyies · 2 years ago
SSD stores your data on flash chips.

They are coated and only the connectors are exposed.

You are not destroying anything you just make it hard to access

bee_rider · 2 years ago
Hah.

Kinda wonder what’s on there. Just because somebody didn’t want anybody to see. Probably just boring business records or something though.

nixass · 2 years ago
As someone whose job in the past was mass destruction of HDDs and SSDs (thousands on weekly basis) for a major cloud provider this is pretty much useless.

If you wanna do it efficiently on scale then something like this is much better option: https://m.youtube.com/watch?v=iqU9QSwHcNg

And for SSDs you'd want something like this: https://phiston.com/product/mediadice-ssd-disintegrator-2c/

throw0101b · 2 years ago
Basically, if you want to do something properly, look at the official 'approved list' from NIST or the NSA or someone:

* https://www.nsa.gov/Resources/Media-Destruction-Guidance/NSA...

* https://csrc.nist.gov/search?keywords=800-88

Luc · 2 years ago
This is designed for low hundreds per week and probably is priced much more reasonably for that market than what you are suggesting.
nixass · 2 years ago
You'd be surprised how much enterprises pay for Protons and Garners. For approx tripple the price (my links above) you get about 30x throughput. But I agree, not everyone needs that speed.
poikroequ · 2 years ago
I hate to imagine how much ewaste is produced from destroying these drives, rather than simply wiping them and reselling them as refurbs.
nixass · 2 years ago
If there's even theoretical possiblity to recover even a piece of customer data you're risking your entire existence. Serious companies don't wanna do that
tux3 · 2 years ago
The feasability is the same whether you crush a drive or erase it normally. A serious company would worry about the people who are inside your network reading the live drives, not campfire scare stories about drives magically remembering previous values.

Drives are extremely dense. If there were any way to store a value and still have any remnants of the old one, we would have slapped an error-correcting code on it and used that effect to double drive density.

Companies who believe in this magical spare capacity to read values that have been overwritten suffer from an entirely irrational fear. A paranoia that there is always a possibility.

The actual, non-theoretical possibility of recovering customer data is those companies being hacked by bored teenagers or everyday ransomware. Not empty drives.

beachy · 2 years ago
Some orgs crush entire computers, so crushing just the drives is at least better than that.
greenyies · 2 years ago
Never heard or seen this.

Who? And why?

Helmut10001 · 2 years ago
Better to encrypt your drives. Like ZFS encryption. No need to destroy the hardware in this case and you're also save from someone stealing the server.
verandaguy · 2 years ago
I’d say it depends on your use case.

In many compliance-heavy fields, there are specific requirements around data destruction, sometimes involving physically destroying the storage medium up to some given standard.

I’d assume this device targets that market.

qual · 2 years ago
Most data destruction compliance standards I am familiar with allow for cryptographic erasure when the device is encrypted prior to sensitive data being written to it (excluding some specific data-sensitivity levels).

If they are strict enough to not allow for cryptographic erasure (or the data is above a specific sensitivity), this device would likely not be in compliance either -- physical destruction generally requires shredding/grinding to a specific particulate size, or incineration, and this device does not appear to do either.

qual · 2 years ago
This isn't necessarily sufficient unless you encrypt the drives before any data is written to them. If any potentially sensitive data has been written to the drive prior to encryption, the only 100% method is physical destruction.

Of course, this clarification only matters if your threat model involves dealing with top-secret data and/or nation-state enemies.

Helmut10001 · 2 years ago
I don't know, personally, I would be very unhappy if someone stole my server and then starts blackmailing me to reveal private information somewhere (unless I pay a certain sum). I don't have anything to hide, but I still don't want my private information public. I don't need to mind about this with encrypted data.
rkagerer · 2 years ago
Format, then sdelete x 10 passes writing random data, then secure erase for good measure, will take care of it for 99% of use cases out there.
greenyies · 2 years ago
There is a encryption standard for ssds and the better ones do this anyway.

The boot password might be needed to be configured but it's unlocks your SSD. It's enough for the SSD to forget the AES key

SoftTalker · 2 years ago
Doesn't help the millions of unencrypted hard drives that are currently in service and will need to be disposed of eventually.
Tarq0n · 2 years ago
This reads like a press release.
tgsovlerkhgsel · 2 years ago
Yes, I'm surprised why an advertising article for a random disk crusher (with nothing special about it as far as I can tell) is on HN.

I expected this to be an hobbyist implementation, not an ad.

dbg31415 · 2 years ago
Wouldn't a standard drill press accomplish the same thing, and be a lot cheaper?
ashleyn · 2 years ago
Depending on your threat model, a drill isn't even the right tool.

This will significantly complicate data recovery and render data where the drill impacts it destroyed, but it will in theory still be possible to decap/analyse platters or nand with a SEM microscope and reconstruct data off the surviving parts of the storage medium.

The cost may not be worth it even to some state actors, but such a cost is peanuts to the NSA, CIA, or any other organisation tasked with geopolitical standing. Depending on who's after you, they may even pass it to these organisations to get the data for them at cut-rate.

Only sure-fire way is to toss it in one of those big grinders data destruction companies like Iron Mountain have. They even let you watch it go in.

rsync · 2 years ago
"Only sure-fire way is to toss it in one of those big grinders data destruction companies like Iron Mountain have. They even let you watch it go in."

This is what rsync.net does with drives that need to stop existing.

I do, indeed, watch it go in and I strongly recommend a canister respirator when entering a shredding/destruction facility.

I cannot believe the operators of these devices - which are pulverizing glass and circuitry, among other things - don't wear lung protection as they stand over the machine-turning-drive-into-dust.

To my sibling who wondered about sleight of hand:

I can only speak for the machine I take drives to but it is an immediate and brutal reaction with sparks flying and pieces flying up ... and sometimes the machine jams and they back it out and re-feed it ... there is no question as to what is occurring to that specific drive.

TeMPOraL · 2 years ago
> They even let you watch it go in.

I wonder if/when there's a data destruction company that employs professional magicians, who swap out the drives from under you at some point, while you watch "your" drive going into the grinder, never the wiser.

akira2501 · 2 years ago
> with a SEM microscope

Not so much anymore. Increasing data density and the two step nature of the technique make it much less applicable. There are newer techniques but they're more expensive and much more sensitive to the physical state of the media being scanned.

I mean this is probably why the CIA and NSA spend so much on tailored access operations and on zero day vulnerabilities instead. Not only is it easier to get the data in flight but it's much more likely to be timely for their purposes.

Gare · 2 years ago
Would thermite be enough?
tgsovlerkhgsel · 2 years ago
A drill press is more dangerous (rotating tools can get clothes/gloves/hair caught in them), and less effective.

Bending the platters is, in practice, irrecoverable due to the sheer amount of data that's impossible to read in any reasonable amount of time unless the platter can be rotated while keeping the reading tool aligned.

With a cleanly drilled hole, and some preparation (carefully machining out the area around the hole with precision tools), the platters would be a lot more suitable for partial data recovery.

rwmj · 2 years ago
Non-diet cola - sugar gums up the mechanical parts and phosphoric acid destroys electronics.
fmajid · 2 years ago
The German firm HSM makes a line of hard drive shredders: https://www.hsm-shredder.com/collections/digital-media-shred...

I’ve never tried one of these but I have one of their paper shredders and they are far better built than the usual semi-disposable made-in-China junk.

gorgoiler · 2 years ago
An awful lot of the destruction can be done with a torx screwdriver:

Step 1: take the screwdriver, dismantle the drive, and remove the platter(s).

Step 2: take the screwdriver and gouge the platters.

Step 3: take the screwdriver, lay each platter across it on the floor and stamp your foot down, hard.

Destroying the metal casing is fun but it doesn’t really do an awful lot in terms of making your bits harder to read.

tgsovlerkhgsel · 2 years ago
Destroying the metal casing means the whole disk takes about 10 seconds to destroy, and doesn't require a "stomp on a screwdriver" step that OSHA may not approve of.

Your procedure absolutely makes sense if you have a single-digit number of drives to destroy once in a while at home, not if you have to destroy dozens regularly.