>>105578998 (OP) You can issue an ATA secure erase command and it insta-nukes all data on the SSD.
If you mean "securely wiped" like running one of those programs which overwrite the entire drive then yeah, you don't know exactly what they'll touch on a modern SSD due to wear leveling and overprovisioning.
Only on an extremely theoretical level. You might be unable to re-write a few bits out of a million, but that small amount of data will never be relevant and its readability will also be unreliable.
Anonymous
6/13/2025, 6:48:19 AM No.105579149
Also, assuming that HDDs can be securely wiped (using traditional computing means) is extremely naive. HDDs can get into "failure to write but not read" scenarios but since it doesn't have wear-leveling, those scenarios are far more likely to result in large, continuous sections of data being preserved that can be forensically scanned.
>Wear leveling makes SSD self-wiping consistently throughout normal use. >Pedophiles are still worried because cp gets overwritten with more cp since they don't use their computer for anything else.
>>105579107 some ssds already do this transparently, when you give it the secure erase command it just generates a new encryption key. its the recommended procedure before you sell your old gear.
>>105578998 (OP) Not in a way that matters. Data written to the raw NAND blocks is encrypted by the controller. This isn't FDE because it's transparent to the host but does 2 good things: 1) helps wear leveling since encrypted data has the same entropy as random data and 2) to secure erase all you do is rotate the key. So if the blocks die and you can't erase them because you can't write to them, you just rotate the key and you can't read what was there. Exfiltrating the key/its rotation algo would be juicy security targets but I've yet to hear of it happening. The old boiling water/fire still work too.
>>105581746 this has always been true regardless of the medium. op is talking specifically about wiping the data after the fact and the behaviour difference between the media types.
Anonymous
6/13/2025, 3:21:50 PM No.105581799
>glowies recommending to not encrypt your drive because the controller already does it lol, remember kids watch out for ill advice like that
>>105581799 everyone has a different threat model, it could be as simple as someone wanting to sell their hdd without some creep running a data recovery to find their family pictures and tax returns. even if the ssd uses the nsa approved curves its good enough for 99% of the population. anyone who is getting targeted by state level actors probably shouldn't be taking opsec advice from 4chan.
Anonymous
6/13/2025, 5:42:17 PM No.105582775
>>105581545 >boiling water 100C isn't going to do shit to silicon
>>105584872 I was literally never asked to do this.
Anonymous
6/13/2025, 11:28:24 PM No.105585725
>>105585123 >your own encryption Just don't. It's too easy to write stuff that you can't decrypt, but which someone else could crack easily. And no, triple base-64 encoding everything doesn't count as encryption. It counts as stupid.