



Confidential Data Not Safe On Solid State Disks 376
An anonymous reader writes "I always thought that the SSD was a questionable place to store private data. These researchers at UCSD's Non-Volatile Systems Laboratory have torn apart SSDs and have found remnant data even after running several open source and commerical secure erase tools. They've also proposed some changes to SSDs that would make them more secure. Makes you think twice about storing data on SSDs — once you put it on, getting it off isn't so easy."
How about (Score:5, Insightful)
Encrypting it?
Is taking data off really an issue anyway. If it's confidential data, destroy the disk when you need to dispose of it. Not repurposing or re-selling hardware with sensitive information on it sounds like a no-brainer.
Encryption (Score:3, Insightful)
It doesn't matter if you can get hold of ALL of the data, if it's encrypted you're fucked. Nothing to see here, move along.
thermite will fix that (Score:5, Insightful)
Thermite will fix everything! [s/fix/destroy] :-)
truecrypt (Score:5, Insightful)
Re:Treat it like any other secure system (Score:5, Insightful)
The manufacturer usually just fixes it, and sells it as a refurb / sends it out as a replacement drive for others which have failed under warranty. They just do a quick format, or sometimes even don't bother formatting, before sending the fixed drive out. Meaning the new recipient of your old drive has all your data.
Re:Treat it like any other secure system (Score:4, Insightful)
"Trust but verify"? Verification results from the exact opposite of "trust" :p You're right to verify, but saying stuff like that sounds silly..
Verification is after-the-fact. Prior to that, the vendor could still do something dishonest like fail to deliver on its promises. You're trusting them not to do that as indicated by your willingness to do business with them in the first place. Verification is an attempt to check against not only dishonesty on their part but also well-intentioned mistakes that wouldn't strictly be issues of trustworthiness.
It's sort of like when I deposit cash at a bank. If I tell them "this is 200 dollars, please put it into my account" they are going to count the money. I don't take that as an accusation that I am trying to deceive them, because it isn't. It's a standard practice because multiple pairs of eyes are more likely to catch both honest mistakes and deliberate deception. That's an example of "trust but verify".
It's not really so silly and it's far less extreme than "I want to be involved in each step of the process so I can watch your every move". That would be distrust.
Re:Nuke it from orbit (Score:5, Insightful)
TrueCrypt volume inside a TrueCrypt volume
You, dawg, I heard you liked TrueCrypt.
The headline should just read "Confidential data not safe on unencrypted disk". Modern hard drives also arean't as easy to 100% delete as one might think - once a sector gets "spared out" there's no easy way to delete it, and there will still be readible data there. That just happens a lot less frequently than SSD load/wear balancing.
Of course, any media can be adequetly destroyed by shredding - if you really care, this isn't a problem to solve with software.
Re:How about (Score:2, Insightful)
Congrats... I think you've just built a hard drive sized One Type Pad. Unless I'm missing something, this is horribly vulnerable if an attacker can "borrow" your disk at multiple snaps in time (as you are essentially reusing the one time pad everytime you delete/modify files, so the attacker can now calculate oldfile xor newfile ... if I know at snapshot one I hadn't sent you somebigimage.jpg and at snapshot two, I can basically xor my two snapshots and then xor somebigimage.jpg over all the non-zero fragments and see what file you deleted that freed up space for somebigimage (oversimplified but still and issue)