purge SSDs are the antithesis of|
ideal consumer / enterprise drives
they are designed to defeat
forensic data recovery.
September 2018 -
Sanitizing sensitive SSDs using a mobile physical shredding service was
mentioned in the news pages of as a follow up to an article
about data recovery which said "Is there an opposite concept to data
recovery? Yes. The flip side to data recovery is fast purge SSDs and disk
February 2018 -
Flexxon said its GALAXY 2.5" SATA 2 SSDs for secure military grade
applications have optional built in self destruct which can perform physically
destructive protection (high voltage burnout of the internal flash chips) to
ensure data is unrecoverable within 2 seconds.
April 2016 -
Renice released a video which shows smoke emerging from nand flash chips when
self destruct is initiated in a new SSD design which includes built in self
destruct high voltage sanitization.
February 2015 - "Remotely
triggered data destruction isn't a new idea in secure SSDs - but it hasn't
really taken hold in the past due to the disruptive effect of false positives.
For those reasons Waitan's StellaHunter is triggered by 2 or more preset
conditions. Users can also choose whether the SSD should be reusable after the
secure erase or whether the SSD should have a destructive erase."
May 2013 - "Microsemi
says a full hardware-based erase takes less than 8 seconds for the whole 256GB."
2012 - "Greenliant's industrial grade SATA BGA SSDs have upto
8GB capacity, zoneable password security and fast erase."
2011 - "Foremay 's presentation discusses different approaches for
the secure erase of data on SSD's. Although key destruction of a self-encrypting
drive provides some protection and is very fast, the data remains on the drive
leaving the possibility of decryption with breakthroughs in the future. Secure
erase eliminates this possibility entirely, and can be done with a
hardware-based, one-key self-destroy disk purge in a few seconds, or a secure
erase using a one-key or software-based method in several seconds. These options
provide a range of methods to keep the data secure."
November 2010 - "RunCore
has launched the world's first CF card with fast (typically 30 seconds)
on-board sanitization functions."
August 2010 - "Foremay's
CTO, Jack Winters presented a paper - Secure Erase Options for SSDs (pdf) - at
the recent Flash Memory Summit. The paper describes the need for SSD data purge
and the 3 techniques which the company supports in its Avalanche Secure Erase
February 2009 - "WEDC's
- ZoneLoc automatically sanitizes a flash SSD to military standards - when the
device is moved outside a specified operating zone - to prevent data falling
into enemy hands. ZoneLoc has configurable features and options, including
audible warnings, programmable response times, wireless remote purging and
May 2002 - "Securing
confidential data is essential: as the damage that can be caused when it falls
into the "wrong hands" is devastating... Deleting files from a
mechanical disk does not actually erase the data as only the File Allocation
Table (FAT) is being updated but the data still resides within the disk. Some
SSD designs enable users to erase the entire disk in typically 5 seconds."
||Megabyte knew how to destroy data
|what's a military SSD?|
|What's a military SSD? |
parts of the SSD market such as where SSDs designed for one market can be
redeployed into another (for example when
technology drives are placed in enterprise flash arrays by companies like
Pure and wrapped
around by enough
software to enable
their safe use for enterprise use) you'd think that the determination of what is
a military SSD should be quick and relatively unambiguous.
So when we
ask the next question - what is a military SSD company? - That should
be even easier to decide.
I've long believed it would be useful to
compile and publish a simple frills-free list of military SSD companies which
readers could use a guide for their own follow-up research.
see more about my progress on this editorial project in my new
无限彩票app下载 page blog -
simple list of military SSD companies (how hard can it be to compile one?)
If you're seriously interested in data security in SSDs you'll already know
that encryption is simply a promise to delay access to secured data rather than
a guarantee that it will remain denied to those who shouldn't see it.
fires patent warning shot re flash destruct (SSD news - January 2017)
|There's a lot of evidence
from security companies that a worryingly high percentage of second hand /
refurbished hard disk drives bought on the open market still have readable data.
Yes they were "wiped" clean by commercially available utilities.
Yes the disks were reformated. But both processes are undoable in a matter of
|Do You Really
Need Disk Sanitizers?|
destruction of a self-encrypting drive provides some protection and is very
fast, the data remains on the drive leaving the possibility of decryption with
breakthroughs in the future. Secure erase eliminates this possibility entirely,
and can be done with a hardware-based, one-key self-destroy disk purge in a few
seconds, or a secure erase using a one-key or software-based method in several
seconds. These options provide a range of methods to keep the data secure."|
Bookmarks - secure erase articles |