[HacktionLab] wiping phones data

mp mp at aktivix.org
Sun Nov 19 11:10:43 UTC 2023



On 11/18/23 16:55, Mick Fuzz wrote:
> Hi there,
> 
> Has anyone got any tips / links to deleting data securely.
> 
> Ideally using on linux / crossplatform tools? But open to others.
> 
> There's one article here that is almost useful!
> 
> https://www.wired.co.uk/article/securely-wipe-android-iphone-hard-disk
> 

Useful overview w/links:

https://security.stackexchange.com/questions/10464/why-is-writing-zeros-or-random-data-over-a-hard-drive-multiple-times-better-th

Specific "shred" man:

https://www.freecodecamp.org/news/securely-erasing-a-disk-and-file-using-linux-command-shred/

The a Wikipedia section to sum up:

https://en.wikipedia.org/wiki/Data_remanence

Overwriting

A common method used to counter data remanence is to overwrite the 
storage media with new data. This is often called wiping or shredding a 
file or disk, by analogy to common methods of destroying print media, 
although the mechanism bears no similarity to these. Because such a 
method can often be implemented in software alone, and may be able to 
selectively target only part of the media, it is a popular, low-cost 
option for some applications. Overwriting is generally an acceptable 
method of clearing, as long as the media is writable and not damaged.

The simplest overwrite technique writes the same data everywhere—often 
just a pattern of all zeros. At a minimum, this will prevent the data 
from being retrieved simply by reading from the media again using 
standard system functions.

In an attempt to counter more advanced data recovery techniques, 
specific overwrite patterns and multiple passes have often been 
prescribed. These may be generic patterns intended to eradicate any 
trace signatures, for example, the seven-pass pattern: 0xF6, 0x00, 0xFF, 
random, 0x00, 0xFF, random; sometimes erroneously attributed to the US 
standard DOD 5220.22-M.

One challenge with overwriting is that some areas of the disk may be 
inaccessible, due to media degradation or other errors. Software 
overwrite may also be problematic in high-security environments, which 
require stronger controls on data commingling than can be provided by 
the software in use. The use of advanced storage technologies may also 
make file-based overwrite ineffective (see the discussion below under 
Complications).

> 
> 
> _______________________________________________
> HacktionLab mailing list
> HacktionLab at lists.aktivix.org
> https://lists.aktivix.org/mailman/listinfo/hacktionlab



More information about the HacktionLab mailing list