Overwriting A common method used to counter data remanence is to overwrite the storage media with new data. This is often called
wiping or
shredding a disk or file, by
analogy to common methods of
destroying print media, although the mechanism bears no similarity to these. Because such a method can often be implemented in
software alone, and may be able to selectively target only part of the media, it is a popular, low-cost option for some applications. Overwriting is generally an acceptable method of clearing, as long as the media is writable and not damaged. The simplest overwrite technique writes the same data everywhere—often just a pattern of all zeros. At a minimum, this will prevent the data from being retrieved simply by reading from the media again using standard system functions. The
UEFI in modern machines may offer an ATA class disk erase function as well. The
ATA-6 standard governs secure erases specifications.
Bitlocker is whole disk encryption and illegible without the key. Writing a fresh GPT allows a new file system to be established. Blocks will set empty but LBA read is illegible. New data will be unaffected and work fine. In an attempt to counter more advanced data recovery techniques, specific overwrite patterns and multiple passes have often been prescribed. These may be generic patterns intended to eradicate any trace signatures; an example is the seven-pass pattern , , , , , , , sometimes erroneously attributed to US standard
DOD 5220.22-M. One challenge with overwriting is that some areas of the disk may be
inaccessible, due to media degradation or other errors. Software overwrite may also be problematic in high-security environments, which require stronger controls on
data commingling than can be provided by the software in use. The use of
advanced storage technologies may also make file-based overwrite ineffective (see the related discussion below under ). There are specialized machines and software that are capable of doing overwriting. The software can sometimes be a standalone operating system specifically designed for data destruction. There are also machines specifically designed to wipe hard drives to the department of defense specifications DOD 5220.22-M. Writing zero to each block on hard disks and SSDs has the advantage of affording the firmware to deploy spare blocks when bad blocks are identified. Bitlocker has the advantage that data is illegible without the key. Seatools and other tools can erase disks with zero which is typical to revive old consumer class disks but they can wipe server disks albeit slowly. Modern 28TB and larger disks have an enormous number of LBA48 blocks. 40TB and 60TB disks will take proportionately longer times to wipe.
Feasibility of recovering overwritten data Peter Gutmann investigated data recovery from nominally overwritten media in the mid-1990s. He suggested
magnetic force microscopy may be able to recover such data, and developed specific patterns, for specific drive technologies, designed to counter such. These patterns have come to be known as the
Gutmann method. Gutmann's belief in the possibility of data recovery is based on many questionable assumptions and factual errors that indicate a low level of understanding of how hard drives work. Daniel Feenberg, an economist at the private
National Bureau of Economic Research, claims that the chances of overwritten data being recovered from a modern hard drive amount to "urban legend". He also points to the "
-minute gap"
Rose Mary Woods created on a tape of
Richard Nixon discussing the
Watergate break-in. Erased information in the gap has not been recovered, and Feenberg claims doing so would be an easy task compared to recovery of a modern high density digital signal. As of November 2007, the
United States Department of Defense considers overwriting acceptable for clearing magnetic media within the same security area/zone, but not as a sanitization method. Only
degaussing or
physical destruction is acceptable for the latter. On the other hand, according to the 2014
NIST Special Publication 800-88 Rev. 1 (p. 7): "For storage devices containing
magnetic media, a single overwrite pass with a fixed pattern such as binary zeros typically hinders recovery of data even if state of the art laboratory techniques are applied to attempt to retrieve the data." An analysis by Wright et al. of recovery techniques, including magnetic force microscopy, also concludes that a single wipe is all that is required for modern drives. They point out that the long time required for multiple wipes "has created a situation where many organizations ignore the issue [altogether] – resulting in data leaks and loss."
Encryption Encrypting data before it is stored on the media may mitigate concerns about data remanence. If the
decryption key is strong and carefully controlled, it may effectively make any data on the media unrecoverable. Even if the key is stored on the media, it may prove easier or quicker to
overwrite just the key, versus the entire disk. This process is called
crypto-shredding. Encryption may be done on a
file-by-file basis, or on the
whole disk.
Cold boot attacks are one of the few possible methods for subverting a
full-disk encryption method, as there is no possibility of storing the plain text key in an unencrypted section of the medium. See the section
Complications: Data in RAM for further discussion. Other
side-channel attacks (such as
keyloggers, acquisition of a written note containing the decryption key, or
rubber-hose cryptanalysis) may offer a greater chance of success, but do not rely on weaknesses in the cryptographic method employed. As such, their relevance for this article is minor.
Media destruction Thorough destruction of the underlying storage media is the most certain way to counter data remanence. However, the process is generally time-consuming, cumbersome, and may require extremely thorough methods, as even a small fragment of the media may contain large amounts of data. Specific destruction techniques include: •
Physically breaking the media apart (e.g., by grinding or shredding) •
Chemically altering the media into a non-readable, non-reverse-constructible state (e.g., through
incineration or exposure to
caustic/
corrosive chemicals) •
Phase transition (e.g., liquefaction or vaporization of a solid disk) • For magnetic media, raising its temperature above the
Curie point • For many electric/electronic volatile and non-volatile storage media, exposure to electromagnetic fields greatly exceeding safe operational specifications (e.g., high-
voltage electric current or high-amplitude
microwave or
ionizing radiation) ==Complications==