What is the safest way to securely wipe data from zfs filesystem? (beyond recovery of even expensive forensic tools)
The DoD 5220.22m Wipe solution, a method that wipes data by changing the configuration of zeros and ones stored on a device, has long been treated as a secure method to erase data from a hard disk that you want to use for another purpose. That final point is absolutely critical, as the DoD 5220.22m Wipe is not considered a secure way to erase data and adequately protect that information. While the DoD 5220.22m Wipe has emerged as a popular solution, it was originally created by the National Industrial Security Program, and it was revised back in 2006. It is a dated method that, according to a Lifewire report, is no longer permitted by the DoD, Department of Energy, Central Intelligence Agency or Nuclear Regulatory Commission.
the last one ( no. 24) survived ....Remote secure data wipe: ...
there is noneBut I was looking for more software based solutions ?
......GCHQ technicians watched as journalists took angle grinders and drills to computers after weeks of tense negotiationswww.theguardian.com
SSDs use over-provisioning to provide better endurance and reliability. When an SSD is made, it has more flash memory chips than its advertised capacity. The extra memory, which can sometimes be as much as 20% of the advertised SSD capacity, is used to balance wear across different cells (so called SSD wear-levelling) so that all memory cells degrade at roughly the same rate and no one cell fails much earlier than others. This overprovisioned space is not accessible via normal interface (SATA, SAS, or whatever) and thus cannot be overwritten at will. If one disassembles the SSD, removes flash memory chips, and reads them directly, some data may be obtained even after SSD had all its sectors zeroed. Exactly how many and what data is recovered is determined by SSD controller algorithms.I still believe 3 random drive writes is enough.
gpart. Then if someone puts the disk into a computer, it will look like a blank disk, and most people don't know how to find partitions by hand. Against an experienced computer hacker or person with storage experience, this trick will not work, and forget about law enforcement or non-existing agencies. Again, non-existing agencies probably wouldn't need to actually look at the disk: they will instead look at their archives of what you downloaded from the internet and put on the disk, or they will just break your kneecaps until you sing like a bird. Or they might be even more brutal and inhumane: Their lawyer might send you a subpoena!
I'm not even sure if Phishfry is with such an agency... I was just searching for the term STM, which he posted....
... non-existing agencies probably wouldn't need to actually look at the disk: ...
I work on CG/ACoE/NAVY/Commercial boats. Believe me I wish I had a air conditioned job.
120GB disk will produce about 1TB of statistical data from the SEM process - which we can analyse.
The ZFS advantageYou are talking about a weeks processing on 25 node cluster (100 cores).
I suspect that a RAID would foil it. For a start we would need to program in the facility to rebuild the RAID
(and analyse based on Chunks). I doubt it would work out.
We do quote a price for SEM Raid recovery but it is in the 10's of thousands - a.k.a no thanks
ZFS at that point makes no difference. It will neither help nor hinder the data destruction, you have to do it at the layer below.Mainly looking for a solution in a scenario where the data (that resides on a zfs) has to be wiped out by some trigger (remote/local). Zfs is the filesystem to be used - unfortunately I'm not sure it provides the capability to delete something securely on it due to its very nature.