Back in the field, we'd use 2 bomb with an individual yield of half a ton to dispose of classified supports. (or maybe it was just the total mass of the individual bomb. I'm an IT, not weapon techie)
Keep it encrypted from the start so when you do finally wipe it the data that remains will be scrambled to the point of being irrecoverable even with the key. (Which you might be able to assume your adversary, such as a opportunist thief probably dosen't have)
Since the flash media can't be trusted, the answer is to never have anything on it in the first place, as in always use fulldisk-encryption. The data will be meaningless without the key. This also tremendously speeds up formatting times since no full pre-writes are necessary.
Keep it encrypted from the start so when you do finally wipe it the data that remains will be scrambled to the point of being irrecoverable even with the key. (Which you might be able to assume your adversary, such as a opportunist thief probably dosen't have)
Any that uses the tried and true algorithms and doesen't try to solo things. Personally I use dm-crypt but that may not be available or convenient for you
Get a spare 12V HDD desktop power supply, cut the DC barrel off, remove a bit of insulation on each of the two wires, then plug the power supply in and use the wires to run 12VDC/1.5-2A through the NAND chips to fry them thoroughly.
Unlike what IQfy believes, you shouldn't really include any three-letter organisations in your threat model, you will not win that battle if you have no reason to fight it. That being said there is still reasons to protect your data.
>Maybe if you hit the chip directly. I'm not sure I'd trust it.
12V on 3.3V/5V circuitry? Guaranteed destruction. You know nothing about circuits, don't you?
The flash array is pretty big. You'll probably nuke the power supply, maybe some other support stuff and maybe even a few flash cells. You're almost certainly not going to completely erase it.
with rm
thermite
microwave
Back in the field, we'd use 2 bomb with an individual yield of half a ton to dispose of classified supports. (or maybe it was just the total mass of the individual bomb. I'm an IT, not weapon techie)
Keep it encrypted from the start so when you do finally wipe it the data that remains will be scrambled to the point of being irrecoverable even with the key. (Which you might be able to assume your adversary, such as a opportunist thief probably dosen't have)
cat /dev/urandom > /dev/sdwhatever
[code]
Is a good choice.
Dammit wrong slash
Thanks to wearleveling systems it's not guaranteed that the flash cells will be overwritten completely, some undetermined amount of data can remain
damn, never thought about that with flash devices. so encryption from the get go is the way to go for sure then
he doesnt know
Any worthwhile formatting program has options to set the drive to zeros.
didnt know explorer was a worthwhile formatting program
Hammer
trashcan
turn it into a bomb that destroys a laptop thast tries to use it
>put it up your ass
>go to police station
>take a shit
>flush it
It's the last place they'll look.
I'll do you one better; mail it. The postal service will make sure no sentient being ever comes in contact with it again in this universe.
Tech dweebs are shoving more things up their asses these days. It's the first place the cops will check.
Whether a tech dweeb shoves things up their ass correlates to the colour and pattern on their socks.
I wouldn't. You can buy another 128GB USB 3.1 stick for less than 10€.
cat /dev/urandom >> /dev/sdxN
Replace x with a, b, or whatever letter your USB drive is. To see what filesystems are mounted use.
mount -a
This will overwrite the drive with garbage data. Be sure that you know what you're doing.
wtf, I always used dd, never thought of using cat to do that frickin hell dd is so slow even if you get the batch size right
Since the flash media can't be trusted, the answer is to never have anything on it in the first place, as in always use fulldisk-encryption. The data will be meaningless without the key. This also tremendously speeds up formatting times since no full pre-writes are necessary.
veracrypt?
Keep overwriting it with random data until it dies, then buy another.
See
Sure, it should have the ability to use usb devices as fulldisk encrypted containers, or atleast use an encrypted file as the container.
what encryption software would you recommend?
Any that uses the tried and true algorithms and doesen't try to solo things. Personally I use dm-crypt but that may not be available or convenient for you
drill through the flash chips and throw away.
without search warrant
>dd if=/dev/zero of=/dev/sdb
with search warrant
>microwave and a boot
Get a spare 12V HDD desktop power supply, cut the DC barrel off, remove a bit of insulation on each of the two wires, then plug the power supply in and use the wires to run 12VDC/1.5-2A through the NAND chips to fry them thoroughly.
Unlike what IQfy believes, you shouldn't really include any three-letter organisations in your threat model, you will not win that battle if you have no reason to fight it. That being said there is still reasons to protect your data.
What movie is this from?
I'm pretty sure it's The Core
If you're worried about this shit just physically destroy it.
I would drop it in the volcano of mordor.
>intenso
just leave it around somewhere, it'll delete itself over time
Happen to all flash drives.
>Maybe if you hit the chip directly. I'm not sure I'd trust it.
12V on 3.3V/5V circuitry? Guaranteed destruction. You know nothing about circuits, don't you?
The flash array is pretty big. You'll probably nuke the power supply, maybe some other support stuff and maybe even a few flash cells. You're almost certainly not going to completely erase it.
Eat it