@SwiftOnSecurity Wouldn't security-wise it be a better idea to destroy them and recycle the parts?
-
-
Replying to @realnzall
.
@realnzall Don't worry, Tay has a physical hard drive wiper with verification pass and optional label printer
pic.twitter.com/PgAqBKXgCH
15 replies 14 retweets 91 likes -
Replying to @SwiftOnSecurity
@SwiftOnSecurity@realnzall does that do the military wipe standard or multiple pass etc etc?2 replies 0 retweets 0 likes -
Replying to @SwiftOnSecurity
However, there is no evidence-based reason to wipe a hard drive more than one pass. That is the official U.S. government position per NIST.
10 replies 14 retweets 38 likes -
Replying to @SwiftOnSecurity
The reason hard drives are destroyed is because it's fast + easy to verify, less error-prone than doing wiping. Wiping is for internal reuse
5 replies 11 retweets 28 likes -
Replying to @SwiftOnSecurity
@SwiftOnSecurity also, iirc, data from bad sectors can in theory be recovered but can't be wiped with software?1 reply 0 retweets 1 like -
Replying to @SwiftOnSecurity
.
@srhbutts The rare problem with ATA Secure Erase is it doesn't have a reporting/transparency provision. You're trusting the drive firmware.9 replies 3 retweets 18 likes -
Replying to @SwiftOnSecurity
@SwiftOnSecurity@srhbutts you're always trusting the firmware1 reply 0 retweets 2 likes
@egyp7 @SwiftOnSecurity @srhbutts Amount of leakage is bounded by physical_storage - wiped_size if wipe data is non-compressible.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.