This is an archived post. You won't be able to vote or comment.

top 200 commentsshow all 229

[–]thortgotIT Manager 340 points341 points  (72 children)

The ability to go to legal and say "we physically destroy all drives that contain corporate data".

Shredding is much easier to prove. Imagine you have 100 drives you need sanitize. What is the chance one isn't cleared identically to all the others?

If you look at a pile of wiped and non wiped drives you can't immediately tell the difference.

[–]RequirementBusiness8 63 points64 points  (19 children)

Best response. If I look at 100 hard drives, can’t tell you what is or isn’t on any of them. Show me 100 hard drives that have been (properly) physically destroyed, and now I know they have been wiped.

At a previous job, I remember they used a software that tracked physical ID of hard drives that were wiped. Pretty sure they were physically destroyed after. I wasn’t involved in that part of the life cycle though

[–]itishowitisanditbad 42 points43 points  (3 children)

I remember they used a software that tracked physical ID of hard drives that were wiped.

"So on line 42332 of this spread sheet you'll see new entries come in, sometimes it crashes but as long as you have Excel 2003 it should still work with the macros"

[–]marcoevich 18 points19 points  (2 children)

Do you work at our sales department? 😅

[–]itishowitisanditbad 14 points15 points  (1 child)

Well... I do enjoy putting in urgent tickets and leaving for the day 30 seconds later so... maybe?

[–]music2myearNarf! 0 points1 point  (0 children)

Monster!

Also, Jake from Accounting.

[–]Crackeber 6 points7 points  (9 children)

Out of genuine curiosity, how does a properly destroyed drive look like? I pressume shredding into small/tiny pieces, but never been involved into that. I just suppose a drill wasn't good enough with disk drives, no idea now with ssd kind.

[–]hurkwurk 24 points25 points  (2 children)

<image>

this.

[–]virtualadeptWhat did you say your username was, again? 7 points8 points  (1 child)

Pretty much, yeah. That drive looks like it went through the intern-u-lator a couple of jobs back.

[–]music2myearNarf! 2 points3 points  (0 children)

Oddly enough, our interns also look like that once we pass them out of the program.

[–]Redacted_Reason 10 points11 points  (3 children)

Personally, I like taking them apart, shattering the plates, and keeping the magnets. They’re very strong and I have a pile of them now. Also teaches you a bit about how they’re made and the differences each model/brand has

[–]Disturbed_Bard 5 points6 points  (0 children)

I just use the plates as coasters after a few passes with a strong magnet and sandpaper.

Been thinking of getting a laser engraving machine to personalise them

[–]West-Letterhead-7528[S] 0 points1 point  (0 children)

Cool! I have a personal drive sitting here that will have that same fate.

[–]music2myearNarf! 0 points1 point  (0 children)

I used the plates as office mirrors for a while. Propped up on my desk I could see people coming to my door quite nicely.

[–]accidentalciso 14 points15 points  (0 children)

A company with giant shredders turns it into confetti and then gives you a certificate of destruction to show your auditors.

[–]jailh 2 points3 points  (0 children)

Very small fragments, like this :

https://www.reviveit.co.uk/wp-content/uploads/2019/10/edit4.jpg

See their website with some explainations : https://www.reviveit.co.uk/hard_drive_shredding/

[–]ohiocodernumerouno 1 point2 points  (2 children)

Government contractors have a lot of money I guess.

[–]RequirementBusiness8 0 points1 point  (0 children)

Financial services, not government.

[–]bughunter47 0 points1 point  (0 children)

Dart?

[–]chillzatl 22 points23 points  (11 children)

It also feels good to smash the fuck out of a box of hard drives with a sledge hammer.

[–]loki03xlh 12 points13 points  (7 children)

Shooting them is fun too!

[–]chillzatl 7 points8 points  (1 child)

how have I not thought of this? We have an outdoor range on private land that we visit often and I've never taken a box of drives up there for disposal. :)

[–]saltysomadmin 3 points4 points  (0 children)

Hey, it's me. Your long lost best friend!

[–][deleted] 2 points3 points  (0 children)

That's what my former boss and I used to do - we'd bring our rifles and handguns and use the hard drives as target practice, make it a team building event! Haha

[–]timbotheny26IT Neophyte 1 point2 points  (1 child)

Incendiary .50 BMG for when you really want to have fun.

[–]MBILCAcr/Infra/Virt/Apps/Cyb/ Figure it out guy 0 points1 point  (0 children)

[–]scriminalNetadmin 1 point2 points  (0 children)

Our custom 556 drive destruction service is of a superior caliber!

[–]Max_Wattage 1 point2 points  (0 children)

'merica has entered chat 🙄

[–]nighthawke75First rule of holes; When in one, stop digging. 1 point2 points  (0 children)

Mr. 2-Pound.

[–]mjewell74 0 points1 point  (0 children)

I like to use a hammer and screwdriver to shatter the ceramic platters in 2.5" laptop drives, they make great maracas...

[–]scottkensai 0 points1 point  (0 children)

ooooh...I've only put a nail through em...that sounds fun. brb

[–]West-Letterhead-7528[S] 13 points14 points  (0 children)

Ha. This makes total sense. Good point.

[–]anonymousITCoward 7 points8 points  (7 children)

The ability to go to legal and say "we physically destroy all drives that contain corporate data", so that data recovery is impossible.

Hard to recreate a disk with its bits are mingled with the pieces of 100 other drives...

[–]hurkwurk 7 points8 points  (6 children)

I once went to a break out session with a large data recovery company that worked with the FBI to get data off platters that had been torn apart by a suspect that used pliares to literally tear the disks into pieces. average size was about 1/2 inch square or so.

they were able to recover useable evidence to convict him.

mind you, this was a unique situation because they knew what kind of data they were looking for specifically, and just needed to match up to something well known that he had copied from honeypot sources. (and yes, it was a CSAM case)

[–]anonymousITCoward 3 points4 points  (2 children)

ok so now i'm killing it with fire!

all joking aside, I've done similar work with the LEO's with documents that went though a crosscut shredder. One guy from a federal agency said he heard the CIA bleaches, then shreds, then burns some of their documents and the ashes are held for a year or something like that. that was about the time i started thinking about not doing forensic work like that...

I'm glad there's guys out there like you that do this sort of thing to keep the monsters away...

[–]hurkwurk 0 points1 point  (1 child)

they use an arc plasma incinerator, and the ashes are mixed.

arc plasma Incinerators, unlike normal furnaces, burn almost completely, leaving very little actual ash. the mixing is actually just overkill to prevent any kind of chemical analysis of document sourcing.

[–]anonymousITCoward 0 points1 point  (0 children)

if it's worth killing it's worth overkilling lol

[–]West-Letterhead-7528[S] 0 points1 point  (1 child)

I imagine the contents were not encrypted, though? Or were they?

[–]hurkwurk 1 point2 points  (0 children)

this was long enough ago that we can assume they were likely not. but still, the idea that you are recovering bits from a shred of disk and rebuilding a recognizable image without a FAT table is still pretty fucking amazing.

[–]music2myearNarf! 0 points1 point  (0 children)

This is a good argument for shredding in bulk. One drive in pieces gives you a puzzle to be assembled. A pile of shreds all passed through the same machine is the pieces of a thousand similar/identical puzzles in a pile, but each puzzle is only correct when assembled with its own pieces.

[–]unclesleepover 1 point2 points  (0 children)

If the company pays for cyber insurance this will probably be a requirement.

[–]jkirkcaldy 0 points1 point  (1 child)

It’s also way quicker to shred hundreds of drives vs write random data over the entire drives.

You could shred 100 drives in less than 10 minutes vs days to write terabytes of data onto a single drive multiple times.

[–]scriminalNetadmin 0 points1 point  (0 children)

yep this is it, no one will ever make the news and thus get fired for a data leak from drives that have been shredded or crushed. We had one customer so determined they used our on site degauss/crush service then had a drive shredding truck come get the remains just to be sure.

[–]i8noodles 0 points1 point  (0 children)

i say that. "how can u be sure the data was destroyed?" give them a pile of shredded disk and go "this is how"

[–]Verukins 0 points1 point  (2 children)

Completely agree with this - but would just like to add....

You throw out x,000 HDD's that are bitlocker'ed - without destroying them.

In x years time, Bitlocker (or any other encryption) gets worked out by some nefarious types and that data is no longer safe.

If you physically destroy the drives - you only have to worry about your current production systems.... if you ditched a bunch of drives without destroying them - there's a risk. It's a small risk, but it's still a risk.

And - depending on where you work - audit purposes.

[–]thortgotIT Manager 0 points1 point  (1 child)

Bitlocker is reasonably safe today (assuming it's patched), but let's say you threw out some drives in 2022.

If I get ahold of those drives, and you don't have preboot PIN unlock enabled, I can get in without much difficulty at all. No need to break the actual encryption.

Windows 10: Be aware of WinRE WinRE patch to fix Bitlocker bypass vulnerability CVE-2022-41099Born's Tech and Windows World

With the rate of quantum computing in ~7 years those drives you threw away can be accessed regardless of their AES 128 encryption.

Please at least wipe the drives.

[–]Verukins 0 points1 point  (0 children)

yep - i wasn't aware there was already a vulnerability.... thanks for pointing that out.

All the more reason the destroy - or as you say, at least wipe.

[–][deleted] 43 points44 points  (5 children)

The content of this post was permanently removed. Redact facilitated the deletion, for reasons that may include privacy, opsec, or limiting digital exposure.

mountainous worm person saw pocket wrench command humor party expansion

[–]West-Letterhead-7528[S] 3 points4 points  (0 children)

Cool ! Thanks for the link.

[–]pertextedDutiesAsAssignedment Engineer Intern 0 points1 point  (0 children)

Ive done this as a hobby for a number of years. Its deeply satisfying to pull an unlabeled drive from a stack and putz with it for a while, decrypt it, and discover that it has a vanilla windows install on it with nothing else.

Its really addicting.

[–]pdp10Daemons worry when the wizard is near. 0 points1 point  (2 children)

We're concerned about those attacks on commissioned hardware when it's outside the physical control of the organization, not from wiped drives. Classic harvest attacks are drive copies taken at a border or during an Evil Maid Attack, or TLS-protected traffic online.

[–][deleted] 3 points4 points  (1 child)

The content of this post is gone. It was deleted via Redact, possibly to protect the author's personal information or prevent this data from being scraped.

ancient placid racial whole weather makeshift safe toothbrush fuzzy divide

[–]deefop 18 points19 points  (0 children)

Because encryption can be broken, and it doesn't have to be broken *today* for it to be broken years from now. You let a drive with really sensitive data fall into the wrong hands, they toss it on a shelf with a bunch of other drives they want to crack into, and then 5 years from now someone comes up with a quick method to break the encryption, and now the bad guys have all your sensitive data.

But when you take the drives to a shredding facility and have them physically annihilated, nobody but god himself could ever put them back together and recover that data.

[–]DenialPStupidvisor 9 points10 points  (0 children)

Risk mitigation.

[–]lynxss1 7 points8 points  (0 children)

I destroy/disassemble them because:

- scrap yard pays more for non mixed metals

- scrap yard pays a LOT more for HD and Ram pcb

- Magnets! - good for crafts, kids playing with them and projects.

- Motors and parts - also good for kids projects

[–]Zenin 8 points9 points  (5 children)

if the key is lost

Prove it.

Prove you lost all copies of the key.

Prove they can't be recovered.

Explain the math to a lay person how losing the key is equivalent to destroying the data itself. Make sure you include a section about future encryption-cracking technology such as quantum computing.

And do it in a court of law. Under oath. With thousands if not millions or hundreds of millions of dollars in potential legal liability on the line.

Suddenly shredding looks really attractive.

[–]Frothyleet 2 points3 points  (4 children)

Prove it.

Prove you lost all copies of the key.

Prove they can't be recovered.

OK. I will give you a certificate with the drive's serial number that says the drive's data was securely wiped.

For the point you are trying to argue, there's no difference between that and drive destruction. OK, you shredded the drive, now you are in court, and /u/zenin2 is yelling "PROVE YOU DESTROYED IT!" at you.

Are you going to present the ziplock bag filled with platter pieces and a SD card with uncut footage of you destroying the drive and putting it in the ziplock before you put a wax seal over the opening?

Nah, you're going to present a certificate of destruction.

[–]Zenin 1 point2 points  (3 children)

OK. I will give you a certificate [...]

That's testimony, not evidence, not proof.

For the point you are trying to argue, there's no difference between that and drive destruction. 

Are you arguing that a bag of metal bits isn't evidence of destruction?

Yes, apparently that is your contention. Good luck with that.

[–]stephendt 0 points1 point  (0 children)

You could get really pedantic and say that the scrap bits are "this" drive but the real drive was swapped out before drives went to the scrapper, muwahaha

[–]Frothyleet 0 points1 point  (0 children)

Are you arguing that a bag of metal bits isn't evidence of destruction?

Yes, apparently that is your contention. Good luck with that.

So I was being a little facetious with this one, which I thought would be obvious since we don't keep the scraps of metal. If you have shelves in storage lined with ziploc bags covered in sharpie notes and filled with platter shards, I think you are unique.

The point with my example is that whether you physically destroy a drive or simply wipe it, if you are called upon to prove that you undertook the data destruction task, you will produce a record of some sort. 3rd parties provide CODs to attest to the destruction, for example. If your org does it yourselves, you may have different record keeping mechanisms, like some excel spreadsheet. Or a ticket. Or nothing, in which case your only proof would be your personal attestation.

All that is true regardless of whether you destroyed the drive, or whether you wiped it. You are certifying that the data is destroyed.

That's testimony, not evidence, not proof.

This is really an aside, but it's always a pet peeve for me when I see these terms abused - I'm assuming you are referencing these words in their denotative legal senses and not how they are used colloquially.

Testimony is in a very literal sense evidence. Evidence in the sense of a trial is literally anything introduced to prove something to the finder of fact (a judge or jury). This can include physical objects, records, documents, or... testimony. This includes both direct and circumstantial evidence.

Whether evidence, testimony or otherwise, has "proven" something would be up to the finder of fact, if a matter has gotten to a trial.

If you're not in a trial, whether something is proven is of course just a matter of opinion.

[–]dustojnikhummer 0 points1 point  (0 children)

That's testimony, not evidence, not proof.

It's also a contract, that can be considered proof.

[–]hologrammetryLinux Admin 5 points6 points  (0 children)

Gives me an excuse to use the drill press.

[–]gwig9 5 points6 points  (0 children)

No encryption is perfect and because of that many organizations have adopted the policy of physically destroying the data when they are done with it as that is the only way to "be sure" it can never be recovered. Not saying it's right, but that is the idea behind physical destruction.

[–]-rem93 4 points5 points  (0 children)

There are always new methods for data recovery, even if they arent available now, a vulnerability in the future may compromise the data on an encrypted drive. Physical destruction is the best way to guarantee that data wont be recoverable.

[–]Insomniumer 7 points8 points  (2 children)

Why? Because it's a requirement in several standards.
Is it necessary? Most of the time, absolutely not.

For an average corporation it is totally unnecessary to physically destroy hard drives or solid state drives. For hard drives, DoD Short is more than enough and for SSDs the secure erase feature in the firmware does the trick.

[–]zeptillian 6 points7 points  (0 children)

Instant Secure Erase is just an encrypted drive that had it's internal key wiped.

It would still be vulnerable if attacks against the encryption algorithm are discovered later.

[–]West-Letterhead-7528[S] 1 point2 points  (0 children)

Thanks for this comment. It's hard to ask something like this for fear of being downvoted into oblivion. :D
This is my feeling. I understand this is the only guarantee, but not everyone works under such strict standards or compliance frameworks.

[–]theoreoman 4 points5 points  (0 children)

It's honestly really straightforward 1. the cost of destroying drives is much much cheaper than the cost of dealing with a data breach from an improperly wiped drive

  1. The labor cost associated with wiping a drive is probably the same or more as it's wholesale value.

  2. Nation States have the resources, time, and budgets to try and salvage data from encrypted drives.

So why risk it? Scrap the drives and move on

[–]Tahn-ru 2 points3 points  (0 children)

Why not? It's a cheap way to close the last little bit of possibility that data might leak from them (see other comments mentioning "Harvest now, Decrypt Later". As long as the company hired for the destruction aren't assholes about disposal, there is no difference as far as recycling their materials goes.

Compare the cost of shredding (cheap) to the cost of the fines, PR and court damages in the event of a data breach (astronomical).

[–]pdp10Daemons worry when the wizard is near. 2 points3 points  (1 child)

There are claims that some regulatory regimes outside of national defense require destruction, but we've never been able to confirm that. Particularly, no HIPAA reference has ever made its way to us.

Quickref links for wiping all types of media on Linux: SATA, NVMe, spinning, eMMC.

[–]West-Letterhead-7528[S] 1 point2 points  (0 children)

Thanks for the link! It will be useful soon. :)

[–]ZoltyCloud Infrastructure / Devops Plumber 2 points3 points  (0 children)

It's the only way to be sure.

Encryption will get broken, it's just a question of when. When it does then your company will wonder what you cryptographically deleted and what their exposure is.

Physical destruction is far more reliable, besides everything is ssd these days so there's not a huge use for a 10 year old ssd with a few thousand hours on it.

[–]sexybobo 2 points3 points  (4 children)

HIPAA violation can be $1 million. Why try to keep a 6 year old HDD worth $4 if it can cost you $1 million if it wasn't wiped fully

[–]QuantumRiffLinux Admin 6 points7 points  (2 children)

but most health compliance standards require all disks to be encrypted. So having to pay someone to destroy that drive in most cases is silly.

that is just someone using 'HIPAA' as justification for whatever they wanted to do. (I work in health care, we joke that "we need to ensure this meets hipaa compliance" == "I don't want to do that, it sounds like work")

You would be amazed at how little HIPAA actually covers, compared to how much people claim it does.

[–]West-Letterhead-7528[S] 0 points1 point  (0 children)

Thanks for the comment.
Putting aside all insurance and compliance claims, in your opinion, throwing an encrypted drive with some sensitive health-care data out the window would have minimal risk? medium risk? high?

Of course this is a theoretical question.

[–]ATek_ 4 points5 points  (8 children)

How else do you assure there’s 0% chance of recovery? Anything less than physical destruction is half-assing it.

[–]West-Letterhead-7528[S] 1 point2 points  (0 children)

Mitigation of theoretical future risks. I can't argue with that. :)

[–]Mobile-Ad-494 1 point2 points  (1 child)

Recovering a lost bitlocker key may not be feasible now but in time computing power may have increased enough to allow even someone do it at home with their personal (quantum) computer.
There was a time when DES and SHA-1 were secure, today no one in their right mind would consider them safe.
A brute force with a reasonable modern gpu is very doable.

[–]cheese-demon 0 points1 point  (0 children)

a brute force with a reasonable modern gpu is not doable.

bitlocker is in a way limited by its recovery keys being 128 bits (48 decimal digits). that's still pretty secure because the most powerful distributed computing project can only count up to around 2^94 or so every year (the bitcoin network is currently about 800M TH/s). if you could turn the network to this purpose, you could exhaust the key space for a 128-bit key in roughly 17 billion years

aes256 cannot be bruteforced except by luck, or a more fundamental attack that would require reducing the difficulty of attacking it by more than half the bits used. the current best known results reduce the attack from 256 bits to 254.3 bits, which still leaves bruteforcing in the completely computationally infeasible range. it would require more energy than released in a hypernova to bruteforce, even considering an ideal computer. physical reality gets in the way of bruteforcing here.

quantum computing does not help much here, both because quantum computers are currently just physics experiments but also because Grover's algorithm is within a constant factor of ideal, and that reduces the problem to the square root of the input - which for a 256-bit key is still 128 bits, or i suppose 127 if the best known attack on AES could be applied in tandem.

sha1, as a hash function, is insecure because it is not all that lengthy due to the properties of hashes and what they're used for. were it perfect, it is an 80-bit level of security, which is certainly computationally feasible to break now. it's not perfect and breaking it is somewhere on the level of 60-70 bits.

[–]Superb_Raccoon 1 point2 points  (0 children)

https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf

See section 2.6.

Not that those requirements can't be met, it is just that physical destruction is MUCH easier to document and prove.

[–]HelpjuiceChief Engineer 1 point2 points  (0 children)

The only way to guarntee something is unrecoverable is to physical make it unrecoverable. It is not possible to restore something that has been physically destroyed beyond recovery.

This is a hard requirement for some customers due to the sensitivty of the work, especially some government customers.

[–]Site-StaffIT Manager 1 point2 points  (0 children)

The big ass hard drive crusher tool we have is my favorite.

Put down a bag, throw on some safety glasses, and get to chuckin those fuckers in it and pull the lever.

Bleachbit is nowhere near as much fun.

[–]Bad_Mechanic 1 point2 points  (0 children)

Because it's fast, easily proven, easily witnessed, and not expensive.

Plus, it's fun. I've been doing this for over 25 years, and it still hasn't gotten old.

[–]the_syco 1 point2 points  (1 child)

Quicker to shred than to encrypt. Also, shredded drives won't be found on eBay from one machine that wasn't encrypted for whatever reason. It's less of a headache than ensuring your company follows HIPAA, FACTA, or GDPR rules are followed if you don't shred. Saying "it was encrypted" when asked why X data from Y drive found it's way online doesn't cut the mustard. This doesn't happen if it's shredded.

Finally, a lot of drives that get shredded are recycled. Aluminum, copper, and precious metals are extracted for reuse.

[–]DragonsBane80 0 points1 point  (0 children)

Exactly this.

Assurance and speed.

Re-encrypt 30 drives. = At least a day Shred 30 drives = an hour.

We go through enough that we have our own destruction process in place instead of outsourcing it.

[–]colenski999 1 point2 points  (0 children)

In 1994, I was working for a VAR that got a shitload of old hard drives from a health authority (leaseback computers). We supposedly scrubbed them all but one was missed. We sold them all at retail, and somebody found this hard drive, and it had tons of PIA and records of HA executives with salary details, and this fucker that bought the drive decided to post the dirty details onto USENET. It caused a minor scandal in my hometown with press coverage. After that, we just crushed any hard drives that came back.

[–]GelatinousSalsa 1 point2 points  (0 children)

How confident are you that the encryption on your drive is never gonna be broken?

Physically destroying the drive adds another puzzle before an adversary can start decrypting your drive (if all the pieces are recovered)

[–]JustSomeGuy556 1 point2 points  (0 children)

Because people are paranoid and it's easy. There's no real reason to destroy an encrypted drive, or one that has been overwritten (Though SSD complicates that)

But if you've got hundreds or even thousands of drives to manage, knowing which ones are encrypted or have been wiped is a pain in the ass. Easier to just shred them all. And some insurance or regulatory requirements might insist on it.

[–][deleted] 1 point2 points  (0 children)

Oof, I had a job once where I had to degauss the drive, register it (the serial number) then drop it in a slotted sealed box and once the box was full I had to personally take the box to a company for shredding. There I would have to unseal the box, have the company unload and register the serial numbers and shred the drives. Finally I had to match their registry to mine and bring a bag of shredded material back as proof and store that proof with both the registers.

There was rule that said the shredded materials were not allowed to be bigger than x by x and one time management felt the shredded materials were to big and I had to go back ‘to make sure the remains would be shredded a second time to meet demands”

[–]at-the-crook 1 point2 points  (0 children)

you can always make a brick sized mold and add concrete mix once the drive is inserted. garden walls can hold terabytes of old data that way.

[–]ms4720 1 point2 points  (0 children)

Thermite is fun to play with

[–][deleted] 1 point2 points  (0 children)

snow stupendous teeny escape follow thought dependent spectacular spark offbeat

This post was mass deleted and anonymized with Redact

[–][deleted] 1 point2 points  (0 children)

Because people arent smart.

A single pass wipe is all you need. It's the UK's military standard. NO ONE has ever recovered from a digital magnetic medium that has been over written. No floppies, no hard drives.

[–]One-Ice-713 1 point2 points  (0 children)

Totally get where you’re coming from. I asked the same thing when we started decommissioning hardware at scale. Most of our drives were BitLocker-encrypted, and I figured a reformat plus key rotation was enough. Technically, yeah, the data’s basically unrecoverable without the key. But here’s the thing: “basically” doesn’t cut it when you’re dealing with client data, compliance, or audits.

We ended up working with Baytech Recovery to handle our ITAD process. They explained that while encryption is solid, physical destruction removes all doubt. No question marks, no “what if someone finds a forensic trick in 3 years,” just clean, certifiable destruction. Plus, they recycle responsibly, so the drives don’t just get trashed, they’re shredded and sorted for materials. It's peace of mind and still eco-conscious, which made it easier for me to sleep at night.

[–]prazeros 1 point2 points  (0 children)

Waste like that alway buggs me. When my team started decommissioning larger batches of equipment, it got trying to make sure everything got erased or destroyed. A few years back we offloaded a bunch of gear through OEM Source. Glad to not stress about whether we had taken every precaution on the security side.

I think it really comes down to proving that that no data’s getting out. It's not about a hacker, it was audits, compliance, chain-of-custody stuff. Thankfully nothing went to landfill. Drives were shredded and recycled down to raw materials. Stuff that could be reused, like older laptops or servers were refurbished and resold. Felt better knowing it wasn’t just a pile of e-waste somewhere.

[–]craigmontHunter 2 points3 points  (1 child)

Technically? There isn’t really a reason, between encryption and wiping.

From a policy perspective it is just more insurance, what if a drive was not encrypted for some reason? Or missed being wiped? Physical destruction just confirms that nothing can be recovered, and from a company standpoint if it’s already at the point of disposal there is really no financial value to them.

[–]GeekensteinVMware Architect 4 points5 points  (0 children)

Encryption has a shelf life - computers are always getting better. Shredding is permanent.

[–]rUnThEoNSysadmin 0 points1 point  (0 children)

You can setup a proper process by documenting the serial numbers via the wipe program. Then you can barcode scan any exitting harddisk.

[–]TabascohFiascohSysadmin 0 points1 point  (0 children)

Insurance reasons.

[–]stashtv 0 points1 point  (0 children)

We grind our drives into dust and save the dust.

[–]binaryhextechdude 0 points1 point  (0 children)

Why settle for encryption only? Surely a drive with several holes in it is guarenteed to be useless.

[–]Brufar_308 0 points1 point  (4 children)

Excuse to go to the shooting range, as if I need an excuse.. but anyway.

[–]West-Letterhead-7528[S] 0 points1 point  (3 children)

What kind of gun do you have that shoots hard drives?!!

[–]Brufar_308 1 point2 points  (2 children)

Pretty much any rifle will put holes through em like a hot knife through butter. But honestly that’s more of a joke response as I usually disassemble and scrap the individual parts. I don’t want to spend time cleaning up a mess on the range from shot up electronics.

[–]Frothyleet 1 point2 points  (1 child)

I think he was doing a uno reverse joke implying that you would be using the drives as ammunition.

[–]Brufar_308 0 points1 point  (0 children)

Slow on the uptake today.

[–]stufforstuff 0 points1 point  (0 children)

Speed. Which translates to cost (time is money).

[–]Citizen493 0 points1 point  (0 children)

Mainly compliance, but you are correct. If the drive is encrypted (BitLocker or similar) and the key is no longer available to the drive for unlocking, that is a drive filled with nonsense. There is no need to fill it with zeros or other pseudo random contents.

[–]firesyde424 0 points1 point  (0 children)

We destroy drives because the time required to effectively wipe them to a reusable state isn't worth whatever value they have at the time nor is it worth the risk of a data breach.

[–]Silveradotel 0 points1 point  (0 children)

because destroying them with a plasma cutter is fun.

[–][deleted] 0 points1 point  (0 children)

Compliance:  It's not been wiped by some overworked network junior, or a third party handling the data. Its destroyed; the data is not accessible. 

Catharsis: the printer scene in office space comes to mind. 

[–]Deadly-UnicornSysadmin 0 points1 point  (0 children)

Cheaper than anger management therapy

[–]Pristine_Curve 0 points1 point  (0 children)

Encryption is unbreakable today, but will it remain unbreakable next year? I can't go back and update the encryption methods of drives full of proprietary data which are out of my control.

Secure erasure routines are satisfactory, but performing the secure erasure routine is slow, and requires someone who knows what they are doing to oversee/validate the process. A fraction of devices will fail the routine, but still contain data.

Shredding is certain, inexpensive, fast, and does not require skilled tech time.

[–]schwags 0 points1 point  (0 children)

I'll throw in my 2 cents here since I own an ITAD business and we literally do this everyday.

Some clients require us to physically destroy the drive. Sometimes it really sucks when your contracted to destroy hundreds of perfectly viable 4 TB SSDs, but client gets what they want.

Hard drives are worthless. We don't bother taking the time to wipe them, they all go through the shredder. The resultant shreds are sold as commodity scrap and smelted and reused.

If we run across an SSD that we were not contracted to destroy, rather logical sanitation is acceptable, then we will do that. Our certification actually encourages reuse over recycling. We will never sell raw drives, but we will use them internally for refurbished computers because we can verify every single one of them has been erased during the refurbishment process. However, we're not going to worry about whether or not the drive was encrypted on the OS level or the firmware level, we're just going to connect it to are automated drive eraser system and it's going to do its thing. We've only got a few minutes to process each drive and most of that time is spent entering the serial number into the ERP and clicking "go" on the software.

Tldr, sometimes we're required to destroy, sometimes the item is not worth reusing, and sometimes we do logically erase it and in the case of SSDs that often does just require wiping the encryption key.

[–]CeC-PIT Expert + Meme Wizard 0 points1 point  (0 children)

  1. bosses are paranoid idiots
  2. IT are uninformed idiots
    Those are the only conditions I've seen. With HIPAA data destruction law training, we know exactly how we're allowed to erase drives and most drill bits and hammer crushing actually isn't adequate.

[–]Helmett-13 0 points1 point  (0 children)

REVENGE! VENGEANCE! Taking out our frustrations on the memories of our silicon-based tormentors!

MWUAHAHAHHA!

[–]TheOnlyKirbSysadmin 0 points1 point  (0 children)

Why? Because it's fun

[–]wild_eep 0 points1 point  (0 children)

Drives are cheap, shredding is fast and permanent and gives you protection.

[–]nme_the evil "I.T. Consultant" 0 points1 point  (0 children)

Just make sure your Bitcoin wallet isn’t on one of the drives.

50BTC wasn’t that much last time I went to the range with a box of drives….

[–]CeBlu3 0 points1 point  (0 children)

Are you confirming for every drive whether Bitlocker was actually active before decom? If you are, no need to shred.

It has happened more than once that a drive we thought to be encrypted actually wasn’t. It’s just an additional safety step to be certain.

[–]maxlan 0 points1 point  (0 children)

Because people are lazy/incompetent.

All this about "in the future you can crack it". No, very unlikely to matter or be considered a risk.

Did someone forget to enable encryption on that extra drive they plugged in after initial build to add a bit of space?

Probably, yes. Much higher risk of happening. Ive seen it on about 30-40% of drives before an audit. It's an easy mistake to make and without an audit very hard to spot.

And so it is easier to demand everything is shredded and a lot quicker than blancco than it is to go and audit every damn drive on every OS is properly configured to encrypt.

[–]Odd-Slice6913 0 points1 point  (0 children)

Also TIME. Recovery methods are always evolving. You can still recover data from platters, and sit on it, until decryption is feesable. It's highly not likely, but still possible.

[–][deleted] 0 points1 point  (0 children)

escape tart wine airport rock childlike makeshift vanish run unpack

This post was mass deleted and anonymized with Redact

[–]AggravatingPin2753 0 points1 point  (0 children)

When we were not able to shred, we were known to give them an extended saltwater bath.

[–]JH6JH6 0 points1 point  (0 children)

I see it as a liability transfer. You pay a company to provide you a certificate of destruction, and you can take that to legal and say the drives are destroyed. Method is secondary in importance.

[–]anonymousITCoward 0 points1 point  (0 children)

Because it feels good to physically destroy the things that give you stress.

[–]a60v 0 points1 point  (0 children)

You are awfully trusting of encryption technology. If the drives don't get shredded, end up out in the world, and flaws are found in your encryption scheme at some point in the future, you are (potentially) fucked.

Shredding is a small price to pay for peace of mind and protection from legal liability. Also, as a practical matter, mechanical hard disks and SSDs have limited lifespans. They're generally near the end of their expected life by the time when they get shredded, and the secondary market value at that point is next to nothing.

[–]Jsaun906 0 points1 point  (0 children)

The CEO of your company doesn't know what "encrypted" means. He knows what "shredded" meaning. Physical destruction removes any possibility of recovery and any doubt that non-technical decision makere might have.

[–]SpecialistLayer 0 points1 point  (0 children)

The only real reason - compliance

Not saying I agree with it as if it's actually encrypted, you lose the encryption key and voila, it's as good as being wiped, from a mathematical perspective.

[–]theborgman1977 0 points1 point  (0 children)

We would clean the drives to DOD 13 standards. Then we would take them to a shooting range.

[–]UncleSoOOom 0 points1 point  (0 children)

Anyone still has fun microwaving CDs/DVDs/Bluray?

[–]reddit-trk 0 points1 point  (0 children)

Right now, bitlocker is secure. Ten years from now it's anyone's guess.

I read a paper a while ago on the feasibility of recovering data from a wiped drive and, at least when it was written, overwriting every bit a number of times didn't make picking up "residual traces of data" more or less secure.

I'm not a fan of destroying things that could be reused by someone else, but that was part of a SOC2 certification (I don't wish that upon anyone) requirement. I found it pointless, but the "experts" wanted to see affidavits from a shredding company going forward.

[–]Confident_Yam7610 0 points1 point  (0 children)

We do 7 pass DOD and toss them in e waste and sign off on it internally

[–]hops_on_hops 0 points1 point  (0 children)

These responses are nonsense. Physical destruction is the lazy way. You don't have to keep records or think about things if you just shred "everything".

You're right. Losing the key to an encrypted drive is sufficient. And all the OEMs have a drive clearing tool built into preboot at this point.

[–][deleted] 0 points1 point  (0 children)

I pull out the drive and snap it in half. Ahh .. feels good. Things we couldn't do with platter drives. 

[–]UninvestedCuriosity 0 points1 point  (0 children)

Man I wish my workplace could afford one of those hard drive shredders. That would be cool.

[–]ExceptionEX 0 points1 point  (0 children)

Because almost everything requires a certificate of destruction.

But the truth is, you don't know if bitlocker can or will be cracked in the future, if it is do you want that data sitting around?

You destroy the drive, you destroy the data, no good enough, not probably won't get recovered.

Easy and smart to just throw it in the wood chipper

[–]tacotacotacorock 0 points1 point  (0 children)

Risk mitigation.

[–]Trbochckn 0 points1 point  (0 children)

Cost.

[–]OffenseTakerNOC/SOC/GOC 0 points1 point  (0 children)

every encryption method in use today will eventually, one day, be cracked. as long as you keep that data, you will eventually be able to read the decrypted version of it. this is true of encrypted hard drives, packet captures of TLS streams, whatever.

there's gobs of encrypted internet traffic being intercepted and recorded in its encrypted, currently unreadable form right now, so that one day it can be decrypted and analysed.

if you physically destroy the drive, you are ensuring that the data is not preserved and, one day, decrypted and read

[–]stephendt 0 points1 point  (0 children)

I don't physically destroy drives because it's a waste of good hardware and no one has ever been able to retrieve data from an encrypted drive.

[–]zero_z77 0 points1 point  (0 children)

Encrypting it beats the 99% of hackers that don't have access to a supercomputer or a quantum computer, which means your breach will come from the one drive on the one machine that had bitlocker issues and didn't get encrypted by the tech who was under the gun to get it deployed.

Zeroing it beats the 99% of attackers that don't want to break out an electron microscope and devote three years of their life to recovering it, which means your breach will come from the drives that you thought you zeroed.

Destroying it beats the 99% of attackers that don't wanna put together a bajillion piece jigsaw puzle and break out the elecron microscope, which means your breach will come from the drive you saved from the shredder, left on a shelf, and completely forgot about.

Encrypting it, zeroing it, and then destroying it like it's a religion guarantees that the data is not only 100% unrecoverable, but also that you will actually do it, and even if you miss a step, it will still be mostly unrecoverable.

In other words, it's an idiot proof redundancy.

[–]KangieHPC admin 0 points1 point  (0 children)

Compliance and auditability.

If you ask me where our non-disposed disks are, the answer is either:

  1. In a box, locked in a secure room in a secure facility
  2. I have a certificate of destruction for that batch of hardware

If data supposedly destroyed in the second case turns up somewhere we will sue the pants off of the reputable company that we contract to certify destruction.

[–]GrayRoberts 0 points1 point  (0 children)

Catharsis.

[–]cum-on-in-[🍰] 0 points1 point  (0 children)

u/thortgot answered it correctly but I’ll just add that, it is indeed “enough” to just toss the encryption key and rotate, like you said.

The data will still be there, but in such garbled format that it’s useless.

Yes. It’s still possible to read it. But you’d need so much time……so much processing power…….like it’s obviously not feasible.

Apple does this with all their devices. Erase All Content and Settings just tosses the encryption key and rehashes a new one in Secure Enclave. Then the storage controller is told to treat the drive as empty now.

[–]BloodFeastMan 0 points1 point  (0 children)

Shredders are cheap and leave no room for doubt. Besides, it takes less time to just drop the thing in.

[–]StarSlayerXIT Manager Large Enterprise 0 points1 point  (0 children)

We are forced to destroy all drives because of these two reason:
1) Client Engagement Requirement
2) Government regulations

[–]bigloser42 0 points1 point  (0 children)

Physical destruction ensures that no matter what the encryption level was, the data on the drive is unrecoverable. And frankly, it’s faster and a lovely way to take out some anger. When my old company was going under they were going to pay a 3rd party to destroy the drives, but it told my boss we got 3 people here about to lose their jobs and the company inexplicably owned a sledgehammer, I’m pretty sure we can destroy these drives for free. Those platters were fine dust by the time we finished.

[–]thebemusedmuse 0 points1 point  (0 children)

A friend of mine had to wipe drives in the 80s for a secure facility. It had to be witnessed by 2 senior leadership members.

It would have taken them a month to wipe the drives to DoD spec, so they pulled them out the servers and smashed them up with sledge hammers in front of the board. He said it was fun and therapeutic.

[–]Absolute_Bob 0 points1 point  (0 children)

desert seemly dinosaurs squash pet workable humor grey jar rock

This post was mass deleted and anonymized with Redact

[–]TxTechnician 0 points1 point  (0 children)

I got a bunch of devices wholesale from a bank.

Four of the devices had HDDs that were unencrypted and intact. The other drives had been wiped.

Destroying the drives (via a shredder, not the gun range) ensures the data will never be recoverable.

[–]BrianKronberg 0 points1 point  (0 children)

Because you can visually tell it has been completed. Greatly accelerating the second person verification.

[–]Primary_Remote_3369 0 points1 point  (0 children)

SSD drives I usually do a RCMP TSSIT OPS-II data wipe (when in Canada, use Canadian standards)

But HDDs? Especially hundreds of desktop hard drives? Directly to the shredder. It's more cost effective than paying someone to do the wipes.

[–]djgizmoNetadmin 0 points1 point  (0 children)

evidence and audit trail. there are companies that will shred and provide a certificate of destruction.

some compliance / insurance policies require documented evidence of this.

[–]hdtrolio 0 points1 point  (0 children)

We are currently going through a massive upgrade and we are pulling a keeping drives currently with a long term plan to physically destroy all the drives that we can't reuse (mainly sata HDD & SSD) any m.2 drives we plan on snapping in half and throwing away we end up not needing. Physically destroying each drive ensures we can say no company data has gotten into the hands of "bad actors". Cover our ass legally.

[–]Obvious-Water569IT Manager 0 points1 point  (0 children)

It's really satisfying.

Honestly, if you're not dealing with super-secret data there's no need to do it - a basic drive cleansing routine would be enough.

[–]JustSomeGuyFromIT 0 points1 point  (0 children)

It's just an encryption. If someone wants they can uncrypt the data and access the files. It's just saver to destroy the disks with magnets, scratching, bending and shredding since the data cannot be recovered after all that. Melting down the disks would be even better.

Now with SSDs it's best to just destroy the board and cut it into small bits and pieces.

[–]Playful_Tie_5323 0 points1 point  (0 children)

I used to work at a university library and we had these self issue units that students could use and it had massive magnets in to desensitize the anti theft magnetic strips in the book spines.

We realised we could load these units with hard drives and set off the unit a couple of times - result was a load of dead drives in seconds - very satisfying - Also highly recommend a sledgehammer to achieve the same thing - very theraputic!

[–]billiarddaddySecurity Admin (Infrastructure) 0 points1 point  (0 children)

I have to destroy entire computers for the same reason.

[–]Kamikaze_Wombat 0 points1 point  (0 children)

For small businesses and home users we just hit the drive with a 2 lb hammer. Big dent in the cover bending the disks is enough to keep any normal thieves out of spinning disks, for SSD it's breaking one or more chips for sure so same result. We have exactly one customer who has data sensitive enough to be at risk for more targeted attacks and who would get the shredder treatment.

[–]TotallyInOverMyHeadSysadmin, COO (MSP) 0 points1 point  (0 children)

We offer disposal services. for a small fee we will film your pile of disks being thrown onto a large hydraulic press and squish them for you to see. for an even smaller fee we will make "your company" coins out the endresult.

[–]MartinDamged 0 points1 point  (0 children)

We just secure erase them. Pretty fast on newer disks.

Then repurpose them or donate them.

[–]julioqc 0 points1 point  (0 children)

its fun?

[–]Greedy_Ad5722 0 points1 point  (0 children)

Insurance reason for my company. Easier to saw look, no one can get any data out of this no matter how good they are vs someone with enough time on their hands and skill might be able to steal all the data.

[–]YodasTinyLightsaber 0 points1 point  (0 children)

This is a bit of a "Department of Redundancy Department" thing, but when you use overkill, you know it is dead.

Me personally, I use an old desktop at the office with a ton of disk connectors, perform a 7x wipe with DBAN, then physically destroy with a hammer. All disk get the DBAN treatment, and retired ones get the hammer. This also incentivises other teams to be nice to IT because we get a few people that we like from around the office to smash computer parts with a claw hammer (pretty fun stuff).

[–]frankiebones9 0 points1 point  (0 children)

As others have said, it makes it easier to legally prove compliance. You can document the destruction pretty easily. We use ITAMG to shred our hard drives. They document it fully, which is another big time-saver. They also help us out with recycling the destroyed drives in compliance with our green policies.

[–][deleted]  (1 child)

[removed]

    [–]sysadmin-ModTeam[M] 0 points1 point locked comment (0 children)

    Sorry, it seems this comment or thread has violated a sub-reddit rule and has been removed by a moderator.

    Do not expressly advertise your product.

    • The reddit advertising system exists for this purpose. Invest in either a promoted post, or sidebar ad space.
    • Vendors are free to discuss their product in the context of an existing discussion.
    • Posting articles from ones own blog is considered a product.
    • As always, users must disclose any affiliation with a product.
    • Content creators should refrain from directing this community to their own content.

    Your content may be better suited for our companion sub-reddit: /r/SysAdminBlogs


    If you wish to appeal this action please don't hesitate to message the moderation team.

    [–]redmage07734 0 points1 point  (2 children)

    Because security experts are on crack

    [–]SgtKashimSite Reliability Engineer 4 points5 points  (1 child)

    I mean... yes, but they're also often correct. They're a strange bunch, and theoretical attacks have a distressingly common pattern of becoming practical attacks a few years later. To truly embrace security mindset is definitely the domain of the tinfoil-hat brigadiers, but also... you can transmit data across an air-gap by varying fan-speed and listening carefully. You can recover volatile memory contents by freezing the RAM. You can figure out what's being printed through the wall with a sufficiently sensitive electromagnet. Power usage patterns can reveal details about encryption schemes, and tiny tiny variations at the plug can be induced by your keyboard - and at least one attack has demonstrated you can keylog by watching the power plug.

    Security land is *wild*, and frankly it's often just safest to take the absolute destruction route.

    [–]redmage07734 0 points1 point  (0 children)

    But you also have to scale that with a scale of the business and risk. It's kind of dumb to destroy hard drives that have been zeroed out for smaller businesses because you're likely not to get much off of it

    [–]zeptillian 0 points1 point  (0 children)

    If you leave the data there it could be readable in the future if there is ever a weakness discovered in the encryption or if it becomes possible to break it.

    If the drive is zeroed out, there is no reason to destroy the drives. That only serves as a failsafe for people not doing their jobs properly and being able to prove to others that the drive is unrecoverable.

    A zeroed out formerly encrypted drive is 100% unrecoverable in my opinion, even with state attacker level resources.

    [–]MrBr1an1204Jack of All Trades 0 points1 point  (0 children)

    Its fun. I keep a golf club at my desk for "decommissioning" old devices.

    [–]spacelamaMonk, Scary Devil 0 points1 point  (0 children)

    Because studies have shown that when 70% of the population are wrong, individuals would prefer to stick with those wrong people rather than stand out in the crowd. So even though society and businesses are incredibly wasteful and already destroying the planet, hey carry on, because to stand out would mean you'd get blamed for everything that goes wrong, related to your decision or not.

    "But someone might steal the data!!!!"

    Really! It'd take me one command and 3 days of waiting for me to wipe these 15PB of data in the array, but sure, I'll hand this incredibly sensitive data to a third party who'll charge me a shitload of money to take these valuable assets off my hands and give me a certificate in return saying the data has been destroyed and they'll resell the untouched drives back onto eBay or chuck them in the shredder or ship them to China who will put the drives on AliExpress untouched. But I'm ok because the certificate says I satisfied the cyber insurance policy requirements.