Software developer since 2005, creator of the Bugfish Framework and Suitefish-CMS. Passionate about building secure, efficient, and flexible web tools with PHP, CSS, and JavaScript. Open-source advocate and documentation enthusiast. Always happy to collaborate and support the developer community.

  • 1 Post
  • 6 Comments
Joined 4 days ago
cake
Cake day: May 13th, 2025

help-circle
  • The benefit is to delete data and execute operations (as deleting logins) in emergency situations when time is a factor. The manufactures inbuilt secure erase function is definitely the better way to make your data unrecoverable, but can take more time and may not be suitable in emergency situations.

    Its not planed to add something against bad block data in bugfish-nuke, my recommendation to be safe in that matter:

    • Use the manufactures secure delete software (maybe it will detect and delete the bad blocks, no guarantees)
    • Encrypt the whole SSD, so bad blocks wont be a problem because they contain encrypted snippets.
    • If you want to get rid of the ssd drive anyway, screw it open, remove the NAND chips, smash them with a hammer in little pieces and flush it down the toilette, no one will ever recover that :)

  • Greetings

    The files are overwritten with random numbers (random bytes) for each pass. Specifically, for each overwrite pass, the method fills the file with cryptographically secure random data generated by RandomNumberGenerator.Create(). There is no sequence of different patterns (such as 0xFF, 0x00, then random) in my implementation-each pass is random data only.

    If you are interested in different overwrite patterns let me know, then i may will implement a solution to choose methods. Overwrite passes count can be set inside the software after hitting the launch button in the confirmation process.



  • Really good point. Data Deletion on SSDs and NVMEs are handled differently. (I dont really know about SD Cards but it may be similar)

    NVMA/SSD Data Deletion follows 3 Steps

    • You delete / overwritte a file (overwrite does not really mean the old content is lost on the ssd, it may be in the NAND storage)
    • The TRIM Features starts periodically and markes the data / content you deleted as erased (this functionality can be triggered by software, i will implement this trigger)
    • The problem is the last step, Garbage Collection: This will erase the data finally, and then the probability is REALLY low someone will restore it. Before garbage collection is complete, there are ways to restore with advanced techniques or help of the manufacturer.

    So best is to activate the TRIM Feature when Its implemented on the next update, but this feature will also be auto-executed by the windows system. - Best is to wait hours (its hard to know when garbage collection is finished) after the trim feature has been enabled to be sure garbage collection has deleted the content/files.

    But for security measures it still can help to delete the data, even if the garbage collection is not finished. The risk for recover depends than on how many resources the opponent is ready to acquire to get to that data. It will make the recover process difficult without special forensics software etc.

    Best and most secure way is to encrypt your data at all so none one can access even if they have the files.