In the article, Erasing drives should be quick and easy, he shows us a way to perform secure erase. Also he stated a few FUD on data recovering like:
- X-Ray machines and scanners will erase a drive;
- SEM or AFM (electron microscopy will do) could be used to recover data;
- Government or NSA can read your wiped drives;
Here's the steps to wipe a drive using hdparm utility:
- Login as root.
- Ensure the drive isn't security frozen (result shows "not frozen"): hdparm -I /dev/sda
- Issue command by set user password, Security =Maximum (Master Password = Blank): hdparm --user-master u --security-set-pass Eins /dev/sda
- Issue command to confirm the process with the the word "enabled" in the output: hdparm -I /dev/sda
- Issue the AT SE command: hdparm --user-master u --security-erase Eins /dev/sda
- Issue command to ensure output verification return "not enabled": hdparm -I /dev/sda
References:
- http://sourceforge.net/projects/hdparm/
- http://cmrr.ucsd.edu/people/Hughes/SecureErase.shtml
- https://ata.wiki.kernel.org/index.php/ATA_Secure_Erase