I Got an Industrial Hard Drive CRUSHER! @Rack's Mobile Data Destruction System

Поделиться
HTML-код
  • Опубликовано: 19 окт 2024

Комментарии • 2 тыс.

  • @hackbustersminecraft
    @hackbustersminecraft 10 месяцев назад +2771

    I've heard of a company going so far in data secrecy that they destroyed their old monitors as they might contain traces of burn-in of sensitive data or something along the lines

    • @LinusTechTips
      @LinusTechTips  10 месяцев назад +1570

      That's next level.... - LS

    • @2afk
      @2afk 10 месяцев назад +313

      Also remember to cut the RAM in half!(Yes, I know a company doing that)

    • @MrDuncl
      @MrDuncl 10 месяцев назад +177

      The worst burn-in I ever saw on a CRT monitor was at an airport control tower, That might have been more of a problem had it been a military base,

    • @DaftknightLP
      @DaftknightLP 10 месяцев назад +29

      i just use a hammer, waaay more cathartic

    • @romanpul
      @romanpul 10 месяцев назад +100

      I remember hearing that the Nellis AFB (that‘s were Area 51 is) has a it‘s own scrapyard where all computers ever brought into the base are disposed, crushed, burned and then buried forever. No digital equipment is allowed to ever leave the premises ever again.

  • @VideoSage
    @VideoSage 10 месяцев назад +240

    Just want to say thank you, for editing in a full audio(and visual) explanation as to the crushing failure you guys had.
    Very much appreciated.

  • @nekomakhea9440
    @nekomakhea9440 10 месяцев назад +543

    it would be a lot faster and cheaper to just hand the drive to Linus and wait for him to drop it like he normally does

    • @Catsrules1
      @Catsrules1 10 месяцев назад +29

      I don't know, Linus isn't a cheap person to hire these days :)

    • @the_kombinator
      @the_kombinator 9 месяцев назад +11

      Or pay a teenager minimum wage to throw these at walls. What drives we couldn't DOD wipe, we either pierced with a drill, and when we discovered that some of the drive plates shattered, we took those drives on the top of the stairwell at our campus and dropped them 5 stories down the middle. Spectacular sounds. We even chipped the marble after like the 30th drop. The drives sounded like a musical instrument lol.

  • @TotalxTroll25k
    @TotalxTroll25k 10 месяцев назад +115

    When I was getting my Cybersecurity degree I took a digital forensics class and it is truly fascinating. Data destruction and recovery is such a cool topic and the tools that allow you to do data carving are a lot of fun.

    • @Q73POWER
      @Q73POWER 9 месяцев назад +6

      Same for me, in fact I passed my digital forensics class last month. It's amazing what you are able to recover.

    • @the_kombinator
      @the_kombinator 9 месяцев назад +2

      Fascinatingly what? Don't leave us hanging!

    • @Bangarang341
      @Bangarang341 6 месяцев назад

      How do you like cyber?

  • @Sam-J_1
    @Sam-J_1 10 месяцев назад +92

    In most larger scale applications for permanent drive / data destruction they use a shredder and conveyor system in order to feed the drives in quickly, and get just a bunch of small chunks that can be recycled afterwards. But the singular drive crusher is a cool demonstration

    • @Acorn_Anomaly
      @Acorn_Anomaly 10 месяцев назад +26

      The one advantage this system has to that is easier auditing of the physically destroyed drives. If you just have a pile of chunks on a belt or in a bucket, it's kind of hard to tell what's what.

    • @ctg4818
      @ctg4818 9 месяцев назад

      Because fire is too expensive???

    • @Lolgaming1
      @Lolgaming1 9 месяцев назад +2

      I worked in a hospital that had close to 1000 HDD's / SSD's each year that needed to be destroyed. Shredders are expensive so we just used a manual press, like the crusher in the video, but manual. SSD's were wiped using a program called Kill disk that did 13 different passes. It was a never ending task.

    • @Mastealth
      @Mastealth 6 месяцев назад +1

      ​@ctg4818 maintaining one is, has to be hot enough to melt everything, got to have extract fans for the smoke and fumes from the metals, fuel for the fire, etc. This is MUCH easier.

  • @EraYaN
    @EraYaN 10 месяцев назад +321

    Instant secure erase is also a very awesome feature for essentially most business and personal stuff. It’s essentially encryption and it throws out the key.

    • @gsuberland
      @gsuberland 10 месяцев назад +32

      One thing to be careful with here is that it's called ATA Sanitize, and "Secure Erase" is a different feature that doesn't actually employ any encryption - it simply drops the page mapping table.

    • @simon2763
      @simon2763 10 месяцев назад +8

      @@gsuberland Usually, and as per ATA specification, ATA Secure Erase should erase SSDs completely by resetting every bit, not just dropping the mapping table. What you are talking about is a simple format or deleting a partition afaik. Sure, there are maybe some wack ATA implementations out there but this shouldn't be the standard.

    • @leexgx
      @leexgx 10 месяцев назад

      If the drive is SED hdd,, the secure erase has 2 modes
      instant erase/Sanitize Cypto {default} clears protected and hidden area and resets private and public encryption keys (doesn't zero fill the drive all stored data is unrecoverable due to encryption keys reset)
      Advance secure erase same as instant erase + your normal zero fill
      For ssd's secure erase clears page table + sends a mass trim command to all nand chips (if the drive supports encryption it also resets teh private and public key) this takes usually less then 30 seconds with background garbage collection completing the zero fill via trim in the background (a couple of minutes)
      NOTE if the drive has encryption or SED support,, Regardless if you have enabled or not the password or relevant security feature, the data is already encrypted so a secure erase at stage 1 of a secure erase command has already made the data unrecoverable because it has reset the encryption keys (before hdd zero fill happens or ssd trim)

    • @gsuberland
      @gsuberland 10 месяцев назад

      @@simon2763 The specification for ATA Secure Erase was written for HDDs, and on SSDs does not mandate that all flash cells, including user-inaccessible cells used for over-provisioning and wear levelling, are wiped. What it says is that all logical blocks must be reset to zero. On a HDD that means wiping the disk. But, on flash, a logical block can be zeroed by simply marking it as free (which can be done en masse by zeroing the allocation table) so it doesn't actually make any guarantees about preventing chip-off data recovery. As such, vendor implementations do not guarantee complete erasure when using the old Secure Erase command. The language of ATA Sanitize makes the need for security in the threat model of chip-off data recovery, which typically forces vendors to implement a cryptographic method. This is also sometimes referred to as ATA Cryptographic Key Reset by vendors who want to make it clear how the operation works. If you have the option to use ATA Sanitize / Cryptographic Key Reset, always use that.

    • @Theinatoriinator
      @Theinatoriinator 9 месяцев назад

      Did you watch the video? He literally sats that at the end.

  • @Dan-Simms
    @Dan-Simms 10 месяцев назад +125

    When i worked IT in a gov building, our wipe program would 0 and 1 over the drive 13 times, then we would also take the electromagnet to them.

    • @TheMaskedHeart
      @TheMaskedHeart 10 месяцев назад +29

      I mean it's government data so understandable enough i suppose

    • @nv1t
      @nv1t 10 месяцев назад +4

      @@TheMaskedHeart i would have guessed they have a need to destroy the drives.....

    • @tedmerrick935
      @tedmerrick935 10 месяцев назад +9

      Where I work we degauss and shred. It's the only way to be sure.

    • @gsuberland
      @gsuberland 10 месяцев назад +11

      That's a very old method from a DoD standard and is very much pointless these days. Alas, data wiping utility salespeople love to tout the overkill methods.

    • @Djuntas
      @Djuntas 10 месяцев назад +2

      why not just a circular drillhead, would be fast

  • @offswitch43
    @offswitch43 10 месяцев назад +746

    Why does Linus need an expensive machine? Let him handle it for 2 minutes and he’ll drop it😂

    • @benjaminnelson5455
      @benjaminnelson5455 10 месяцев назад +10

      Not if he can't pick it up.

    • @silluete
      @silluete 9 месяцев назад +9

      We talking about dropping the machine or the hdd? Or both? Or the machine with hdd inside?

  • @insu_na
    @insu_na 10 месяцев назад +15

    I'm glad he made that last segment. My own server has 4 SED drives and it's ridiculously easy to wipe them because you really only have to erase the encryption key, and you can also do it as often as you want, to ensure that there's no "ghost" of the original encryption key still in Flash somewhere

  • @origins777
    @origins777 10 месяцев назад +37

    Linus please do a definitive video guide about prepping hard drives for resale or wiping specific data and have labs run the drives for recovery after to test best methods.

  • @TheGainsWizard
    @TheGainsWizard 10 месяцев назад +261

    If I'm not mistaken I think the current procedure for HAMR drives with high data sensitivity requirements is to use ATA Secure Erase, then shredding, then saving the shreds and sending to a secure destruction smelting/incineration facility to basically turn it into slag. I think most cybersecurity people aware of HAMR put out a moratorium banning acquisition and production use of HAMR drives.

    • @leviathan19
      @leviathan19 10 месяцев назад +32

      Damn talk about over kill

    • @furqanabid7319
      @furqanabid7319 10 месяцев назад +15

      I want those drives with more capacity. Atleast general public does. Workspace is different story.

    • @volodumurkalunyak4651
      @volodumurkalunyak4651 10 месяцев назад +29

      All of those cyber-security people can better mandate not storing any unencrypted data on HAMR drives.

    • @galacticviper4453
      @galacticviper4453 10 месяцев назад +7

      Wait, why would they ban HAMR? It sounds like it would be super awesome for cybersecurity to me.

    • @johnsmith-nn2hs
      @johnsmith-nn2hs 10 месяцев назад +24

      Flying to an active volcano sounds easier and possibly cheaper.

  • @rpmgames6058
    @rpmgames6058 10 месяцев назад +1368

    Linus, destroyer of expensive technology

    • @ultimategrr4480
      @ultimategrr4480 10 месяцев назад +35

      Lets be real, we were all watching in hopes he'd somehow drop the cart off a loading dock

    • @user-dr2pg8fk2i
      @user-dr2pg8fk2i 10 месяцев назад +11

      *Breaks the machine*

    • @AberAnderst
      @AberAnderst 10 месяцев назад +7

      Drop the machine

    • @FARLANDER762
      @FARLANDER762 10 месяцев назад +4

      By using even more expensive technology!

    • @robsquared2
      @robsquared2 10 месяцев назад +2

      Linus has left his drop stage and entered his crush stage.

  • @Blzut3
    @Blzut3 10 месяцев назад +17

    SED drives do always encrypt even if "not enabled" so a secure erase still works regardless. Locking the drive just adds another key, which protects the encryption key, to prevent the drive from being moved between machines without first secure erasing it with the PSID printed on the drive.

  • @gsuberland
    @gsuberland 10 месяцев назад +108

    Minor correction: "NIST SP 800-88", from 2006, is the original standard where the *old* recommendations came from (which was a derivative of a DoD standard), and it's the newer NIST SP 800-88 *Rev1* from 2014 that has more up-to-date standards that are relevant for modern media. The original standard was particularly unscientific and was largely written to satiate the paranoia of military types; Peter Gutmann, the guy who the ridiculous 35-pass wipe system was named after, once described the standard as a bunch of "voodoo incantations". The modern Rev1 standard is much better, with clear actionable advice around different media technologies, and even makes it clear where recommendations have been upgraded beyond what is reasonably necessary just for the sake of peace of mind.

    • @FlowPoly
      @FlowPoly 10 месяцев назад +7

      The most effective wipe method I found is by writing 2 random passes and then 2 passes of zeroes, this is also the national nuclear standard of data removal

    • @gsuberland
      @gsuberland 10 месяцев назад +20

      @@FlowPoly That is an old method and is no longer recommend or necessary. On a HDD it wastes a ton of time and unnecessarily ages the disk. A single random pass wipe is fully secure against recovery. On an SSD or USB stick, standard overwrite wipe methods (no matter how many passes you do) will not properly erase the data. The NIST SP 800-88 Rev1 standard discusses this problem in detail. On SSDs you should use ATA Sanitize (also known as ATA Cryptographic Key Reset), which is instant and causes no excess wear. This is not the same as Secure Erase, which guarantees security against simple recovery but does not guarantee security against chip-off recovery.

    • @Hanneth
      @Hanneth 9 месяцев назад

      @@gsuberland A single random pass wife if fully secure against recovery. Hahaha, very funny!
      There are a few open source projects that can recover that quite easily, not even getting into some of the more advanced options.
      There is a reason why intelligence organizations require a destruction greater than what is shown here.
      Heck, just look at 911. They were recovering information off of drives that were badly damaged and burned back then. You don't have to have much of an imagination to figure out what they can do today.

    • @RowanHawkins
      @RowanHawkins 9 месяцев назад +2

      In health insurance we did a 2T wipe. Followed by shredding to 1.5"/3-4cm size. Took about 3 minutes per 3.5" drive. They had sprung for a $15000 shredder years back. I tried to get them to go for a service when we decommissioned 960 12TB enterprise 3.5" drives.

  • @Ocelot_King
    @Ocelot_King 10 месяцев назад +46

    Nice detail addition with the failed crush. Like to see the how thoughtful y’all’ve become 👏🏻

  • @FlyboyHelosim
    @FlyboyHelosim 10 месяцев назад +40

    I bought a 2.5" hard drive from CeX a while ago that hadn't been erased. It belonged to a medical student and had all her work and personal data on it.

    • @christopheroliver148
      @christopheroliver148 10 месяцев назад +3

      I've had a trash picker friend give me dumpster computers that have had _interesting_ stuff on them.

    • @forbiddenera
      @forbiddenera 10 месяцев назад +3

      I got a "laptop" from 85 with a half dead disk with personal data on it. Imagine the guys surprise when I msgd him on Facebook telling him I came across his 1988 resume.

  • @Flightcontrol96
    @Flightcontrol96 10 месяцев назад +140

    I had 2 dead 2.5" SSDs on hand a few weeks ago. I opened them up and used some snips to cut the chips into small shards. Kinda cathartic in a weird way.

    • @bmxscape
      @bmxscape 10 месяцев назад +20

      when i was in highschool me and my friends did some bad things and ended up putting our hard drives on train tracks and burying the pieces lol

    • @haydenkincaid5959
      @haydenkincaid5959 10 месяцев назад +28

      @@bmxscapefriendly reminder that you have digital footprint😅

    • @kakurerud7516
      @kakurerud7516 10 месяцев назад +1

      metal cantering punch will make short work of chips.

    • @macking104
      @macking104 10 месяцев назад

      That takes time... this machine munches faster and destroys drive..

    • @Flightcontrol96
      @Flightcontrol96 10 месяцев назад +1

      @@macking104 you're right cutting a drive up with scissors is much less time efficient than renting a specialized machine to do it for me

  • @adriansdigitalbasement
    @adriansdigitalbasement 10 месяцев назад +31

    Cool demonstration but I'm disappointed you didn't try using drives after degaussing them.
    I have found using manual degaussing on tapes has resulted in mixed results.

    • @Metal_Maxine
      @Metal_Maxine 10 месяцев назад +1

      Hey! Adrian! Never expected to
      see you here!

    • @EmilePolka
      @EmilePolka 10 месяцев назад

      that's probably a floatplane exclusive content then.

    • @kmontoya87
      @kmontoya87 10 месяцев назад +1

      Although what I had used at the time was less sophisticated than the looks of this unit, results were indeed a mixed bag upon testing afterwards. I certainly would try a few out in the beginning if for nothing else a piece of mind knowing that there isn't just a speaker making the audible "thuddunk" noise lol.

    • @Metal_Maxine
      @Metal_Maxine 10 месяцев назад +1

      @@EmilePolka Nope. The Floatplane exclusive is Elijah and Sammy squishing various media.

    • @erkinalp
      @erkinalp 10 месяцев назад

      @@EmilePolka😂😂😂😂

  • @andrewnephew3932
    @andrewnephew3932 10 месяцев назад +15

    I love when LMG makes videos like this, talking about the logistics of tech. I just got my CompTIA and Pc Pro certifications this week. this video coincidentally lined up with the last few chapters and enlightened me more on the topic of degaussing.

    • @ChrisBigBad
      @ChrisBigBad 9 месяцев назад

      Gratz!

    • @Wr41thgu4rd
      @Wr41thgu4rd 9 месяцев назад

      CompTIA certs are an arbitrary plague on the industry, a shoehorned way for a guy to make money that means nothing. Congratulations anyway.

  • @TampaMaximumMike
    @TampaMaximumMike 10 месяцев назад +7

    For actual hard drives, it is super easy to simply remove the platter and run it through a dimpling machine and then cut the platter in half. It also makes it possible to sort the material for recycling. For SSD drives, it is easy to cut them up with sheet metal cutters. Backup tapes are more time consuming to destroy. I usually take the DLT tapes apart and pop the ends off the tape reel. Then cut through them with a sharp razor knife or box cutter. This creates thousands of small pieces of tape that then goes in the shredder bin.

    • @unvergebeneid
      @unvergebeneid 10 месяцев назад +4

      When you open those helium drives, do you breathe in the helium and talk in a funny voice?

  • @DavidLeeKersey
    @DavidLeeKersey 10 месяцев назад +43

    A professor I had in College worked for the DoD for a while back in the 1990s. The way they "declassified" hard drives at the time was with a sandblaster.

  • @TheRogueAdventurers
    @TheRogueAdventurers 10 месяцев назад +79

    I'd love to see a video comparing the different ways to delete, wipe and destroy data and drives then try different recovery methods to see which way to wipe data and which ways to recover data are the best.
    I'm especially interested in the destroyed drive taken to that cool drive recovery place they've made a video about before

    • @MTGeomancer
      @MTGeomancer 10 месяцев назад +7

      They would get nothing. The data recovery service is for fixing things like a physically broken drive, or one that's file system got corrupted. Things of that nature. For example on a broken drive they can disassemble the drive and put the platters into a machine to read them.
      They can't reconstruct what isn't there though. At best is what they mentioned in the video on older drives.

    • @manuelh.4147
      @manuelh.4147 10 месяцев назад +1

      Like it says, one overwrite is enough. You aintT going to recover anything.

    • @dh2032
      @dh2032 10 месяцев назад +1

      @@manuelh.4147 now you are wrong, in the old day data was in nice striate digital grooves of 0's and 1's the high capacity drive, do fancy tricks, yo get more data space, data is almost at edges over lapping the track, gooves, on the and to left and the on to the right, so the hardware of the drive already knows how recover data been partly wiped, it doing every time new data be add to drive.

  • @PC_XP
    @PC_XP 10 месяцев назад +478

    This is too powerful, Somebody needs to stop Linus before it's going to be too late!!!!!

    • @helloukw
      @helloukw 10 месяцев назад

      Universe destruction is imminent.

    • @5ebliminal
      @5ebliminal 10 месяцев назад +2

      too powerful... yet they nerfed it up front by not using 220v

    • @zeruty
      @zeruty 10 месяцев назад

      Maybe we should all ship him our old dead hard drives so he has an abundance of drives to smash

  • @DavidKhabinsky
    @DavidKhabinsky 10 месяцев назад +3

    Appreciate the dead body at @7:52. I'm glad the editors are having fun.

  • @brizlebre1577
    @brizlebre1577 9 месяцев назад +8

    Linus being excited about something I spend sometimes 8 hours a day doing makes me feel like I'm an old person watching my grand children play with a toy I used to love as a kid.

  • @Wiisporter
    @Wiisporter 10 месяцев назад +2387

    Linus is a simple man.
    Linus sees an object.
    Linus sees a way to destroy the object.
    Linus destroys the object.
    Linus is happy.
    Be like Linus.

  • @TV4ELP
    @TV4ELP 10 месяцев назад +57

    Here government harddrives need to be shredded and the chips can't exceed a certain size .Depending on how critical the data is that size can be preeeety small

    • @FleaOnMyWiener
      @FleaOnMyWiener 10 месяцев назад +4

      How much trouble would you be in if you stole a non destroyed drive

    • @evilninja65
      @evilninja65 10 месяцев назад

      @@FleaOnMyWienerin my experience you wouldn’t get the chance to, government drives and paper documents are typically witness destruction.

    • @slinkeyj3
      @slinkeyj3 10 месяцев назад +13

      ​@@FleaOnMyWienerfrom my knowledge (and taking a slight guess that this person probably has a decent level of security clearance), he would be quite lucky to just get fired AND a sizable fine. (At least the US govt) tries to take data destruction very seriously for secure data storage devices

    • @MTGeomancer
      @MTGeomancer 10 месяцев назад +10

      @@FleaOnMyWiener Ever hear of Snowden? That kind of trouble.

    • @nicholastaylor7070
      @nicholastaylor7070 10 месяцев назад +1

      I would say it would be 3 -5mm pieces, as that is dod standard I believe

  • @aaronth777
    @aaronth777 10 месяцев назад +118

    I used to work for a company who made degaussers and crushers like this and they are super cool. 10 tons of force on the crusher, and they're up to 40,000 gauss (4 Tesla) on the degaussers which is cool, but terrifying to work on when doing QA and the capacitors fail to discharge lol. A surprisingly small market but a lot of interest from big data companies. I don't work there anymore but they're a great group of people, Garner Products if anyone is interested.

    • @bugshot4760
      @bugshot4760 10 месяцев назад

      what is the price for these kind of machines?

    • @Donnerwamp
      @Donnerwamp 10 месяцев назад +1

      What kind of caps are used there? The only ones I dare to handle are those up to 50V for small to midsized electronics projects because they still can ruin your day by popping or "suddently" discharging when your mind isn't fully there.

    • @Norweeg
      @Norweeg 10 месяцев назад +1

      The degaussers were fun back when I was destroying old spindle drives at a previous job. Some of the really heavy drives with a lot of platters would jump inside the sled with a satisfying thump.

    • @SecondSunofficial
      @SecondSunofficial 10 месяцев назад +1

      i work for a certain data center company and we use your crushers occasionally when our manglers are dead

    • @hyperzephyrian1145
      @hyperzephyrian1145 10 месяцев назад

      @@bugshot4760 If they're NSA listed models usually 20-30k USD depending on options, non-listed are 6-15k.

  • @fireninja7434
    @fireninja7434 2 месяца назад +2

    I work at an IT job and had to use the EMP and crusher. It's always fun and everyone always wants to have a look at a hard drive being crushed. In the end, destruction is always fun I guess.

  • @lywellyn0
    @lywellyn0 10 месяцев назад +2

    As a small business IT consultant, I always recommend my clients use encryption on their drives. The possible speed hit is minimal in business use most of the time, and when we're done with the drive, we don't have to worry about data destruction. Taking it out of the computer with the encryption key is enough to resell the drive. I also find that encrypting a drive with bitlocker takes much less time than a DBAN old school overwrite method.

  • @galaxywolf4895
    @galaxywolf4895 10 месяцев назад +15

    As someone who has done enterprise level disk wipes (thousands at a time), it can take hours to a week depending on drive type, size, quantity, and number of controllers. Also, most companies either have a third party securely dispose of the drives, or they shred the drives into pieces around 1-2 cm in size. Also, you definitely do not want your junior tech responsible for the destruction of sensitive data, which could easily lead to them making a simple mistake and sensitive data, possibly getting out.

    • @jarhu86
      @jarhu86 10 месяцев назад +4

      I have done thousands of data wipes. At some point also sent securely to melting facility. Reality is that enterprises should use disk encryption (which they usually do) and simply overwriting drives couple of times ensures it will be impossible to restore anything. It doesn't matter the size, it will take only 4-12 hours per disk to do 6-7 overwrites depending on size and you can have dozen or dozens written over at the same time. Doesn't matter if it is ssd or harddisk, nothing is restorable. Cheaper than shredding.

    • @extaza555
      @extaza555 10 месяцев назад +3

      And less e-waste

    • @randomchannel5386
      @randomchannel5386 10 месяцев назад

      @@jarhu86 It massively depends on who owns the data as well, for some levels of data i've dealt with complete destruction of the hardware is the only legally acceptable disposal method.

  • @netropolis
    @netropolis 10 месяцев назад +26

    THIS IS HILLARIOUS!!! This is one of the parts of my job! I never thought of it as anything I would ever see on LTT! 🤣

  • @PeterBrockie
    @PeterBrockie 10 месяцев назад +8

    One thing I've noticed with consumer SSDs using their internal full secure erase or SED erase stuff is that it's kind of unreliable depending on how old the SSD is and who makes it.
    I found when erasing drives for eBay recently that depending on the drive it would say it did its secure erase, but then I would find files on it using DMDE and have to either do it again or do a manual overwrite (which has a lot of downsides with SSDs the least of which is killing write endurance).
    I suggest if you're using any SED or BIOS secure erase stuff as a home gamer maybe doing a sanity check after to make sure the data is really gone.

    • @xXxJakobxXx3
      @xXxJakobxXx3 10 месяцев назад +1

      I recently build a Linux server with an SED and documentation about SEDs is very sparse. If you use Bitlocker on Windows you have to go through a procedure of installing the SSD vendors software, reboot from this software and immediately enable Bitlocker after that. On Linux you have to install your on preboot environment in the non encrypted section. It is far from user friendly, so I would assume most people don't this functionality on their SSDs.

    • @Darkk6969
      @Darkk6969 10 месяцев назад

      @@xXxJakobxXx3 I currently use Debian LUKS for full disk encryption which asks me if I wanted it during OS install. It's really easy to setup. Plus you can have several LUKS passwords as backups or for different users.

    • @Velocifyer
      @Velocifyer 4 дня назад

      @@xXxJakobxXx3 that is not SED

    • @xXxJakobxXx3
      @xXxJakobxXx3 3 дня назад

      @@Velocifyer Can you further elaborate what you mean by that? Op posted that he got a SED from eBay and could still read data from it. I shared that on some drives you have to go through a lot of steps to enable the encryption and therefore some users might not do it.

    • @Velocifyer
      @Velocifyer 3 дня назад

      @@xXxJakobxXx3 SED does not involve a unencrypted boot partition (if you use FDE that is not SED just put your kenels in the ESP). SED is handled by the firmware/whatever boots up the bootloader, you just enable it in firmware config (if you want it password protected).

  • @Sidecutter
    @Sidecutter 10 месяцев назад +4

    These are super cool. I did a refresh for a bank I worked for back around 2010, and they brought in a portable one of these, basically just the crusher section with a big chonkin handle on top. We called it the taco maker.

  • @WackoMcGoose
    @WackoMcGoose 9 месяцев назад +1

    For further viewing, I recommend an old Defcon talk called "And That's How I Lost My Other Eye: Explorations in Data Destruction". Yes, a lot of stuff goes boom.

  • @CosmicInfinity
    @CosmicInfinity 10 месяцев назад +70

    Man. I feel sad seeing the poor drives getting destroyed :(

  • @dancue599
    @dancue599 10 месяцев назад +13

    This is a very interesting topic. I’d like to see the many different forms of data deletions…ranging from simply deleting by user to using this machine… put to the test by a professional attempting to find the data on the drives.

  • @phunkydroid
    @phunkydroid 10 месяцев назад +22

    I was about to say that SSD crusher looks inadequate then you proved it with "the controller survived". Not every SSD has the same layout, there could have been a storage chip where that controller was.

    • @Darkk6969
      @Darkk6969 10 месяцев назад +6

      Better off using an industrial shredder.

  • @williamcreel1316
    @williamcreel1316 9 месяцев назад +1

    The one we have at work grinds them up. Apparently it was purchased with leftover budget at the end of year from a salesman they nicknamed "George Liquor". It has a dedicated power supply, and it uses a conveyor belt to feed the grinder. Everything has to be disposed of to DoD standards.

  • @sindrisuncatcher653
    @sindrisuncatcher653 6 месяцев назад +1

    I know that for a long time, any company that dealt with like, US military projects was required to incinerate their hard drives after use, because sufficiently determined forensic analysis could pull useful information off even shards of a shredded disk after dozens of overwrites. So the crusher part on this is mostly just for decoration and giving you those nice dramatic 'after' pictures... but the degauser pulse is about as good as setting the drive on fire.

  • @Somerandom1922
    @Somerandom1922 10 месяцев назад +37

    Data destruction is such an unfortunate but necessary part of life. Ideally you can get away without destroying the drive, but often it's not the case. Even when you can be confident in the data being erased (or encrypted with the key deleted) oftentimes businesses need the confidence only achieved by destroying the drive.

    • @suisse0a0
      @suisse0a0 10 месяцев назад +6

      I can talk about that, my company has a couple of certifications and all of thems mandate DESTROYING harddrives... (even if we encrypt harddrive to begin with)

    • @filonin2
      @filonin2 10 месяцев назад +10

      Businesses sound pretty insecure and need therapy.

    • @Cinkodacs
      @Cinkodacs 10 месяцев назад +11

      @@filonin2 How would you like all of your medical data out in the open? Or every transaction you made with a company? How about really important trade secrets that the original company can't prove, because they did not patent their solution? There is a fair amount of personal harm and property harm at risk, drive destruction may look overkill (because it frequently is), but the consequences of not doing so may be worse. This is exactly the kind of stuff we need to be pretty "insecure" about and go for maximum overkill.

    • @turbochargedfilms
      @turbochargedfilms 10 месяцев назад +1

      ​@@filonin2 maybe if you went to therapy you'd learn a little about reflection.

    • @extaza555
      @extaza555 10 месяцев назад +1

      Yh.. and how would you recover that data after software shredding the drive multiple times? Genius...

  • @ManWithBeard1990
    @ManWithBeard1990 10 месяцев назад +5

    My go-to method for recycling an old drive is to do a badblocks scan in Linux with the -w option. That writes and reads several different patterns to the drive, and confirms if it still works right.

    • @soundspark
      @soundspark 10 месяцев назад

      Remember software erase methods do not ensure over-provisioned storage is destroyed.

    • @ManWithBeard1990
      @ManWithBeard1990 10 месяцев назад +1

      @@soundspark yeah, if you want it really secure I wouldn't recommend this approach for an SSD. Overprovisioning on a hard drive is usually much less, if it's even there at all. So it should be fine.

  • @mechguy83
    @mechguy83 10 месяцев назад +16

    this is very interesting, a whole series on data center infrastructure would be cool

    • @newsama
      @newsama 9 месяцев назад

      Please no. LTT knows jack shit about datacenter infrastructure. Leave that stuff to the pros.

    • @slavb0i646
      @slavb0i646 9 месяцев назад

      @@newsama LTT does data infrastructure cool

  • @mastergx1
    @mastergx1 8 месяцев назад +1

    I used to work for a company called "Device" where we took old computers from large companies and repurposed them for schools in 3rd world countries. One of the first things we did is run a dos program (I can't remember the name of it) that would spend about 6 hours overwriting the drives to comepletely erase any data that was stored. Apparently, this software worked on the binary level, you could even choose if you wanted all 0s or all 1s. If for whatever reason we couldn't erase a drive, it would have to be destroyed. We smashed them to bits with a lump hammer and incerated them.

  • @Aftermost3590
    @Aftermost3590 10 месяцев назад +2

    Oh man, I use to sysadmin a data center and was tasked with creating a shredding server where any drive connected to a specific controller would be discovered, smartctl checks run on it, and then shredded using the shred package on Linux and indicate whether it was to go back into prod or to be physically destroyed, and then sound out reports to the DC manager. This cart would've been so wonderful to have.

  • @henlofren7321
    @henlofren7321 10 месяцев назад +39

    It's funny how well Linus knows his audience of government agents

  • @otrab1080
    @otrab1080 10 месяцев назад +3

    0:39 We need a LTT x Hydraulic Press Channel collab.

  • @Rudy97
    @Rudy97 10 месяцев назад +24

    For M.2 SSD sticks I would use an induction heater coil to turn it back to sand in seconds.

    • @NicholasOrlick
      @NicholasOrlick 10 месяцев назад +4

      Depending on which organization you work for, some policies my delve into more stringent requirements for SSD destruction. Crushing it like they did in the video would probably be fine for most people, except for the government. The DoD policy on SSDs literally calls for disintegration or 1mm x 1mm pieces.

    • @GampyBamblor
      @GampyBamblor 10 месяцев назад

      Or just an ordinary cheap angle grinder....

    • @NicholasOrlick
      @NicholasOrlick 10 месяцев назад +3

      @@GampyBamblor well, technically speaking, throwing a SSD in an oven is less work than using an angle grinder. And also using an angle grinder, would not meet policy standards, depending on where you work.

    • @captainheat2314
      @captainheat2314 10 месяцев назад

      @@NicholasOrlickif its dust no one can read it anyway

    • @NicholasOrlick
      @NicholasOrlick 10 месяцев назад +1

      @@captainheat2314 that’s what I’m saying if you incinerate it you can’t read it.

  • @SGCSmith
    @SGCSmith 9 месяцев назад +1

    On the question about erasing tons of drives with Secure Erase and Overwrite - You can use a product such as the Destroyinator, which is basically a 45Drives Chassis loaded up with Linux and a copy of Killdisk Industrial to perform bulk erasure AND compliance reporting of disks. It's pretty cool. You hot swap the drive into one of the drive bays on the 45Drives chassis, it'll automatically destroy the data, and if a disk fails for any reason, you'll get a report saved and can send it off to get Degaussed and/or physically destroyed.

  • @skytek7081
    @skytek7081 9 месяцев назад

    I work for a large contractor that was involved in the secret development of a new google datacenter complex. Part of Project Vandalay (yes, literally) was securing the whole building to keycard access, with extra shells of security around several offices, and the destruction of over a hundred laptops that were used, no matter how tangentially, on some aspect.

  • @e-ric3052
    @e-ric3052 10 месяцев назад +17

    While Linus was talking about the degaussing feature, I got a kick out of the body bag under the whiteboard when he asked, if anyone nearby had a pacemaker.

  • @blinddarm8478
    @blinddarm8478 10 месяцев назад +17

    I'm really wondering why you didn't try to plug the hdd in after degaussing and see if theres data. Or even better trying out some data recovery programs and see if that alone had worked and if curshing was really necessary. Would have been interesting.

    • @Acorn_Anomaly
      @Acorn_Anomaly 10 месяцев назад +4

      There's no point. Going through degaussing renders the drive inoperable. Even if there's somehow data left in a small part of it, the tracking data on the rest of the drive missing means the heads wouldn't even be able to properly locate themselves, much less read anything.

    • @ryanmitcham5522
      @ryanmitcham5522 9 месяцев назад +3

      @@Acorn_Anomaly I've only got your and some on screen graphics claim of that, it being demonstrated is much more interesting.

  • @Hyperion9700
    @Hyperion9700 10 месяцев назад +11

    I didnt even know Data Destruction was a thing. Super interesting video ! Thank you LTT.

  • @Dopeykid666
    @Dopeykid666 9 месяцев назад

    I actually manage a data sanitization/destruction setup. I setup and maintain servers that will utilize pxe deployable software to write over disks of any kind, as well as supporting in situ wiping/diagnostics for devices with built in storage i.e mac, tablets, phones etc. I also validate the software level destruction with third party tools that check the hashes to ensure the writes were successful. With all that being said, the most fun part is absolutely the big shredder on wheels that we have! Nothing beats watching a drive get mangled to smithereens and dropped into a bucket. Makes me smile everytime!

  • @Jaxdrill
    @Jaxdrill 10 месяцев назад +1

    Just having a degausser was a fun time when I worked data center for some OT work at a former job. Now if only we had the destructiveness of crushing, but still fun either way.

  • @angryjoshi
    @angryjoshi 10 месяцев назад +5

    What always also works is running 800VDC from a supercap thru the power connector in addition to crushers, that burns the chips nicely before you crush them, then theres nothing to be read even if you somehow managed to get a partial nand chip working

    • @nanielwolf5768
      @nanielwolf5768 10 месяцев назад

      Im surprised that method is not used, but maybe its to safety concerns.

    • @angryjoshi
      @angryjoshi 10 месяцев назад

      @@nanielwolf5768 it doesnt comply with standards, but i like doing it in addition knowing noone will ever recover anything from those.

  • @Mile-long-list
    @Mile-long-list 10 месяцев назад +9

    i worked for a massive data destruction facility and this is not what was acceptable. this was only done after every single sector of the hdd was overwritten hundreds of times with a random number generator ( mersene twister ), after it was verified that every sector had been done several times, then it was physically destroyed such as this.

    • @bugshot4760
      @bugshot4760 10 месяцев назад +4

      why

    • @rack_tech
      @rack_tech 10 месяцев назад +6

      After the Degausser, there is no data

    • @amogusenjoyer
      @amogusenjoyer 10 месяцев назад

      Hundreds of times? What was the data deletion standard that you guys had to implement?

    • @Mile-long-list
      @Mile-long-list 10 месяцев назад +5

      the same process was repeated 3 to 12 times (dod3) depending on the customer each pass was 36 so minimum 100 plus passes, i cant say the software name because it would identify the company but that was just step one for data wipe. step 2 was a massive degausser that was so violent the hdds would dance on it and jump it was nuts lol the noise it made was incredibly satisfying.after that was physical destruction. some required the whole process to be on camera some just required audits/reports. fun fact the highest security request we got was not from a bank but a major automotive company. we could only guess what they wanted destroyed but they asked for the most reporting, video, audits and signatures and proof that the hdds were converted to 3mm balls. they had to go through a hammer mill and chain shredder !

    • @unvergebeneid
      @unvergebeneid 10 месяцев назад +3

      ​@@Mile-long-listthere's thorough and then there's paranoid.

  • @michaelschmid2311
    @michaelschmid2311 10 месяцев назад +4

    Some guys I know (they refurbish laptops for poor People in our country) and they wrote a program with numpy to manually overwrite and nullify every bit of a harddrive. It’s surprisingly performant (but we are still talking multiple hours a drive. Because they overwrite every bit multiple times as you said) They got a thread ripper server running Linux just for erasing disks from old company laptops .
    As far as I know they’re Procedure is good enough to pass some certifications but I don’t know which

    • @VADemon
      @VADemon 10 месяцев назад +1

      "numpy" "threadripper" "performant"
      It's not 1990s and you'll only be limited by the drive's write speed.

    • @unvergebeneid
      @unvergebeneid 10 месяцев назад

      ​@@VADemonunless you insist on true randomness for some reason, in which case that's definitely gonna be the limiting factor unless you have specialised hardware.

    • @VADemon
      @VADemon 10 месяцев назад +1

      @@unvergebeneid that's silly. even if the requirement were to be non-repeatable securely random oberwrite (why?) the performant way would be to generate a cryptographically random stream with AES, which is already accelerated to gigabytes/s per core on Zen microarchitectures.
      Actually I think the only technical explanation for Threadripper would be its I/O capabilities.

    • @unvergebeneid
      @unvergebeneid 10 месяцев назад

      @@VADemon I agree. There are tools, however, that are limited by the entropy pool. Not that more cores would help with that.

  • @Snailster111
    @Snailster111 10 месяцев назад +1

    One of the best recent videos!

  • @CouchCoach
    @CouchCoach 10 месяцев назад

    We send our drives to a company specialized in destroying data (from printed pages to drives of any kind). They put drives through a crusher / metal shredder which makes sure that the biggest piece of anything thrown in it is less than a cm in any dimension. Usually the pieces are more like confetti.

  • @jeo2222
    @jeo2222 10 месяцев назад +10

    I love this type of education content!

  • @buckykattnj
    @buckykattnj 10 месяцев назад +5

    The SSD chip crusher busted up the chip enclosure... but did it actually crack the chip die? Offhand, I'm not familiar with the size of dies used for nand chips, but a lot of chips use very small dies. What keeps one from extracting the surviving die and repackaging it?

  • @matthewjalovick
    @matthewjalovick 10 месяцев назад +5

    I like the Red Dead Redemption font you guys used for Uncle Linus’s quote :) I’ve always just filled my entire drive to the brim with video files and then formatted it in order to permanently erase the data.

  • @D4M14N1989
    @D4M14N1989 9 месяцев назад

    The best data destruction method is to plan ahead and to use full disk encryption from day 0 with off disk encryption keys. This is how most enterpriuse storage arrays now work, and destroying data at the end of life is as simple as rotating the encryption key. SSD's also encrypt all data internaly by default, however the encryption key is stored in device.

  • @52Ford
    @52Ford 10 месяцев назад

    My dad used to be a service tech working on large server installations amongst other things. IIRC, back in the 90's, protocol at his company (very large international corporation) was to drive a 1/4" slotted screwdriver through the hard drive with a hammer before disposal. He may have had to do that in two spots to make sure the drive was extra dead.

  • @01Durhamguy
    @01Durhamguy 10 месяцев назад +4

    when linus asks if anyone has a pace maker am i seeing a corpse under a blanket near the white board? lol

    • @HrLBolle
      @HrLBolle 10 месяцев назад

      body bag

  • @Jh3454-df5vm
    @Jh3454-df5vm 10 месяцев назад +10

    Amazing setup.... but the 50 gallon drum outside I burn used motor oil in makes short work of these drives as well.

  • @Wayhoo
    @Wayhoo 10 месяцев назад +4

    It's not a Linus video without him damaging products!

  • @MrWazzup987
    @MrWazzup987 10 месяцев назад +1

    7:45 where'd the bag go Linus.
    New head cannon: not everyone was alright

  • @OsmosisHD
    @OsmosisHD 10 месяцев назад

    We have a $199 data destruction solution at work. A hydraulic press we found on Ebay. But! We modified it slightly we welded on some teeth just for good measure
    Works very well

  • @KomradeMikhail
    @KomradeMikhail 9 месяцев назад +4

    Linus paid $30,000 for DBAN and a sledgehammer.

  • @the1observer
    @the1observer 10 месяцев назад +5

    A machine made for Seagate drives. My dream machine.🎉🎉🎉

  • @Nabeelco
    @Nabeelco 10 месяцев назад +5

    The problem with a lot of these papers are: There's never been a single recorded incident of someone being able to recover data from a drive that's had a single pass of zeros written to it. Yes, in theory you could figure out what was there before the single pass erase... but in practice, no one has managed to do it yet.

  • @BlakeMcBride
    @BlakeMcBride 10 месяцев назад

    At a previous company, we managed secure medical data for three letter groups.
    For drive destruction at EOL, we had "Company Range Days" where we utilized high speed projectiles to permanently disable drives/tapes. We sent photos to our Cx for evidence. They were entertained at our novel approach.

  • @thedorsetflyer9113
    @thedorsetflyer9113 10 месяцев назад +1

    I used to do this for defunct military hard drives. Used Blancco data erasure software and then they would be crushed into effectively plastic sand. If the erasure software didn’t work due to a really broken hard drive, then we had to drill through them several times before they went to the crusher. Always a fun Friday afternoon job…

  • @ingocernohorsky
    @ingocernohorsky 10 месяцев назад +5

    isnt there an option to recycle the drives or at least parts of it?

    • @0106johnny
      @0106johnny 10 месяцев назад +1

      The hard drive shreds will be recycled just like other e-waste

    • @spartan8705
      @spartan8705 6 месяцев назад

      The PCBs can be recycled, sure, but any data-containing component is destroyed

  • @AdamBrackney
    @AdamBrackney 10 месяцев назад +11

    Leasing for less than $1000 a month 😂. The whole cart is worth maybe $5000 at most. Gotta love hardware as a service.

    • @MTGeomancer
      @MTGeomancer 10 месяцев назад +4

      Especially since they said it was using a Raspberry Pi...

    • @mygamertag2010X
      @mygamertag2010X 10 месяцев назад +3

      Bad take. Many outfits don't need to own one of these, and maybe require the use of this type of machine once or twice every decade. The cost of ownership doesn't make sense for upfront cost, storage space, maintenance, etc. Nearly every outfit would rather rent/lease this machine when they actually require it's use instead of holding onto it and spending more money.

    • @AdamBrackney
      @AdamBrackney 10 месяцев назад +1

      @@mygamertag2010X Lol. Data Centers are obviously the main clientele. Once or twice every decade 😂

    • @rack_tech
      @rack_tech 10 месяцев назад +3

      We actually have a client using our MDDS currently, and they process around 1k-2k drives per month

    • @AdamBrackney
      @AdamBrackney 10 месяцев назад +1

      @@rack_tech Sounds like the exact kind of Customer they're made for!

  • @TheStaniG
    @TheStaniG 10 месяцев назад +3

    This is literally just an overly complicated, likely HILLARIOUSLY overpriced hydraulic press because of pencil pushers.

  • @jeffgros8508
    @jeffgros8508 10 месяцев назад

    After overwriting the data, I always open up spinning drives and slice up the platters. Plus there are powerful magnets to be harvested in spinning hard drives! Too useful to throw away! For SSDs, I take the memory chips off the board, cut the leads off, and then melt the chips. I break the pcb for good measure.

  • @jarikooper6325
    @jarikooper6325 9 месяцев назад

    I once visited a data center for my school and they showed me how they destroy data, crush the drives and register them as destroyed. It was the exact same process as this video. They also showed me a rig of about 6 full size racks filled to the brim with jbods. The jbods where modified to easily swap out the drive. They used that rig to erase data off the drives for reuse. Its really cool technology.

    • @jarikooper6325
      @jarikooper6325 9 месяцев назад

      The only thing they did differently was the destruction of ssd’s instead of bending the nand chips the poked physical holes in the pcb and chips. Might be a better way instead of bending

  • @Finite-Tuning
    @Finite-Tuning 10 месяцев назад +4

    That thing is ridiculously over priced for the simple thing it is!

  • @AndyRome
    @AndyRome 10 месяцев назад +4

    YES! I need this in my life for next time I need to 'wipe' a drive.

  • @stormgear896
    @stormgear896 10 месяцев назад +6

    Question: Can destroyed hard drives, SSD's be recycled? I wish the video covered that too.

    • @MTGeomancer
      @MTGeomancer 10 месяцев назад

      The same as any other e-waste. Shipped to china where they salvage anything worth anything, and the solvents get dumped in a river/lake and the solids get thrown into a landfill or incinerator.

    • @halomika4973
      @halomika4973 10 месяцев назад +1

      Probably as much as other technology.

    • @JustCallMeEm.
      @JustCallMeEm. 10 месяцев назад +2

      Theoretically, yes. However having worked for a hospital, recycling classified material was considered unsafe, all our paper and destroyed hard drives went to a secure facility (presumably a landfill)

    • @matthewnirenberg
      @matthewnirenberg 10 месяцев назад +3

      Generally speaking nope. The problem is if you crush it as one entirely assembled drive, everything becomes one or a bunch of mixed scraps. The better solution would be for platters to be destroyed separate from the hdd controller and the body of the drive. Circuit boards once broken can't be recycled as no one is going to seal the broken edges of multi-layer boards just to reverse electroplate them.
      If they gave a damn about preventing ewaste they'd open the top cover of the drives, smash the platters and recycle the rest; for SSD's they'd only destroy the NAND chips and/or the controllers (could drill through them).
      The method shown in the video creates nothing but ewaste.
      To anyone who goes "but Snowden" - remember, he didn't steal drives, he snuck files out of a microSD card he smuggled in and out of a secure facility.
      The solution to not need to physically destroy drives is to use encryption and simply destroy the keys and then create new ones, then write zeros to everything.

    • @captainheat2314
      @captainheat2314 10 месяцев назад +1

      @@matthewnirenbergbut then governments cant greenwash as effectively by throwing things into landfills instead of recycling

  • @therealcthulhu9813
    @therealcthulhu9813 9 месяцев назад

    I used to work in a Goodwill computer works department and because we had to reuse drives for our builds we had to make sure they were all properly wiped. So we actually had a set up using large KVM switches and old motherboards on shelves to run 3 pass DBAN on multiple drives in parallel so we could have enough drives for production. We usually wiped drives between 250GB and 2TB with the occasional 4TB or higher but even then those still took awhile to wipe just on the 3 pass. I can imagine not wanting to 3 dozen passes on server level drives those wipes might take weeks.

  • @thommckirdy3657
    @thommckirdy3657 10 месяцев назад

    I took my old drives apart and used the platters as coasters. Worked a treat.

  • @ta985
    @ta985 10 месяцев назад +4

    The cloud-service kinda seems like a downside to me. Happen to know if you could host your own database onside? Otherwise, a pretty neat product

    • @pwii
      @pwii 10 месяцев назад

      good point, but the problem with hosting things on site is what if there's a fire or other environmental catastrophe and all of your data is lost? these records are required by the government so a scenario like that is not acceptable, and the cloud service is probably replicated on multiple continents with many copies of the data so it can never be lost

    • @dekkonot
      @dekkonot 10 месяцев назад

      It seems like they're selling a service instead of a tool, based on how Linus mentioned renting those carts.

    • @ta985
      @ta985 10 месяцев назад

      @@pwii If anything, sending the data across the internet and storing in another companies hands (probably in some other country) seems to me like it would increase cost and risk.
      Easpecially if you already are a hoster and have redundant systems

    • @amogusenjoyer
      @amogusenjoyer 10 месяцев назад +2

      To be fair, corporations like to have something that just tracks this for them automatically. It helps with compliance. No one actually wants to spend a lot of time on this, it's just one small part of a business process so again, the less stuff you have to worry about keeping and managing the better.

    • @ta985
      @ta985 10 месяцев назад

      @@amogusenjoyer Well that makes little sense then, because if you're not willing to spend time on it, why have someone run that machine at your locations. Have the disks picked up and destroyed with proof of destruction like most do anyway...

  • @Dewey_the_25U
    @Dewey_the_25U 10 месяцев назад +4

    Honestly, if it wasn't for the Degaussing, then its not be secure for certain kinds of data.

    • @potatopobobot4231
      @potatopobobot4231 10 месяцев назад +2

      its almost like thats why they put the degausser on there and not just a crushing device. hmmmm

    • @rack_tech
      @rack_tech 10 месяцев назад +2

      Yip, we wanted a redundant destruction system.

  • @JakubVacek42
    @JakubVacek42 10 месяцев назад +7

    They need an AI model to read a bar code from a picture? Really? Like REALLY?

    • @michaelbell6602
      @michaelbell6602 10 месяцев назад +3

      There are thousands of models of hard drive and the order of barcodes can vary. It’s to help the program decide which long string of numbers is the model and SN without creating and maintaining a massive lookup table

    • @cassist000
      @cassist000 10 месяцев назад

      OCR has always been based on ML/AI

    • @LiEnby
      @LiEnby 2 месяца назад

      @@cassist000 not *always*, but yes it is alot older than the current AI scamGPT train

  • @macbitz
    @macbitz 9 месяцев назад

    Fascinating stuff. We used to use a disk crusher fifteen years ago where I worked. Strangely it was super satisfying dropping 3½" drives into it!

  • @mifo2000
    @mifo2000 10 месяцев назад

    I used to be a hydraulic technician.
    one company we did work for was some kind of file destroying place. from paper files to hard drives.
    For hard drives they just used a fine blade metal crushers, every single piece of scrap would drop to the bin bellow and none of the scrap would be any bigger then 3mm.
    No de magnetising but an impossible puzzle to put together especially when your crushing 10 or more drives at once and they are mixing into 100 other crushed drives in the bin already.

  • @gerowen
    @gerowen 10 месяцев назад

    14:17 I had a scare a few years back where a drive in our home server died, but in order to warranty it I had to send it back. I left it sitting in a drive dock for a day over the weekend and it finally kicked in and worked long enough for me to perform a secure wipe on it, but after that I switched the actual storage partition on my server to an encrypted partition. That way if one dies again and I have to send it off, the data on it is safe because it's encrypted, so I don't have to worry about trying to securely wipe it before sending it off.

  • @kuyache2
    @kuyache2 10 месяцев назад +1

    For us regular folks, the dollar store hammer and some energy drinks would be economical and is also a lot of fun ^_^ not to forget that it also releases a lot of stress...

  • @shinjisan2015
    @shinjisan2015 10 месяцев назад +2

    Depending on the classification of the data, some drives also need to be shredded so no single particle is greater than 3mm in size.

  • @dj_paultuk7052
    @dj_paultuk7052 9 месяцев назад

    Im a DC HW engineer and the machine we have actually Shreds all the metal. So 1000 bits of metal comes out the other end. It all then goes in a skip and goes for metal recycling. We have over 1000 physical servers and can go through 60 drives per week in just normal failures.

  • @huntermaster95
    @huntermaster95 10 месяцев назад +1

    That looks like a very low end machine.
    Used to work at a place that had a machine 4x the size just for shredding(yes, shredding) old HDDs/SSDs.
    It had a massive steel plate that came down like a hydraulic press and sliced 2cm chunks off a HDD.
    Government related HDDs had to be sliced into 1cm slices.

  • @TheVirusWar
    @TheVirusWar 9 месяцев назад +1

    If you wonder if something like this is actually used - > Yes. It is.
    I work for a global, huge ass, automotive industry company as an IT specialist, and we have procedures for drives older than 5 years.
    Frist we nuke them by using a special device, similar to the one showed in the video. Then they are handed over to the maintenance department where they cut them in half (under our supervision). Afterwards we pack them in locked containers, and they are sent to a company that destroys them completely.
    Too much? Probably. But on another side, in a game with enormous players, information is everything. Some piece of data that falls into the wrong hands, even if actually harmless, if presented the right (wrong) way can ruin even the largest companies.

  • @John.S92
    @John.S92 9 месяцев назад

    If you wanna go "all out", remove the HDD's metal lid exposing the silicon discs, unscrew the cap holding them in place to remove said discs, then, turn on the acetylene torch and turn the silicon discs into molten metal.

  • @jonahthrane812
    @jonahthrane812 10 месяцев назад

    I worked in a DC for equinix, and i helped destroy upwards of thousands of disks. It's time consuming but necessary to orotect data, but we didn't just crush it by folding it, we crushed it through a machine that left it in many fragments that had to be a certain size.

  • @jojokokolo2121
    @jojokokolo2121 10 месяцев назад

    At the company I used to work for we shred the hard drives into pieces or dust, also the NAID standard forbids video footage in the area of destruction, that’s in US though not sure about CA. We would also erase the drive’s data before destroying them.

  • @dragonheatgaming5005
    @dragonheatgaming5005 10 месяцев назад

    i've a hdd shredder before and i know how enjoyable watching it go from hdd to metal Potpourri in few seconds