What does wipe disk do?

Wiping a disk is the process of completely erasing all data from a storage device like a hard drive or SSD. It overwrites the existing data with meaningless information to make recovery of the original data nearly impossible. Wiping a disk is an important step when recycling, selling, or repurposing a computer or storage device to protect personal information and prevent data theft.

Why Wipe a Disk?

There are several key reasons to wipe a disk before disposing of, selling, or repurposing a device:

  • Data security – Wiping removes confidential personal or business files so they cannot be recovered. This prevents identity theft or leakage of sensitive information.
  • Privacy – Wiping deletes private digital information like emails, financial records, browser history, cached passwords, etc. It gives you control over private data.
  • Reuse – Wiping enables safely reusing a storage device for a new purpose by completely resetting it to a clean state.
  • Troubleshooting – Wiping can fix some system errors, corrupt files, or malware by fully resetting the disk.

If you simply delete files or reformat a drive, data remnants may remain that could still be recovered. But wiping overwrites the actual raw data to render recovery impossible via typical means. That’s why wiping is the most secure option before decommissioning or repurposing a device.

How Does Disk Wiping Work?

Disk wiping software completely overwrites all existing data on a storage device. This overwrite pass is performed at the lowest disk level to access the raw platters or flash memory cells. There are a few key aspects of the wiping process:

  • Pattern overwrite – The disk is overwritten with a meaningless pattern of 1s and 0s, alternating this pattern with each pass.
  • Multiple passes – Wiping performs several overwrite passes (often 3-7) to ensure thorough erasure.
  • Final random pass – The last pass uses random data to eliminate any remaining trace patterns.
  • Free space wiping – Both used disk space and unused free space are wiped to delete all remnants.

Advanced methods like degaussing and physical destruction can also wipe disks. But software overwrite wiping is generally fast, convenient, and still leaves the disk intact for reuse.

Disk Wiping Methods

There are a few common disk wipe methods to completely erase data. The right technique depends on your specific device type and security requirements.

SSD Secure Erase

Solid state drives (SSDs) can utilize the ATA Secure Erase command (for SATA drives) or NVMe format command (for PCIe NVMe drives). This built-in disk wipe command instructs the SSD firmware to reset all cells to an erased state. It provides a fast, efficient wipe well-suited to the flash memory structure. Secure erase is implemented differently across vendors but generally performs a cryptographic erase.

ATA Disk Wipe

ATA (Advanced Technology Attachment) refers to the disk interface for traditional HDDs and certain SSDs. ATA-based drives can be wiped with security erase commands built into this standard. The ATA Secure Erase command performs a similar firmware-level wipe like SSDs. Enhanced Secure Erase goes further by physically overwriting all disk sectors.

Software Wipe Tools

Many third-party disk wiping utilities rely on software to overwrite data. This operates at the operating system level rather than using built-in drive commands. Software tools allow extensive customization of wipe patterns, number of passes, verification, etc. Many can wipe drives not accessible to hardware commands. The enhanced flexibility makes software tools popular for meeting strict data sanitization standards.

Degaussing

Degaussing is an industrial technique that applies a strong magnetic field to the physical drive platters to scramble data. It disturbs the magnetic flux to render data unrecoverable. While effective, degaussing requires special equipment and permanently damages drives. It is utilized for thorough data sanitization of legacy and decommissioned drives.

Physical Destruction

For maximal assurance against data recovery, physical destruction can be employed. Disk shredding, disintegration, pulverizing, incineration, etc. completely damages the physical media. This very costly and wasteful technique provides absolute data destruction. Physical destruction may be mandated for disposal of highly sensitive materials.

Best Practices for Wiping Disks

Following best practices helps ensure a wipe is thorough and effective. Recommendations include:

  • Use purpose-built disk wipe software from a reputable vendor. Avoid generic deletion tools.
  • Verify the wipe tool can detect and wipe Host Protected Areas (HPAs) which may hide remnants.
  • Perform at least 3 overwrite passes using approved standards like DoD 5220.22-M.
  • Wipe the free space in addition to used space to remove file system remnants.
  • Use a tool that provides verification of the wipe process when completed.
  • For SSDs, utilize the Secure Erase command to leverage native drive wiping.

You should also wipe associated devices like on-board cache or hybrid drives within the system. Finally, properly dispose of the wiped media since traces could remain on flash chips or platters.

Is Disk Wiping Always Successful?

In most cases, a proper disk wipe will make data essentially unrecoverable without incredible effort and expense. However, there are some exceptions:

  • Damaged drives – Unreadable sectors may prevent a complete wipe on damaged disks.
  • Special firmware – Some SSDs use excess over-provisioning space that is not fully wiped.
  • TESLA drives – Self-encrypting SSDs store encryption keys that are untouched by a wipe.
  • HW/firmware attacks – Lab equipment targeting internal chips via custom interfaces could recover traces.
  • Remanence decay – Some magnetic decay over time may theoretically enable partial data reconstruction.

While there are edge cases, they require exceptional resources, access, and technical expertise. For consumer drives, a wipe provides excellent protection under normal circumstances.

Can You Recover Data After a Disk Wipe?

Recovering data from a wiped drive is extremely difficult and effectively impossible without significant expertise and resources. A few potential attack vectors exist but present major challenges:

  • Imaging raw platters – This requires disassembly and specialized equipment costing over $50,000.
  • Magnetic microscopy – Using an electron microscope to read minute magnetic traces left on platters.
  • Magnetic force microscopy – Similar magnetic imaging but slower and even more expensive.
  • Solid state microscopy – Attempt to read flash cells in SSD platters at integrated circuit level.

These approaches may recover traces of wiped data but are expensive, technically challenging, and extremely time consuming. Reconstructing anything usable is highly improbable. For most, a wiped disk can be considered effectively unrecoverable.

When Should You Wipe a Disk?

There are a few common scenarios where wiping a disk is strongly advised:

  • Decommissioning old computers and drives with sensitive company or customer data.
  • Disposing of a personal computer or storage device being recycled or resold.
  • Repurposing company equipment for a new department or employee.
  • Donating old devices to charity or a school for reuse.
  • Returning leased computers, servers, or storage at end of contract.
  • Sending a computer or drive in for repair where it could be accessed.

As a rule of thumb, any disk containing private or confidential data should be wiped before leaving your possession in any scenario.

Is Wiping Needed Before Recycling or Selling?

Absolutely. Here are some risks if you do not properly wipe disks before disposal or resale:

  • Identity theft from personal financial, medical, email, photo data.
  • Corporate espionage of trade secrets, intellectual property, customer details.
  • Blackmail or embarrassment from revealing browsing history, messages, photos.
  • Financial fraud such as accessing banking passwords, account numbers, etc.
  • Malware injection into unpatched old systems by unscrupulous buyers.
  • General privacy violations exposing your personal information.

All critical risks. Erasing sensitive information by wiping disks protects you and your data.

Does Reformatting Fully Erase a Disk?

No, a simple reformat or repartition of a disk does not properly wipe it. Here’s why reformatting leaves data exposed:

  • Only deletes file system references, data still present on disk.
  • Undeletes easily recover erased files and folders.
  • Disk tools can gather all formatted remnants left intact.
  • Free space often untouched, containing previous files.
  • Reformatting doesn’t touch sectors marked bad or remapped by OS.
  • Drive areas like HPA zones often ignored, retaining data.

Reformatting explicitly resets the file table and partitions. But it does not actually touch the existing data on the drive. Sensitive materials remain reachable with the right tools until you wipe.

How is Wiping Different Than Deleting or Reformatting?

There are critical differences that make wiping far more secure:

Method What it does Data recovery
Delete Removes file system references Easy using undelete
Format/repartition Resets file system and partitions Still possible with tools
Overwrite wipe Physically overwrites raw data Extremely difficult

Only a true disk wipe that overwrites all existing data can render recovery virtually impossible. That’s why wiping is the most secure option.

Is Wiping SSDs Different Than HDDs?

SSDs and HDDs store data differently, so specialized wiping is optimal for each:

  • SSDs – Store data in flash memory cells. Secure Erase command resets these cells by erasing encryption keys.
  • HDDs – Store data magnetically on spinning platters. Overwrite sectors magnetically to disturb remnants.

Key differences that impact wiping:

Factor SSD HDD
Write mechanism Electrical – Voltage applied to cells Magnetic – Changing platter polarity
Speed Very fast Slower
Trim command Extra wiping step needed No trim support

Adjusting approaches based on these differences allows proper wiping of either media type.

How Long Does it Take to Wipe a Disk?

The duration to fully wipe a drive depends on several factors:

  • Drive capacity – Higher capacity takes longer.
  • Drive type – SSDs are faster than HDDs.
  • Interface – SATA 3Gbps is slower than 6Gbps.
  • Wipe method – More passes require more time.
  • System resources – Wiping burden on the processor, RAM, etc.

As a general guideline, these are typical wipe durations:

  • Small SSD or USB flash drive – under 1 minute
  • Laptop hard drive – 20 minutes to 1 hour
  • Desktop hard drive – 1 to 3 hours
  • Enterprise drive array – 5+ hours

Employing erase commands optimized for the drive provides maximum efficiency. Multipass wipes take longer but deliver greater security.

Conclusion

Disk wiping is the most secure way to safeguard private data before disposing of, recycling, selling, or repurposing a storage drive. It works by overwriting existing data to render recovery virtually impossible.

Wiping should be done before transferring ownership or possession of any disk containing confidential or sensitive materials. It provides protection from data theft, privacy violations, and more.

Specialized methods like Secure Erase are optimal for SSDs, while software tools allow extensive wipe customization. Proper wiping leaves disks securely erased and ready for reuse while keeping your data safe from unauthorized access.