I Got an Industrial Hard Drive CRUSHER! @Rack's Mobile Data Destruction System

Sdílet
Vložit
  • čas přidán 5. 09. 2024

Komentáře • 2K

  • @hackbustersminecraft
    @hackbustersminecraft Před 8 měsíci +2725

    I've heard of a company going so far in data secrecy that they destroyed their old monitors as they might contain traces of burn-in of sensitive data or something along the lines

    • @LinusTechTips
      @LinusTechTips  Před 8 měsíci +1545

      That's next level.... - LS

    • @2afk
      @2afk Před 8 měsíci +306

      Also remember to cut the RAM in half!(Yes, I know a company doing that)

    • @MrDuncl
      @MrDuncl Před 8 měsíci +176

      The worst burn-in I ever saw on a CRT monitor was at an airport control tower, That might have been more of a problem had it been a military base,

    • @DaftknightLP
      @DaftknightLP Před 8 měsíci +29

      i just use a hammer, waaay more cathartic

    • @romanpul
      @romanpul Před 8 měsíci +97

      I remember hearing that the Nellis AFB (that‘s were Area 51 is) has a it‘s own scrapyard where all computers ever brought into the base are disposed, crushed, burned and then buried forever. No digital equipment is allowed to ever leave the premises ever again.

  • @nekomakhea9440
    @nekomakhea9440 Před 8 měsíci +515

    it would be a lot faster and cheaper to just hand the drive to Linus and wait for him to drop it like he normally does

    • @Catsrules1
      @Catsrules1 Před 8 měsíci +29

      I don't know, Linus isn't a cheap person to hire these days :)

    • @the_kombinator
      @the_kombinator Před 8 měsíci +11

      Or pay a teenager minimum wage to throw these at walls. What drives we couldn't DOD wipe, we either pierced with a drill, and when we discovered that some of the drive plates shattered, we took those drives on the top of the stairwell at our campus and dropped them 5 stories down the middle. Spectacular sounds. We even chipped the marble after like the 30th drop. The drives sounded like a musical instrument lol.

  • @EraYaN
    @EraYaN Před 8 měsíci +317

    Instant secure erase is also a very awesome feature for essentially most business and personal stuff. It’s essentially encryption and it throws out the key.

    • @gsuberland
      @gsuberland Před 8 měsíci +32

      One thing to be careful with here is that it's called ATA Sanitize, and "Secure Erase" is a different feature that doesn't actually employ any encryption - it simply drops the page mapping table.

    • @simon2763
      @simon2763 Před 8 měsíci +8

      @@gsuberland Usually, and as per ATA specification, ATA Secure Erase should erase SSDs completely by resetting every bit, not just dropping the mapping table. What you are talking about is a simple format or deleting a partition afaik. Sure, there are maybe some wack ATA implementations out there but this shouldn't be the standard.

    • @leexgx
      @leexgx Před 8 měsíci

      If the drive is SED hdd,, the secure erase has 2 modes
      instant erase/Sanitize Cypto {default} clears protected and hidden area and resets private and public encryption keys (doesn't zero fill the drive all stored data is unrecoverable due to encryption keys reset)
      Advance secure erase same as instant erase + your normal zero fill
      For ssd's secure erase clears page table + sends a mass trim command to all nand chips (if the drive supports encryption it also resets teh private and public key) this takes usually less then 30 seconds with background garbage collection completing the zero fill via trim in the background (a couple of minutes)
      NOTE if the drive has encryption or SED support,, Regardless if you have enabled or not the password or relevant security feature, the data is already encrypted so a secure erase at stage 1 of a secure erase command has already made the data unrecoverable because it has reset the encryption keys (before hdd zero fill happens or ssd trim)

    • @gsuberland
      @gsuberland Před 8 měsíci

      @@simon2763 The specification for ATA Secure Erase was written for HDDs, and on SSDs does not mandate that all flash cells, including user-inaccessible cells used for over-provisioning and wear levelling, are wiped. What it says is that all logical blocks must be reset to zero. On a HDD that means wiping the disk. But, on flash, a logical block can be zeroed by simply marking it as free (which can be done en masse by zeroing the allocation table) so it doesn't actually make any guarantees about preventing chip-off data recovery. As such, vendor implementations do not guarantee complete erasure when using the old Secure Erase command. The language of ATA Sanitize makes the need for security in the threat model of chip-off data recovery, which typically forces vendors to implement a cryptographic method. This is also sometimes referred to as ATA Cryptographic Key Reset by vendors who want to make it clear how the operation works. If you have the option to use ATA Sanitize / Cryptographic Key Reset, always use that.

    • @Theinatoriinator
      @Theinatoriinator Před 8 měsíci

      Did you watch the video? He literally sats that at the end.

  • @VideoSage
    @VideoSage Před 8 měsíci +237

    Just want to say thank you, for editing in a full audio(and visual) explanation as to the crushing failure you guys had.
    Very much appreciated.

  • @TotalxTroll25k
    @TotalxTroll25k Před 8 měsíci +111

    When I was getting my Cybersecurity degree I took a digital forensics class and it is truly fascinating. Data destruction and recovery is such a cool topic and the tools that allow you to do data carving are a lot of fun.

    • @Q73POWER
      @Q73POWER Před 8 měsíci +6

      Same for me, in fact I passed my digital forensics class last month. It's amazing what you are able to recover.

    • @the_kombinator
      @the_kombinator Před 8 měsíci +2

      Fascinatingly what? Don't leave us hanging!

    • @Bangarang341
      @Bangarang341 Před 4 měsíci

      How do you like cyber?

  • @offswitch43
    @offswitch43 Před 8 měsíci +742

    Why does Linus need an expensive machine? Let him handle it for 2 minutes and he’ll drop it😂

    • @benjaminnelson5455
      @benjaminnelson5455 Před 8 měsíci +10

      Not if he can't pick it up.

    • @silluete
      @silluete Před 8 měsíci +8

      We talking about dropping the machine or the hdd? Or both? Or the machine with hdd inside?

  • @aurorainvictus1320
    @aurorainvictus1320 Před 8 měsíci +88

    In most larger scale applications for permanent drive / data destruction they use a shredder and conveyor system in order to feed the drives in quickly, and get just a bunch of small chunks that can be recycled afterwards. But the singular drive crusher is a cool demonstration

    • @Acorn_Anomaly
      @Acorn_Anomaly Před 8 měsíci +25

      The one advantage this system has to that is easier auditing of the physically destroyed drives. If you just have a pile of chunks on a belt or in a bucket, it's kind of hard to tell what's what.

    • @ctg4818
      @ctg4818 Před 7 měsíci

      Because fire is too expensive???

    • @Lolgaming1
      @Lolgaming1 Před 7 měsíci +2

      I worked in a hospital that had close to 1000 HDD's / SSD's each year that needed to be destroyed. Shredders are expensive so we just used a manual press, like the crusher in the video, but manual. SSD's were wiped using a program called Kill disk that did 13 different passes. It was a never ending task.

    • @Mastealth
      @Mastealth Před 5 měsíci +1

      ​@ctg4818 maintaining one is, has to be hot enough to melt everything, got to have extract fans for the smoke and fumes from the metals, fuel for the fire, etc. This is MUCH easier.

  • @Dan-Simms
    @Dan-Simms Před 8 měsíci +119

    When i worked IT in a gov building, our wipe program would 0 and 1 over the drive 13 times, then we would also take the electromagnet to them.

    • @TheMaskedHeart
      @TheMaskedHeart Před 8 měsíci +29

      I mean it's government data so understandable enough i suppose

    • @nv1t
      @nv1t Před 8 měsíci +4

      @@TheMaskedHeart i would have guessed they have a need to destroy the drives.....

    • @tedmerrick935
      @tedmerrick935 Před 8 měsíci +9

      Where I work we degauss and shred. It's the only way to be sure.

    • @gsuberland
      @gsuberland Před 8 měsíci +10

      That's a very old method from a DoD standard and is very much pointless these days. Alas, data wiping utility salespeople love to tout the overkill methods.

    • @Djuntas
      @Djuntas Před 8 měsíci +2

      why not just a circular drillhead, would be fast

  • @insu_na
    @insu_na Před 8 měsíci +15

    I'm glad he made that last segment. My own server has 4 SED drives and it's ridiculously easy to wipe them because you really only have to erase the encryption key, and you can also do it as often as you want, to ensure that there's no "ghost" of the original encryption key still in Flash somewhere

  • @origins777
    @origins777 Před 8 měsíci +37

    Linus please do a definitive video guide about prepping hard drives for resale or wiping specific data and have labs run the drives for recovery after to test best methods.

  • @Wiisporter
    @Wiisporter Před 8 měsíci +2388

    Linus is a simple man.
    Linus sees an object.
    Linus sees a way to destroy the object.
    Linus destroys the object.
    Linus is happy.
    Be like Linus.

  • @rpmgames6058
    @rpmgames6058 Před 8 měsíci +1370

    Linus, destroyer of expensive technology

    • @ultimategrr4480
      @ultimategrr4480 Před 8 měsíci +35

      Lets be real, we were all watching in hopes he'd somehow drop the cart off a loading dock

    • @user-dr2pg8fk2i
      @user-dr2pg8fk2i Před 8 měsíci +11

      *Breaks the machine*

    • @AberAnderst
      @AberAnderst Před 8 měsíci +7

      Drop the machine

    • @FARLANDER762
      @FARLANDER762 Před 8 měsíci +4

      By using even more expensive technology!

    • @robsquared2
      @robsquared2 Před 8 měsíci +2

      Linus has left his drop stage and entered his crush stage.

  • @TheGainsWizard
    @TheGainsWizard Před 8 měsíci +260

    If I'm not mistaken I think the current procedure for HAMR drives with high data sensitivity requirements is to use ATA Secure Erase, then shredding, then saving the shreds and sending to a secure destruction smelting/incineration facility to basically turn it into slag. I think most cybersecurity people aware of HAMR put out a moratorium banning acquisition and production use of HAMR drives.

    • @leviathan19
      @leviathan19 Před 8 měsíci +32

      Damn talk about over kill

    • @furqanabid7319
      @furqanabid7319 Před 8 měsíci +15

      I want those drives with more capacity. Atleast general public does. Workspace is different story.

    • @volodumurkalunyak4651
      @volodumurkalunyak4651 Před 8 měsíci +29

      All of those cyber-security people can better mandate not storing any unencrypted data on HAMR drives.

    • @galacticviper4453
      @galacticviper4453 Před 8 měsíci +7

      Wait, why would they ban HAMR? It sounds like it would be super awesome for cybersecurity to me.

    • @johnsmith-nn2hs
      @johnsmith-nn2hs Před 8 měsíci +24

      Flying to an active volcano sounds easier and possibly cheaper.

  • @Ocelot_King
    @Ocelot_King Před 8 měsíci +46

    Nice detail addition with the failed crush. Like to see the how thoughtful y’all’ve become 👏🏻

  • @andrewnephew3932
    @andrewnephew3932 Před 8 měsíci +15

    I love when LMG makes videos like this, talking about the logistics of tech. I just got my CompTIA and Pc Pro certifications this week. this video coincidentally lined up with the last few chapters and enlightened me more on the topic of degaussing.

    • @ChrisBigBad
      @ChrisBigBad Před 8 měsíci

      Gratz!

    • @Wr41thgu4rd
      @Wr41thgu4rd Před 8 měsíci

      CompTIA certs are an arbitrary plague on the industry, a shoehorned way for a guy to make money that means nothing. Congratulations anyway.

  • @Flightcontrol96
    @Flightcontrol96 Před 8 měsíci +140

    I had 2 dead 2.5" SSDs on hand a few weeks ago. I opened them up and used some snips to cut the chips into small shards. Kinda cathartic in a weird way.

    • @bmxscape
      @bmxscape Před 8 měsíci +20

      when i was in highschool me and my friends did some bad things and ended up putting our hard drives on train tracks and burying the pieces lol

    • @haydenkincaid5959
      @haydenkincaid5959 Před 8 měsíci +28

      @@bmxscapefriendly reminder that you have digital footprint😅

    • @kakurerud7516
      @kakurerud7516 Před 8 měsíci +2

      metal cantering punch will make short work of chips.

    • @macking104
      @macking104 Před 8 měsíci

      That takes time... this machine munches faster and destroys drive..

    • @Flightcontrol96
      @Flightcontrol96 Před 8 měsíci +1

      @@macking104 you're right cutting a drive up with scissors is much less time efficient than renting a specialized machine to do it for me

  • @TheRogueAdventurers
    @TheRogueAdventurers Před 8 měsíci +79

    I'd love to see a video comparing the different ways to delete, wipe and destroy data and drives then try different recovery methods to see which way to wipe data and which ways to recover data are the best.
    I'm especially interested in the destroyed drive taken to that cool drive recovery place they've made a video about before

    • @MTGeomancer
      @MTGeomancer Před 8 měsíci +7

      They would get nothing. The data recovery service is for fixing things like a physically broken drive, or one that's file system got corrupted. Things of that nature. For example on a broken drive they can disassemble the drive and put the platters into a machine to read them.
      They can't reconstruct what isn't there though. At best is what they mentioned in the video on older drives.

    • @manuelh.4147
      @manuelh.4147 Před 8 měsíci +1

      Like it says, one overwrite is enough. You aintT going to recover anything.

    • @dh2032
      @dh2032 Před 8 měsíci +1

      @@manuelh.4147 now you are wrong, in the old day data was in nice striate digital grooves of 0's and 1's the high capacity drive, do fancy tricks, yo get more data space, data is almost at edges over lapping the track, gooves, on the and to left and the on to the right, so the hardware of the drive already knows how recover data been partly wiped, it doing every time new data be add to drive.

  • @DavidLeeKersey
    @DavidLeeKersey Před 8 měsíci +43

    A professor I had in College worked for the DoD for a while back in the 1990s. The way they "declassified" hard drives at the time was with a sandblaster.

  • @gsuberland
    @gsuberland Před 8 měsíci +106

    Minor correction: "NIST SP 800-88", from 2006, is the original standard where the *old* recommendations came from (which was a derivative of a DoD standard), and it's the newer NIST SP 800-88 *Rev1* from 2014 that has more up-to-date standards that are relevant for modern media. The original standard was particularly unscientific and was largely written to satiate the paranoia of military types; Peter Gutmann, the guy who the ridiculous 35-pass wipe system was named after, once described the standard as a bunch of "voodoo incantations". The modern Rev1 standard is much better, with clear actionable advice around different media technologies, and even makes it clear where recommendations have been upgraded beyond what is reasonably necessary just for the sake of peace of mind.

    • @FlowPoly
      @FlowPoly Před 8 měsíci +7

      The most effective wipe method I found is by writing 2 random passes and then 2 passes of zeroes, this is also the national nuclear standard of data removal

    • @gsuberland
      @gsuberland Před 8 měsíci +20

      @@FlowPoly That is an old method and is no longer recommend or necessary. On a HDD it wastes a ton of time and unnecessarily ages the disk. A single random pass wipe is fully secure against recovery. On an SSD or USB stick, standard overwrite wipe methods (no matter how many passes you do) will not properly erase the data. The NIST SP 800-88 Rev1 standard discusses this problem in detail. On SSDs you should use ATA Sanitize (also known as ATA Cryptographic Key Reset), which is instant and causes no excess wear. This is not the same as Secure Erase, which guarantees security against simple recovery but does not guarantee security against chip-off recovery.

    • @Hanneth
      @Hanneth Před 8 měsíci

      @@gsuberland A single random pass wife if fully secure against recovery. Hahaha, very funny!
      There are a few open source projects that can recover that quite easily, not even getting into some of the more advanced options.
      There is a reason why intelligence organizations require a destruction greater than what is shown here.
      Heck, just look at 911. They were recovering information off of drives that were badly damaged and burned back then. You don't have to have much of an imagination to figure out what they can do today.

    • @RowanHawkins
      @RowanHawkins Před 8 měsíci +2

      In health insurance we did a 2T wipe. Followed by shredding to 1.5"/3-4cm size. Took about 3 minutes per 3.5" drive. They had sprung for a $15000 shredder years back. I tried to get them to go for a service when we decommissioned 960 12TB enterprise 3.5" drives.

  • @TampaMaximumMike
    @TampaMaximumMike Před 8 měsíci +6

    For actual hard drives, it is super easy to simply remove the platter and run it through a dimpling machine and then cut the platter in half. It also makes it possible to sort the material for recycling. For SSD drives, it is easy to cut them up with sheet metal cutters. Backup tapes are more time consuming to destroy. I usually take the DLT tapes apart and pop the ends off the tape reel. Then cut through them with a sharp razor knife or box cutter. This creates thousands of small pieces of tape that then goes in the shredder bin.

    • @unvergebeneid
      @unvergebeneid Před 8 měsíci +4

      When you open those helium drives, do you breathe in the helium and talk in a funny voice?

  • @adriansdigitalbasement
    @adriansdigitalbasement Před 8 měsíci +31

    Cool demonstration but I'm disappointed you didn't try using drives after degaussing them.
    I have found using manual degaussing on tapes has resulted in mixed results.

    • @Metal_Maxine
      @Metal_Maxine Před 8 měsíci +1

      Hey! Adrian! Never expected to
      see you here!

    • @EmilePolka
      @EmilePolka Před 8 měsíci

      that's probably a floatplane exclusive content then.

    • @kmontoya87
      @kmontoya87 Před 8 měsíci +1

      Although what I had used at the time was less sophisticated than the looks of this unit, results were indeed a mixed bag upon testing afterwards. I certainly would try a few out in the beginning if for nothing else a piece of mind knowing that there isn't just a speaker making the audible "thuddunk" noise lol.

    • @Metal_Maxine
      @Metal_Maxine Před 8 měsíci +1

      @@EmilePolka Nope. The Floatplane exclusive is Elijah and Sammy squishing various media.

    • @erkinalp
      @erkinalp Před 8 měsíci

      @@EmilePolka😂😂😂😂

  • @FlyboyHelosim
    @FlyboyHelosim Před 8 měsíci +40

    I bought a 2.5" hard drive from CeX a while ago that hadn't been erased. It belonged to a medical student and had all her work and personal data on it.

    • @christopheroliver148
      @christopheroliver148 Před 8 měsíci +3

      I've had a trash picker friend give me dumpster computers that have had _interesting_ stuff on them.

    • @forbiddenera
      @forbiddenera Před 8 měsíci +3

      I got a "laptop" from 85 with a half dead disk with personal data on it. Imagine the guys surprise when I msgd him on Facebook telling him I came across his 1988 resume.

  • @Blzut3
    @Blzut3 Před 8 měsíci +17

    SED drives do always encrypt even if "not enabled" so a secure erase still works regardless. Locking the drive just adds another key, which protects the encryption key, to prevent the drive from being moved between machines without first secure erasing it with the PSID printed on the drive.

  • @brizlebre1577
    @brizlebre1577 Před 8 měsíci +8

    Linus being excited about something I spend sometimes 8 hours a day doing makes me feel like I'm an old person watching my grand children play with a toy I used to love as a kid.

  • @DavidKhabinsky
    @DavidKhabinsky Před 8 měsíci +3

    Appreciate the dead body at @7:52. I'm glad the editors are having fun.

  • @PC_XP
    @PC_XP Před 8 měsíci +480

    This is too powerful, Somebody needs to stop Linus before it's going to be too late!!!!!

    • @helloukw
      @helloukw Před 8 měsíci

      Universe destruction is imminent.

    • @5ebliminal
      @5ebliminal Před 8 měsíci +2

      too powerful... yet they nerfed it up front by not using 220v

    • @zeruty
      @zeruty Před 8 měsíci

      Maybe we should all ship him our old dead hard drives so he has an abundance of drives to smash

  • @phunkydroid
    @phunkydroid Před 8 měsíci +22

    I was about to say that SSD crusher looks inadequate then you proved it with "the controller survived". Not every SSD has the same layout, there could have been a storage chip where that controller was.

    • @Darkk6969
      @Darkk6969 Před 8 měsíci +6

      Better off using an industrial shredder.

  • @aaronth777
    @aaronth777 Před 8 měsíci +117

    I used to work for a company who made degaussers and crushers like this and they are super cool. 10 tons of force on the crusher, and they're up to 40,000 gauss (4 Tesla) on the degaussers which is cool, but terrifying to work on when doing QA and the capacitors fail to discharge lol. A surprisingly small market but a lot of interest from big data companies. I don't work there anymore but they're a great group of people, Garner Products if anyone is interested.

    • @miljanorevic4760
      @miljanorevic4760 Před 8 měsíci

      what is the price for these kind of machines?

    • @Donnerwamp
      @Donnerwamp Před 8 měsíci +1

      What kind of caps are used there? The only ones I dare to handle are those up to 50V for small to midsized electronics projects because they still can ruin your day by popping or "suddently" discharging when your mind isn't fully there.

    • @Norweeg
      @Norweeg Před 8 měsíci +1

      The degaussers were fun back when I was destroying old spindle drives at a previous job. Some of the really heavy drives with a lot of platters would jump inside the sled with a satisfying thump.

    • @SecondSunofficial
      @SecondSunofficial Před 8 měsíci +1

      i work for a certain data center company and we use your crushers occasionally when our manglers are dead

    • @hyperzephyrian1145
      @hyperzephyrian1145 Před 8 měsíci

      @@miljanorevic4760 If they're NSA listed models usually 20-30k USD depending on options, non-listed are 6-15k.

  • @lywellyn0
    @lywellyn0 Před 8 měsíci +2

    As a small business IT consultant, I always recommend my clients use encryption on their drives. The possible speed hit is minimal in business use most of the time, and when we're done with the drive, we don't have to worry about data destruction. Taking it out of the computer with the encryption key is enough to resell the drive. I also find that encrypting a drive with bitlocker takes much less time than a DBAN old school overwrite method.

  • @WackoMcGoose
    @WackoMcGoose Před 7 měsíci +1

    For further viewing, I recommend an old Defcon talk called "And That's How I Lost My Other Eye: Explorations in Data Destruction". Yes, a lot of stuff goes boom.

  • @dancue599
    @dancue599 Před 8 měsíci +13

    This is a very interesting topic. I’d like to see the many different forms of data deletions…ranging from simply deleting by user to using this machine… put to the test by a professional attempting to find the data on the drives.

  • @Sidecutter
    @Sidecutter Před 8 měsíci +4

    These are super cool. I did a refresh for a bank I worked for back around 2010, and they brought in a portable one of these, basically just the crusher section with a big chonkin handle on top. We called it the taco maker.

  • @galaxywolf4895
    @galaxywolf4895 Před 8 měsíci +15

    As someone who has done enterprise level disk wipes (thousands at a time), it can take hours to a week depending on drive type, size, quantity, and number of controllers. Also, most companies either have a third party securely dispose of the drives, or they shred the drives into pieces around 1-2 cm in size. Also, you definitely do not want your junior tech responsible for the destruction of sensitive data, which could easily lead to them making a simple mistake and sensitive data, possibly getting out.

    • @jarhu86
      @jarhu86 Před 8 měsíci +4

      I have done thousands of data wipes. At some point also sent securely to melting facility. Reality is that enterprises should use disk encryption (which they usually do) and simply overwriting drives couple of times ensures it will be impossible to restore anything. It doesn't matter the size, it will take only 4-12 hours per disk to do 6-7 overwrites depending on size and you can have dozen or dozens written over at the same time. Doesn't matter if it is ssd or harddisk, nothing is restorable. Cheaper than shredding.

    • @extaza555
      @extaza555 Před 8 měsíci +3

      And less e-waste

    • @randomchannel5386
      @randomchannel5386 Před 8 měsíci

      @@jarhu86 It massively depends on who owns the data as well, for some levels of data i've dealt with complete destruction of the hardware is the only legally acceptable disposal method.

  • @otrab1080
    @otrab1080 Před 8 měsíci +3

    0:39 We need a LTT x Hydraulic Press Channel collab.

  • @sindrisuncatcher653
    @sindrisuncatcher653 Před 5 měsíci +1

    I know that for a long time, any company that dealt with like, US military projects was required to incinerate their hard drives after use, because sufficiently determined forensic analysis could pull useful information off even shards of a shredded disk after dozens of overwrites. So the crusher part on this is mostly just for decoration and giving you those nice dramatic 'after' pictures... but the degauser pulse is about as good as setting the drive on fire.

  • @PeterBrockie
    @PeterBrockie Před 8 měsíci +8

    One thing I've noticed with consumer SSDs using their internal full secure erase or SED erase stuff is that it's kind of unreliable depending on how old the SSD is and who makes it.
    I found when erasing drives for eBay recently that depending on the drive it would say it did its secure erase, but then I would find files on it using DMDE and have to either do it again or do a manual overwrite (which has a lot of downsides with SSDs the least of which is killing write endurance).
    I suggest if you're using any SED or BIOS secure erase stuff as a home gamer maybe doing a sanity check after to make sure the data is really gone.

    • @xXxJakobxXx3
      @xXxJakobxXx3 Před 8 měsíci +1

      I recently build a Linux server with an SED and documentation about SEDs is very sparse. If you use Bitlocker on Windows you have to go through a procedure of installing the SSD vendors software, reboot from this software and immediately enable Bitlocker after that. On Linux you have to install your on preboot environment in the non encrypted section. It is far from user friendly, so I would assume most people don't this functionality on their SSDs.

    • @Darkk6969
      @Darkk6969 Před 8 měsíci

      @@xXxJakobxXx3 I currently use Debian LUKS for full disk encryption which asks me if I wanted it during OS install. It's really easy to setup. Plus you can have several LUKS passwords as backups or for different users.

  • @TV4ELP
    @TV4ELP Před 8 měsíci +57

    Here government harddrives need to be shredded and the chips can't exceed a certain size .Depending on how critical the data is that size can be preeeety small

    • @FleaOnMyWiener
      @FleaOnMyWiener Před 8 měsíci +4

      How much trouble would you be in if you stole a non destroyed drive

    • @evilninja65
      @evilninja65 Před 8 měsíci

      @@FleaOnMyWienerin my experience you wouldn’t get the chance to, government drives and paper documents are typically witness destruction.

    • @slinkeyj3
      @slinkeyj3 Před 8 měsíci +13

      ​@@FleaOnMyWienerfrom my knowledge (and taking a slight guess that this person probably has a decent level of security clearance), he would be quite lucky to just get fired AND a sizable fine. (At least the US govt) tries to take data destruction very seriously for secure data storage devices

    • @MTGeomancer
      @MTGeomancer Před 8 měsíci +10

      @@FleaOnMyWiener Ever hear of Snowden? That kind of trouble.

    • @nicholastaylor7070
      @nicholastaylor7070 Před 8 měsíci +1

      I would say it would be 3 -5mm pieces, as that is dod standard I believe

  • @CosmicInfinity
    @CosmicInfinity Před 8 měsíci +70

    Man. I feel sad seeing the poor drives getting destroyed :(

  • @ManWithBeard1990
    @ManWithBeard1990 Před 8 měsíci +5

    My go-to method for recycling an old drive is to do a badblocks scan in Linux with the -w option. That writes and reads several different patterns to the drive, and confirms if it still works right.

    • @soundspark
      @soundspark Před 8 měsíci

      Remember software erase methods do not ensure over-provisioned storage is destroyed.

    • @ManWithBeard1990
      @ManWithBeard1990 Před 8 měsíci +1

      @@soundspark yeah, if you want it really secure I wouldn't recommend this approach for an SSD. Overprovisioning on a hard drive is usually much less, if it's even there at all. So it should be fine.

  • @fireninja7434
    @fireninja7434 Před 17 dny +1

    I work at an IT job and had to use the EMP and crusher. It's always fun and everyone always wants to have a look at a hard drive being crushed. In the end, destruction is always fun I guess.

  • @netropolis
    @netropolis Před 8 měsíci +26

    THIS IS HILLARIOUS!!! This is one of the parts of my job! I never thought of it as anything I would ever see on LTT! 🤣

  • @henlofren7321
    @henlofren7321 Před 8 měsíci +39

    It's funny how well Linus knows his audience of government agents

  • @mechguy83
    @mechguy83 Před 8 měsíci +16

    this is very interesting, a whole series on data center infrastructure would be cool

    • @newsama
      @newsama Před 8 měsíci

      Please no. LTT knows jack shit about datacenter infrastructure. Leave that stuff to the pros.

    • @slavb0i646
      @slavb0i646 Před 8 měsíci

      @@newsama LTT does data infrastructure cool

  • @skytek7081
    @skytek7081 Před 8 měsíci

    I work for a large contractor that was involved in the secret development of a new google datacenter complex. Part of Project Vandalay (yes, literally) was securing the whole building to keycard access, with extra shells of security around several offices, and the destruction of over a hundred laptops that were used, no matter how tangentially, on some aspect.

  • @williamcreel1316
    @williamcreel1316 Před 8 měsíci +1

    The one we have at work grinds them up. Apparently it was purchased with leftover budget at the end of year from a salesman they nicknamed "George Liquor". It has a dedicated power supply, and it uses a conveyor belt to feed the grinder. Everything has to be disposed of to DoD standards.

  • @Rudy97
    @Rudy97 Před 8 měsíci +24

    For M.2 SSD sticks I would use an induction heater coil to turn it back to sand in seconds.

    • @NicholasOrlick
      @NicholasOrlick Před 8 měsíci +4

      Depending on which organization you work for, some policies my delve into more stringent requirements for SSD destruction. Crushing it like they did in the video would probably be fine for most people, except for the government. The DoD policy on SSDs literally calls for disintegration or 1mm x 1mm pieces.

    • @GampyBamblor
      @GampyBamblor Před 8 měsíci

      Or just an ordinary cheap angle grinder....

    • @NicholasOrlick
      @NicholasOrlick Před 8 měsíci +3

      @@GampyBamblor well, technically speaking, throwing a SSD in an oven is less work than using an angle grinder. And also using an angle grinder, would not meet policy standards, depending on where you work.

    • @captainheat2314
      @captainheat2314 Před 8 měsíci

      @@NicholasOrlickif its dust no one can read it anyway

    • @NicholasOrlick
      @NicholasOrlick Před 8 měsíci +1

      @@captainheat2314 that’s what I’m saying if you incinerate it you can’t read it.

  • @blinddarm8478
    @blinddarm8478 Před 8 měsíci +17

    I'm really wondering why you didn't try to plug the hdd in after degaussing and see if theres data. Or even better trying out some data recovery programs and see if that alone had worked and if curshing was really necessary. Would have been interesting.

    • @Acorn_Anomaly
      @Acorn_Anomaly Před 8 měsíci +4

      There's no point. Going through degaussing renders the drive inoperable. Even if there's somehow data left in a small part of it, the tracking data on the rest of the drive missing means the heads wouldn't even be able to properly locate themselves, much less read anything.

    • @ryanmitcham5522
      @ryanmitcham5522 Před 8 měsíci +3

      @@Acorn_Anomaly I've only got your and some on screen graphics claim of that, it being demonstrated is much more interesting.

  • @Mile-long-list
    @Mile-long-list Před 8 měsíci +9

    i worked for a massive data destruction facility and this is not what was acceptable. this was only done after every single sector of the hdd was overwritten hundreds of times with a random number generator ( mersene twister ), after it was verified that every sector had been done several times, then it was physically destroyed such as this.

    • @miljanorevic4760
      @miljanorevic4760 Před 8 měsíci +4

      why

    • @rack_tech
      @rack_tech Před 8 měsíci +6

      After the Degausser, there is no data

    • @amogusenjoyer
      @amogusenjoyer Před 8 měsíci

      Hundreds of times? What was the data deletion standard that you guys had to implement?

    • @Mile-long-list
      @Mile-long-list Před 8 měsíci +5

      the same process was repeated 3 to 12 times (dod3) depending on the customer each pass was 36 so minimum 100 plus passes, i cant say the software name because it would identify the company but that was just step one for data wipe. step 2 was a massive degausser that was so violent the hdds would dance on it and jump it was nuts lol the noise it made was incredibly satisfying.after that was physical destruction. some required the whole process to be on camera some just required audits/reports. fun fact the highest security request we got was not from a bank but a major automotive company. we could only guess what they wanted destroyed but they asked for the most reporting, video, audits and signatures and proof that the hdds were converted to 3mm balls. they had to go through a hammer mill and chain shredder !

    • @unvergebeneid
      @unvergebeneid Před 8 měsíci +3

      ​@@Mile-long-listthere's thorough and then there's paranoid.

  • @MrWazzup987
    @MrWazzup987 Před 8 měsíci +1

    7:45 where'd the bag go Linus.
    New head cannon: not everyone was alright

  • @KforConstant
    @KforConstant Před 8 měsíci +1

    I'm thinking of putting this into my new build to help future proof it.

  • @Somerandom1922
    @Somerandom1922 Před 8 měsíci +37

    Data destruction is such an unfortunate but necessary part of life. Ideally you can get away without destroying the drive, but often it's not the case. Even when you can be confident in the data being erased (or encrypted with the key deleted) oftentimes businesses need the confidence only achieved by destroying the drive.

    • @suisse0a0
      @suisse0a0 Před 8 měsíci +6

      I can talk about that, my company has a couple of certifications and all of thems mandate DESTROYING harddrives... (even if we encrypt harddrive to begin with)

    • @filonin2
      @filonin2 Před 8 měsíci +10

      Businesses sound pretty insecure and need therapy.

    • @Cinkodacs
      @Cinkodacs Před 8 měsíci +11

      @@filonin2 How would you like all of your medical data out in the open? Or every transaction you made with a company? How about really important trade secrets that the original company can't prove, because they did not patent their solution? There is a fair amount of personal harm and property harm at risk, drive destruction may look overkill (because it frequently is), but the consequences of not doing so may be worse. This is exactly the kind of stuff we need to be pretty "insecure" about and go for maximum overkill.

    • @turbochargedfilms
      @turbochargedfilms Před 8 měsíci +1

      ​@@filonin2 maybe if you went to therapy you'd learn a little about reflection.

    • @extaza555
      @extaza555 Před 8 měsíci +1

      Yh.. and how would you recover that data after software shredding the drive multiple times? Genius...

  • @e-ric3052
    @e-ric3052 Před 8 měsíci +17

    While Linus was talking about the degaussing feature, I got a kick out of the body bag under the whiteboard when he asked, if anyone nearby had a pacemaker.

  • @Hyperion9700
    @Hyperion9700 Před 8 měsíci +11

    I didnt even know Data Destruction was a thing. Super interesting video ! Thank you LTT.

  • @Aftermost3590
    @Aftermost3590 Před 8 měsíci +2

    Oh man, I use to sysadmin a data center and was tasked with creating a shredding server where any drive connected to a specific controller would be discovered, smartctl checks run on it, and then shredded using the shred package on Linux and indicate whether it was to go back into prod or to be physically destroyed, and then sound out reports to the DC manager. This cart would've been so wonderful to have.

  • @SGCSmith
    @SGCSmith Před 8 měsíci +1

    On the question about erasing tons of drives with Secure Erase and Overwrite - You can use a product such as the Destroyinator, which is basically a 45Drives Chassis loaded up with Linux and a copy of Killdisk Industrial to perform bulk erasure AND compliance reporting of disks. It's pretty cool. You hot swap the drive into one of the drive bays on the 45Drives chassis, it'll automatically destroy the data, and if a disk fails for any reason, you'll get a report saved and can send it off to get Degaussed and/or physically destroyed.

  • @01Durhamguy
    @01Durhamguy Před 8 měsíci +4

    when linus asks if anyone has a pace maker am i seeing a corpse under a blanket near the white board? lol

  • @angryjoshi
    @angryjoshi Před 8 měsíci +5

    What always also works is running 800VDC from a supercap thru the power connector in addition to crushers, that burns the chips nicely before you crush them, then theres nothing to be read even if you somehow managed to get a partial nand chip working

    • @nanielwolf5768
      @nanielwolf5768 Před 8 měsíci

      Im surprised that method is not used, but maybe its to safety concerns.

    • @angryjoshi
      @angryjoshi Před 8 měsíci

      @@nanielwolf5768 it doesnt comply with standards, but i like doing it in addition knowing noone will ever recover anything from those.

  • @matthewjalovick
    @matthewjalovick Před 8 měsíci +5

    I like the Red Dead Redemption font you guys used for Uncle Linus’s quote :) I’ve always just filled my entire drive to the brim with video files and then formatted it in order to permanently erase the data.

  • @SulliedLight
    @SulliedLight Před 8 měsíci +1

    7:48 appreciate the bit

  • @uhkapeli
    @uhkapeli Před 8 měsíci +1

    That looks like a very low end machine.
    Used to work at a place that had a machine 4x the size just for shredding(yes, shredding) old HDDs/SSDs.
    It had a massive steel plate that came down like a hydraulic press and sliced 2cm chunks off a HDD.
    Government related HDDs had to be sliced into 1cm slices.

  • @buckykattnj
    @buckykattnj Před 8 měsíci +5

    The SSD chip crusher busted up the chip enclosure... but did it actually crack the chip die? Offhand, I'm not familiar with the size of dies used for nand chips, but a lot of chips use very small dies. What keeps one from extracting the surviving die and repackaging it?

  • @Jh3454-df5vm
    @Jh3454-df5vm Před 8 měsíci +10

    Amazing setup.... but the 50 gallon drum outside I burn used motor oil in makes short work of these drives as well.

  • @KomradeMikhail
    @KomradeMikhail Před 8 měsíci +4

    Linus paid $30,000 for DBAN and a sledgehammer.

  • @efari
    @efari Před 8 měsíci +1

    Lol @7:48
    “Everybody is still standing” while there’s a body bad behind him 😆

  • @Respectable_Username
    @Respectable_Username Před 8 měsíci +2

    Now I'm super curious what was on those drives. Were those LMG-owned drives, or did they contract out to a bunch of local businesses with the offer to properly destroy their old hard drives on the cheap while they had the machine with them?
    Actually, for only a $1000/month cost, I can see why some people have made small businesses out of chucking one of these in the back of a van and driving around to those who need data destroying. Would be quite a simple operation, assuming there's enough demand in your region!

  • @Wayhoo
    @Wayhoo Před 8 měsíci +4

    It's not a Linus video without him damaging products!

  • @michaelschmid2311
    @michaelschmid2311 Před 8 měsíci +4

    Some guys I know (they refurbish laptops for poor People in our country) and they wrote a program with numpy to manually overwrite and nullify every bit of a harddrive. It’s surprisingly performant (but we are still talking multiple hours a drive. Because they overwrite every bit multiple times as you said) They got a thread ripper server running Linux just for erasing disks from old company laptops .
    As far as I know they’re Procedure is good enough to pass some certifications but I don’t know which

    • @VADemon
      @VADemon Před 8 měsíci +1

      "numpy" "threadripper" "performant"
      It's not 1990s and you'll only be limited by the drive's write speed.

    • @unvergebeneid
      @unvergebeneid Před 8 měsíci

      ​@@VADemonunless you insist on true randomness for some reason, in which case that's definitely gonna be the limiting factor unless you have specialised hardware.

    • @VADemon
      @VADemon Před 8 měsíci +1

      @@unvergebeneid that's silly. even if the requirement were to be non-repeatable securely random oberwrite (why?) the performant way would be to generate a cryptographically random stream with AES, which is already accelerated to gigabytes/s per core on Zen microarchitectures.
      Actually I think the only technical explanation for Threadripper would be its I/O capabilities.

    • @unvergebeneid
      @unvergebeneid Před 8 měsíci

      @@VADemon I agree. There are tools, however, that are limited by the entropy pool. Not that more cores would help with that.

  • @the1observer
    @the1observer Před 8 měsíci +5

    A machine made for Seagate drives. My dream machine.🎉🎉🎉

  • @Dopeykid666
    @Dopeykid666 Před 8 měsíci

    I actually manage a data sanitization/destruction setup. I setup and maintain servers that will utilize pxe deployable software to write over disks of any kind, as well as supporting in situ wiping/diagnostics for devices with built in storage i.e mac, tablets, phones etc. I also validate the software level destruction with third party tools that check the hashes to ensure the writes were successful. With all that being said, the most fun part is absolutely the big shredder on wheels that we have! Nothing beats watching a drive get mangled to smithereens and dropped into a bucket. Makes me smile everytime!

  • @John.S92
    @John.S92 Před 8 měsíci

    If you wanna go "all out", remove the HDD's metal lid exposing the silicon discs, unscrew the cap holding them in place to remove said discs, then, turn on the acetylene torch and turn the silicon discs into molten metal.

  • @jeo2222
    @jeo2222 Před 8 měsíci +10

    I love this type of education content!

  • @Nabeelco
    @Nabeelco Před 8 měsíci +5

    The problem with a lot of these papers are: There's never been a single recorded incident of someone being able to recover data from a drive that's had a single pass of zeros written to it. Yes, in theory you could figure out what was there before the single pass erase... but in practice, no one has managed to do it yet.

  • @stormgear896
    @stormgear896 Před 8 měsíci +6

    Question: Can destroyed hard drives, SSD's be recycled? I wish the video covered that too.

    • @MTGeomancer
      @MTGeomancer Před 8 měsíci

      The same as any other e-waste. Shipped to china where they salvage anything worth anything, and the solvents get dumped in a river/lake and the solids get thrown into a landfill or incinerator.

    • @halomika4973
      @halomika4973 Před 8 měsíci +1

      Probably as much as other technology.

    • @JustCallMeEm.
      @JustCallMeEm. Před 8 měsíci +2

      Theoretically, yes. However having worked for a hospital, recycling classified material was considered unsafe, all our paper and destroyed hard drives went to a secure facility (presumably a landfill)

    • @matthewnirenberg
      @matthewnirenberg Před 8 měsíci +3

      Generally speaking nope. The problem is if you crush it as one entirely assembled drive, everything becomes one or a bunch of mixed scraps. The better solution would be for platters to be destroyed separate from the hdd controller and the body of the drive. Circuit boards once broken can't be recycled as no one is going to seal the broken edges of multi-layer boards just to reverse electroplate them.
      If they gave a damn about preventing ewaste they'd open the top cover of the drives, smash the platters and recycle the rest; for SSD's they'd only destroy the NAND chips and/or the controllers (could drill through them).
      The method shown in the video creates nothing but ewaste.
      To anyone who goes "but Snowden" - remember, he didn't steal drives, he snuck files out of a microSD card he smuggled in and out of a secure facility.
      The solution to not need to physically destroy drives is to use encryption and simply destroy the keys and then create new ones, then write zeros to everything.

    • @captainheat2314
      @captainheat2314 Před 8 měsíci +1

      @@matthewnirenbergbut then governments cant greenwash as effectively by throwing things into landfills instead of recycling

  • @jarikooper6325
    @jarikooper6325 Před 8 měsíci

    I once visited a data center for my school and they showed me how they destroy data, crush the drives and register them as destroyed. It was the exact same process as this video. They also showed me a rig of about 6 full size racks filled to the brim with jbods. The jbods where modified to easily swap out the drive. They used that rig to erase data off the drives for reuse. Its really cool technology.

    • @jarikooper6325
      @jarikooper6325 Před 8 měsíci

      The only thing they did differently was the destruction of ssd’s instead of bending the nand chips the poked physical holes in the pcb and chips. Might be a better way instead of bending

  • @jeffgros8508
    @jeffgros8508 Před 8 měsíci

    After overwriting the data, I always open up spinning drives and slice up the platters. Plus there are powerful magnets to be harvested in spinning hard drives! Too useful to throw away! For SSDs, I take the memory chips off the board, cut the leads off, and then melt the chips. I break the pcb for good measure.

  • @AdamBrackney
    @AdamBrackney Před 8 měsíci +11

    Leasing for less than $1000 a month 😂. The whole cart is worth maybe $5000 at most. Gotta love hardware as a service.

    • @MTGeomancer
      @MTGeomancer Před 8 měsíci +4

      Especially since they said it was using a Raspberry Pi...

    • @mygamertag2010X
      @mygamertag2010X Před 8 měsíci +3

      Bad take. Many outfits don't need to own one of these, and maybe require the use of this type of machine once or twice every decade. The cost of ownership doesn't make sense for upfront cost, storage space, maintenance, etc. Nearly every outfit would rather rent/lease this machine when they actually require it's use instead of holding onto it and spending more money.

    • @AdamBrackney
      @AdamBrackney Před 8 měsíci +1

      @@mygamertag2010X Lol. Data Centers are obviously the main clientele. Once or twice every decade 😂

    • @rack_tech
      @rack_tech Před 8 měsíci +3

      We actually have a client using our MDDS currently, and they process around 1k-2k drives per month

    • @AdamBrackney
      @AdamBrackney Před 8 měsíci +1

      @@rack_tech Sounds like the exact kind of Customer they're made for!

  • @Finite-Tuning
    @Finite-Tuning Před 8 měsíci +4

    That thing is ridiculously over priced for the simple thing it is!

  • @ingocernohorsky
    @ingocernohorsky Před 8 měsíci +5

    isnt there an option to recycle the drives or at least parts of it?

    • @0106johnny
      @0106johnny Před 8 měsíci +1

      The hard drive shreds will be recycled just like other e-waste

    • @spartan8705
      @spartan8705 Před 4 měsíci

      The PCBs can be recycled, sure, but any data-containing component is destroyed

  • @D4M14N1989
    @D4M14N1989 Před 8 měsíci

    The best data destruction method is to plan ahead and to use full disk encryption from day 0 with off disk encryption keys. This is how most enterpriuse storage arrays now work, and destroying data at the end of life is as simple as rotating the encryption key. SSD's also encrypt all data internaly by default, however the encryption key is stored in device.

  • @therealcthulhu9813
    @therealcthulhu9813 Před 8 měsíci

    I used to work in a Goodwill computer works department and because we had to reuse drives for our builds we had to make sure they were all properly wiped. So we actually had a set up using large KVM switches and old motherboards on shelves to run 3 pass DBAN on multiple drives in parallel so we could have enough drives for production. We usually wiped drives between 250GB and 2TB with the occasional 4TB or higher but even then those still took awhile to wipe just on the 3 pass. I can imagine not wanting to 3 dozen passes on server level drives those wipes might take weeks.

  • @TheStaniG
    @TheStaniG Před 8 měsíci +3

    This is literally just an overly complicated, likely HILLARIOUSLY overpriced hydraulic press because of pencil pushers.

  • @AndyRome
    @AndyRome Před 8 měsíci +4

    YES! I need this in my life for next time I need to 'wipe' a drive.

  • @ta985
    @ta985 Před 8 měsíci +4

    The cloud-service kinda seems like a downside to me. Happen to know if you could host your own database onside? Otherwise, a pretty neat product

    • @pwii
      @pwii Před 8 měsíci

      good point, but the problem with hosting things on site is what if there's a fire or other environmental catastrophe and all of your data is lost? these records are required by the government so a scenario like that is not acceptable, and the cloud service is probably replicated on multiple continents with many copies of the data so it can never be lost

    • @dekkonot
      @dekkonot Před 8 měsíci

      It seems like they're selling a service instead of a tool, based on how Linus mentioned renting those carts.

    • @ta985
      @ta985 Před 8 měsíci

      @@pwii If anything, sending the data across the internet and storing in another companies hands (probably in some other country) seems to me like it would increase cost and risk.
      Easpecially if you already are a hoster and have redundant systems

    • @amogusenjoyer
      @amogusenjoyer Před 8 měsíci +2

      To be fair, corporations like to have something that just tracks this for them automatically. It helps with compliance. No one actually wants to spend a lot of time on this, it's just one small part of a business process so again, the less stuff you have to worry about keeping and managing the better.

    • @ta985
      @ta985 Před 8 měsíci

      @@amogusenjoyer Well that makes little sense then, because if you're not willing to spend time on it, why have someone run that machine at your locations. Have the disks picked up and destroyed with proof of destruction like most do anyway...

  • @TheVirusWar
    @TheVirusWar Před 8 měsíci +1

    If you wonder if something like this is actually used - > Yes. It is.
    I work for a global, huge ass, automotive industry company as an IT specialist, and we have procedures for drives older than 5 years.
    Frist we nuke them by using a special device, similar to the one showed in the video. Then they are handed over to the maintenance department where they cut them in half (under our supervision). Afterwards we pack them in locked containers, and they are sent to a company that destroys them completely.
    Too much? Probably. But on another side, in a game with enormous players, information is everything. Some piece of data that falls into the wrong hands, even if actually harmless, if presented the right (wrong) way can ruin even the largest companies.

  • @Jaxdrill
    @Jaxdrill Před 8 měsíci +1

    Just having a degausser was a fun time when I worked data center for some OT work at a former job. Now if only we had the destructiveness of crushing, but still fun either way.

  • @JakubVacek42
    @JakubVacek42 Před 8 měsíci +7

    They need an AI model to read a bar code from a picture? Really? Like REALLY?

    • @michaelbell6602
      @michaelbell6602 Před 8 měsíci +3

      There are thousands of models of hard drive and the order of barcodes can vary. It’s to help the program decide which long string of numbers is the model and SN without creating and maintaining a massive lookup table

    • @cassist000
      @cassist000 Před 8 měsíci

      OCR has always been based on ML/AI

    • @LiEnby
      @LiEnby Před měsícem

      @@cassist000 not *always*, but yes it is alot older than the current AI scamGPT train

  • @Dewey_the_25U
    @Dewey_the_25U Před 8 měsíci +4

    Honestly, if it wasn't for the Degaussing, then its not be secure for certain kinds of data.

    • @potatopobobot4231
      @potatopobobot4231 Před 8 měsíci +2

      its almost like thats why they put the degausser on there and not just a crushing device. hmmmm

    • @rack_tech
      @rack_tech Před 8 měsíci +2

      Yip, we wanted a redundant destruction system.

  • @beepingsheep85
    @beepingsheep85 Před 8 měsíci +2

    I worked for an IT recycling and DATA destruction company for 2 and a half years. They had a warehouse sized convayerbelt hard drive destroyer capable of destroying 100 hard drives in minutes. Everything was shredded to tiny parts smaller then your nail and magnets would pick out different materials, with a shaker as well, placing them in different containers. As for myself, I was part of the DATA removal side where we had 3 racks of 50 hard drive bays running a 1, 3 and 7 "wipe" system. The system would actually do a full wipe and then rewrite 0's on a full drive and the more you paid the better the wipe was.
    Now the shady part of all this, we had highly and I mean highly sensitive data on these drives, the company boss would frequently cut corners to save and make as much money as possible, we were ordered to remove the sticker identifiers from high grade hard drives and stick them on old scrap ones that nobody wanted. This was to fool companies who wanted to see the hard drive destroyed. To make matters worse, the shredder was put on the slowest setting, the warehouse was freezing cold/roasting hot, no drinks were allowed in the warehouse and no chairs were ether.
    They would be told it would take hours to shred and they would have to stand in one place and not be allowed to go anywhere without permission from the higher ups, or they would be invited into a cosy, climate-controlled room with comfy chairs, a 50 inch screen TV and they could watch whatever they wanted. To sweeten the deal, at lunchtime the boss would pay out of his own pocket for takeaway food for them to enjoy. The room had top-of-the-range coffee and tea machines, a range of energy drinks, fancy waters etc, all perfectly chilled. No staff were allowed in the room, just the guests, the boss and the sales manager.
    The hard drives that were to be destroyed would be wiped and placed in decent to high end PCs that would be sold in bulk on the "cheap" to start up companies that wanted the best, but could be made at half the price.

  • @CouchCoach
    @CouchCoach Před 8 měsíci

    We send our drives to a company specialized in destroying data (from printed pages to drives of any kind). They put drives through a crusher / metal shredder which makes sure that the biggest piece of anything thrown in it is less than a cm in any dimension. Usually the pieces are more like confetti.

  • @mifo2000
    @mifo2000 Před 8 měsíci

    I used to be a hydraulic technician.
    one company we did work for was some kind of file destroying place. from paper files to hard drives.
    For hard drives they just used a fine blade metal crushers, every single piece of scrap would drop to the bin bellow and none of the scrap would be any bigger then 3mm.
    No de magnetising but an impossible puzzle to put together especially when your crushing 10 or more drives at once and they are mixing into 100 other crushed drives in the bin already.

  • @dj_paultuk7052
    @dj_paultuk7052 Před 8 měsíci

    Im a DC HW engineer and the machine we have actually Shreds all the metal. So 1000 bits of metal comes out the other end. It all then goes in a skip and goes for metal recycling. We have over 1000 physical servers and can go through 60 drives per week in just normal failures.

  • @52Ford
    @52Ford Před 8 měsíci

    My dad used to be a service tech working on large server installations amongst other things. IIRC, back in the 90's, protocol at his company (very large international corporation) was to drive a 1/4" slotted screwdriver through the hard drive with a hammer before disposal. He may have had to do that in two spots to make sure the drive was extra dead.

  • @Francois_B
    @Francois_B Před 8 měsíci +2

    Laughed at the body bag in the background after Linus asked if anybody had a pacemaker… 😂

  • @jojokokolo2121
    @jojokokolo2121 Před 8 měsíci

    At the company I used to work for we shred the hard drives into pieces or dust, also the NAID standard forbids video footage in the area of destruction, that’s in US though not sure about CA. We would also erase the drive’s data before destroying them.

  • @shinjisan2015
    @shinjisan2015 Před 8 měsíci +2

    Depending on the classification of the data, some drives also need to be shredded so no single particle is greater than 3mm in size.

  • @thedorsetflyer9113
    @thedorsetflyer9113 Před 8 měsíci +1

    I used to do this for defunct military hard drives. Used Blancco data erasure software and then they would be crushed into effectively plastic sand. If the erasure software didn’t work due to a really broken hard drive, then we had to drill through them several times before they went to the crusher. Always a fun Friday afternoon job…

  • @Lylacelixir
    @Lylacelixir Před 8 měsíci

    Worked in data storage and destruction at a government facility, we just stored drives and tapes on pallets then would have a shredder company come by with basically a truck with a wood chipper in it to shovel drives into

  • @JMonroe07
    @JMonroe07 Před 8 měsíci +2

    I don't comment very much but i loved this video please count this as my vote for a video with the shredder or any other things relating to this type of content so entertaining and fun to watch.

  • @mastergx1
    @mastergx1 Před 7 měsíci

    I used to work for a company called "Device" where we took old computers from large companies and repurposed them for schools in 3rd world countries. One of the first things we did is run a dos program (I can't remember the name of it) that would spend about 6 hours overwriting the drives to comepletely erase any data that was stored. Apparently, this software worked on the binary level, you could even choose if you wanted all 0s or all 1s. If for whatever reason we couldn't erase a drive, it would have to be destroyed. We smashed them to bits with a lump hammer and incerated them.

  • @z0phi3l
    @z0phi3l Před 8 měsíci +1

    Back in 08 worked at a Navy depot imaging machines, we would also sometimes get a used machined returned to the shop. we had an old file cabinet with a lock full of hard drives, most with red stickers, I was one of the few with the clearance needed to work those and remove the drives, never did get to see the process of destroying those