- Joined
- Aug 28, 2019
Late as shit but I hope anything with Johann/Scott Sveinsson is well archived before Linus Group goes Stalin on his ass.
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
To be clear, I'm not a certified authority on the subject, but as I understand it SSDs (so long as they are somewhat modern) can also be securely wiped, it just requires a somewhat different method than with HDDs. The only reason governments or certain very secure industries stick to total physical destruction is to safeguard against unknown or future recovery technologies that could potentially make current full-erase standards obsolete, but as far as current known tech goes the DoD (govt approved) standard (disregarding total destruction) utilizes a 3 pass full zero/noise overwrite and verification protocol to make an HDD fully irrecoverable and similarly a full zero/noise overwrite with sector trimming followed up with the ATA Secure Erase protocol to overwrite and change the SSD encryption key should also theoretically be enough to make an SSD irrecoverable as well. Where it is somewhat less certain is in regards to older SSDs before sector trim and full disk encryption keys were implemented. Also, using a sufficiently sophisticated encryption algorithm and complex decryption key prior to the data being written to SSD should also be enough to make the data practically irrecoverable barring some future super ultra quantum computer capable of brute forcing the decryption key.theres probably a more tech literate kiwi that can explain it better (or say im wrong), but because of wear leveling its impossible to fully "wipe" an SSD. However you can easily destroy data on a HDD
I think one pass ofYeah, but that's all closed source and who knows how well it's implemented. Most consumer drives' firmware is pretty much copypasta trash. A study I've seen suggests wiping the whole drive twice with noise from /dev/random and then putting it on a shelf (under your physical control) somewhere in case you want to use it again. If you're paranoid or whatever was on there is highly sensitive you do the random wipe and then just smash all the chips and then there's no getting anything back.
/dev/random
or /dev/zero
is enough, unless there was a random page ready to be flushed out there.dd if=/dev/zero of=/dev/sd#
Like, didn't this race-mixer had previous experience to at least not screw it up? He has to be such a nigger.You think this is bad? Linus incorrectly installed a prototype cpu cooler, negatively reviewed it, and then sold it at auction. That son of a bitch
He's now branded a pedo. Man, this pile of degenerates of LTT make me long for the return of lynchings.Nonce repping the LTT merch. Shame it's not branded.
LTT bullying an autistic child into suicide, while perpetuating the lie that KF is responsible for total tranny death.And I'm definitely missing something
I think you are on spot. Unless I'm missing a detail,Don't use /dev/random to securely wipe your drives, it's slow. Just encrypt it with a random key and fill it with ones, then encrypt it again with a new random key and fill it with ones again, until you've done enough passes to feel secure.
dd
will copy through userspace, which is shit. But if you use cryptsetup
it'll be much faster because it'll happen in kernelspace by making use of dm-crypt
.You’re still wiping the drive with dd. You’re just doing it by encrypting a stream of ones (which is very easy and done almost entirely with ASICs) instead of by writing pseudorandom numbers created by TPM/kernel noise (very slow once you’ve depleted your entropy). Running cryptsetup alone won’t scrub the drive, it just writes a partition header telling the operating system what’s going on.I think you are on spot. Unless I'm missing a detail,dd
will copy through userspace, which is shit. But if you usecryptsetup
it'll be much faster because it'll happen in kernelspace by making use ofdm-crypt
.
Yet.So it wasn't the fat tranny.
Thank you based crackhead, adding it nowLTT bullying an autistic child into suicide, while perpetuating the lie that KF is responsible for total tranny death.
I wonder why he has that 2TB HDD?
I don't think he chose a HDD over an SSD due to an easier wiping process, as while its more of a pain to fully wipe an SSD than a HDD, its definitely doable. Destructive means will also do the job fairly well on both.theres probably a more tech literate kiwi that can explain it better (or say im wrong), but because of wear leveling its impossible to fully "wipe" an SSD. However you can easily destroy data on a HDD
Please explain, I'm a boomer. (There's a gayming chair but it's practically mandatory for a streamer, in the sense that the sort of people who watch streams consider them high-status and wouldn't accept a chairless plebeian.)Reason why I mainly found this interesting is that in one video you can clearly see his pedo battlestation and it's just absolutely what you would expect.
Gayming? Video processing? Raw photos from a professional camera? Watching normal consoomer videos? I watch a cartoon, it alone is 400GB. I have several 4TB HDDs and two powered enclosures (no "battlestation") and I don't even hoard data. How much space does e.g. Marvel capeshit take? There's a lot of capeshit fans.I wonder why he has that 2TB HDD?
I don't know.My bet is for Anthony is it goes one of two ways:
1. he's a giga-degenerate who has the most mortifying pedo / animal abuse shit imaginable.
2. he's a giga-degenerate who has the most mortifying pedo / animal abuse shit imaginable, but because he developed his sexual proclivities via Chinese cartoons he literally can't get it up to anything real, and therefore only has terabytes worth of weebshit rather than IRL child abuse.
I don't see an option where he isn't a giga-degenerate.
Yeah, I thought it'd be this abomination.
View attachment 5503707
It depends. Self encrypting SSDs like Samsungs EVO or Pro series generate and use a random key to access the on drive data. The data on the drive is useless and indeceiferable without it. That key can be permanently erased and reset by sending a single command to the SSDs controller. The data on that drive is essentially lost at that point. There's no way to externally dump that key by the way or back it up.theres probably a more tech literate kiwi that can explain it better (or say im wrong), but because of wear leveling its impossible to fully "wipe" an SSD. However you can easily destroy data on a HDD
If full system encryption is used, the unencrypted data never touches the SSD, so it doesn't even matter.theres probably a more tech literate kiwi that can explain it better (or say im wrong), but because of wear leveling its impossible to fully "wipe" an SSD. However you can easily destroy data on a HDD
A filthy setup means a filthy mind, which means even filthier internal data on the computer, case in point. A sane person(non-pedo) would at least dust if off like once a month or so, every three months at the bare minimum.Please explain, I'm a boomer. (There's a gayming chair but it's practically mandatory for a streamer, in the sense that the sort of people who watch streams consider them high-status and wouldn't accept a chairless plebeian.)