Do I need to Wipe/Erase my SSD Partition after removing Bit-locker


  1. Posts : 1
    Windows 10
       #1

    Do I need to Wipe/Erase my SSD Partition after removing Bit-locker


    I own SanDisk 256gb SSD, It has 2 Partitions C: for Windows & D: for my personal data. I have encrypted Drive D: with Bitlocker in Win 10.

    Now for the purpose of resale should I completely Wipe Partition C & D (so that purchaser couldn't recover any of my files) or it is impossible to recovery as it was having Encryption ? Thanks :)
      My Computer


  2. Posts : 4,752
    Windows 11 Pro 64 Bit 22H2
       #2

    Most normal computer people cannot recover files off of a formatted drive.
    Because the drive was encrypted, the files will no longer be accessible if the drive is formatted and they do not have the password
    If you are paranoid, wiping the drive is a good idea.
      My Computer


  3. Posts : 5,899
    Win 11 Pro (x64) 22H2
       #3

    You assume every computer person is "normal". That assumption is what allows hackers to hide in plain site. Anyway the OP intends to sell the drive and may not have an idea of who's going to buy it, thus their security concerns do matter and they are not being "paranoid".

    That said, I'm not sure how Bit Blocker works with regards to needing to wipe the drive after the drive has been removed from the affected machine. In short, I don't have the answer as to whether the drive actually needs further wiping.
      My Computers


  4. Posts : 18,424
    Windows 11 Pro
       #4

    If it's that much of a concern, just run something like MiniTool Partition Wizard and select wipe drive. Remember we are talking about an SSD here - an SSD is much harder to use forensics to recover data on than a traditional HDD. You can even do it with MiniTool Partition Wizard installed on the drive you are about to erase, it will reboot the computer, load itself into memory, and then wipe the system drive.

    Do I need to Wipe/Erase my SSD Partition after removing Bit-locker-capture.jpg

    Recovering Evidence from SSD Drives in 2014: Understanding TRIM, Garbage Collection and Exclusions | Forensic Focus - Articles
      My Computer


  5. Posts : 5,899
    Win 11 Pro (x64) 22H2
       #5

    My question to you, NavyLCDR - is this really necessary being the drive "was" previously encrypted with Bit Blocker?

    Just curious.
      My Computers


  6. Posts : 11,247
    Windows / Linux : Arch Linux
       #6

    sygnus21 said:
    You assume every computer person is "normal". That assumption is what allows hackers to hide in plain site. Anyway the OP intends to sell the drive and may not have an idea of who's going to buy it, thus their security concerns do matter and they are not being "paranoid".

    That said, I'm not sure how Bit Blocker works with regards to needing to wipe the drive after the drive has been removed from the affected machine. In short, I don't have the answer as to whether the drive actually needs further wiping.
    Hi there

    My own take on this is that if you are that paranoid (no disrespect here -- these days you never can be too careful with computers) is that you should re-format the drive and then use one of those programs that writes X'00' (Hex zeros) to every data area on the HDD / SSD. If you are using Windows then NavyLcdr's post is good too.

    If I'm repairing anybody's computer that's had a virus on it for a start I boot up their machine with a Linux distro from a USB, reformat the HDD with Linux EXT4 (mkfs.ext4 command) and do my erase with X'00' before re-formatting the drive with NTFS and recovering Windows. The Linux "secure erase" utilities are a zillion times faster than the Windows ones - also re-formatting the HDD / SSD with ext4 (only takes a few seconds even on large TB HDD's) gives another level of "deletion" so doubly secure.

    Note - people like CIA / Mossad / Police etc can often decrypt things like Bitlocker from domestic machines -- commercial military grade encryption is obviously (or hopefully !!!) much harder to break.

    Personally I'd rather DONATE an old / unwanted computer to some organisation that needs it rather than sell it on the open market - but that's an individuals choice.

    As for relying on a Used HDD / SSD for "production" or everyday running machines - I'd never buy one -- although for using in a test lab / making backup copies of data it's probably OK though - I've loads of 2.5 inch HDD's from old laptops etc - these are useful for all sorts of purposes.

    Cheers
    jimbo
      My Computer


  7. Posts : 5,899
    Win 11 Pro (x64) 22H2
       #7

    First and foremost I'm always the one telling people if their that paranoid they shouldn't be using electronic devices. In short I DON'T subscribe to the tin-hat society! Now that that's out the way - Just because one wants to practice sound security measures doesn't make one paranoid. I think a bit of common sense is in order here.

    If the measure isn't required, it isn't required. I think that's what the OP is asking. And also what I asked. No one is being paranoid here.

    Anyway, when I trash a hard drive I'll drill a hole through it. And the only people who get my old hard drives are family members, but this is after a simple reformat and OS install. Were I to sell a drive to say a stranger, I might take more secure measures in wiping the drive. That's me. Anyway that doesn't make one paranoid, that makes them security conscious.

    All locks do is keep honest men honest, an thief will find a way if they want it bad enough. Thus you can't go through life worrying.

    Peace
      My Computers


  8. Posts : 234
    Windows 10 Pro (x64)
       #8

    jimbo45 said:
    Note - people like CIA / Mossad / Police etc can often decrypt things like Bitlocker from domestic machines -- commercial military grade encryption is obviously (or hopefully !!!) much harder to break.
    FYI, your military grade encryption is what Bitlocker uses. AES is the encryption scheme the US government uses to encrypt confidential information. Currently it is not possible to decrypt AES using any brute force means. Instead other means of obtaining the key are used. The weakness of the encryption is the key and how well you guard it.

    Your military grade encryption can easily be broken, if you posted-note the password nearby for example. That is how they get around the encryption.

    The only way to decrypt Bitlocker is by getting access to the key.
      My Computer


  9. Posts : 18,424
    Windows 11 Pro
       #9

    sygnus21 said:
    My question to you, NavyLCDR - is this really necessary being the drive "was" previously encrypted with Bit Blocker?

    Just curious.
    I would say no, so long as you deleted the partitions without decrypting them.
      My Computer


  10. Posts : 5,899
    Win 11 Pro (x64) 22H2
       #10

    NavyLCDR said:
    I would say no, so long as you deleted the partitions without decrypting them.
    Thank you.

    Peace
      My Computers


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 13:46.
Find Us




Windows 10 Forums