top | item 15837182

Can I erase sensitive data on an old hard drive with Neodymium Magnets?

105 points| artbristol | 8 years ago |kjmagnetics.com

127 comments

order

EvanAnderson|8 years ago

Here's my anecdote: In 2006, while sitting at my desk playing a video on the hard disk drive of my Thinkpad T22, I held a single neodymium magnet (harvested from an old hard disk drive) about 6 inches from the left side of the unit (where the ~40GB-ish Travelstar 2.5" PATA disk was located). The video froze, Windows XP blue-screened, and the hard disk drive started emitting a ~10Khz whine. I jerked my hand away from the PC immediately when the whine started.

BIOS would no longer detect the disk on that machine, or any other I tried it on (on both USB-to-PATA and honest-to-goodness motherboard PATA controllers). The drive spun up but made a repeated ticking sound (I assume seeking back and forth looking for servo tracks).

I sent the drive to Kroll Ontrack (because, stupidly, I had billing data that wasn't backed-up on the drive). The report I received back indicated that 80% of the drive's sectors were unreadable.

As an aside: The data I was looking for was ASCII text and Kroll Ontrack was completely unhelpful in just sending me a bitstream image of the drive so I could grovel thru looking for data I needed. Being plain ASCII, their "file carving" tools didn't locate any of the data. (They sent me a "preview" of the data they'd located, and while it got lots of Microsoft Office-format files, it didn't have any ASCII text files). I offered them a 3x multiple of the rate they asked for file-level recovery to simply send me the bitstream image of the disk that they'd already made. They wouldn't do it, and wouldn't even let me pay to talk to somebody who understood what I was saying. I ended up taking a major loss on the billing data I destroyed. I'll never recommend them to anybody.

I won't ever play with neodymium magnets around spinning rust media again.

kees99|8 years ago

Most likely mechanism for this incident was:

1) external magnet messed up heads movement closed control loop (internal drive's magnets + voice coil + positioning marks on the platters), and as a result head actual position became different from what controller thought it was.

2) control loop tried to correct itself, repeatedly failing, all while head kept moving across the platters, while controller was still thinking it's elsewhere.

3) controller was writing to disk, so it overwrote data in highly irregular tracks that followed erratic head dance. some of that overwrote positioning markers.

4) when recovering, even though 99.9% of data was still there, controller failed to position the head on erased markers, so reported "unreadable sectors"

dpedu|8 years ago

From 6 inches away? Unless this was a hockey-puck sized magnet I'm calling it a coincidence.

> (harvested from an old hard disk drive)

Okay, this is making even less sense. "Hard drive magnets", in a drive, are millimeters from the spinning platters. I refuse to believe that the same magnet, moved 6 inches away from the computer caused catastrophic damage.

linkmotif|8 years ago

Why wouldn’t they send you the image??

didhshz|8 years ago

You didn’t hold a magnet 6 inches away from your HD.

You held a magnet 6 inches away from a plate spinning at 5400 rpm.

joering2|8 years ago

Out of curiosity, what was the brand and model of that HDD? Would like to dive deeper into its construction, etc.

syshum|8 years ago

>I won't ever play with neodymium magnets around spinning rust media again.

That is your take away? Not that "I ensure all my data is backed up using the 3-2-1 Method at a minimum" it is "never play with magnets"?????? Really?

People never cease to amaze me when it comes to data security.

tscs37|8 years ago

If you want to get rid of a harddrive with sensitive data I would first suggest that one gets familiar with the thought of not being able to sell it as used.

Personally for my drives, I use Boot and Nuke to erase the drive three times, first with zeroes, then with random data, then with zeroes again. After that I disassemble the drive, put a strong magnet over each platter, shredder the drive into almost powder, burn the pieces in a fire and then throw away the leftovers. Probably overkill but I want to be certain.

readams|8 years ago

Normally you'd want to throw the remains into a volcano but I guess if you feel safe just throwing it away then you do you.

keithpeter|8 years ago

How about whole disk encryption?

When it is time to move on, one simply forgets the passphrase and reformats the drive.

Seriously: that is what I'm doing with ssd drives. Anyone know of any issues?

Turing_Machine|8 years ago

A friend of mine who was a military secure comms guy back in the 80s told me that if their position was about to be overrun the procedure was:

1) Fire a twelve gauge shotgun slug into the drive (these would have been external drives).

2) Place a thermite grenade on drive, pull pin.

3) Bug out.

QAPereo|8 years ago

You throw away the leftovers instead of vitrification and firing the mass into space? /s

Lramseyer|8 years ago

I worked in the HDD industry, doing signal processing for a few years. HDDs are pretty much magical. It's insane how delicate, yet robust it all is.

But to put things into perspective with some numbers, the write heads on a modern HDD use somewhere on the order of 50 mA of current. That may sound like a reasonable amount until you consider that the magnetic field [flux] is condensed down to a 60 x 20 nm area. It usually takes a little over 1 Tesla to flip the magnet.

I have been out of the Industry for a little bit now, but things are moving towards a magnetic substrate that has a smaller grain size (allowing smaller bits at a similar SNR) but a coercivity well over 3T at room temperature.

zkms|8 years ago

> HDDs are pretty much magical. It's insane how delicate, yet robust it all is.

Absolutely. It's bloody amazing how my laptop has a device with finger-sized actuators that read/write bit cells that are about as small as couple-year-old semiconductor feature sizes -- and that can survive mistreatment that one doesn't usually associate with micromanipulators.

magnat|8 years ago

Hard disks are surprisingly hard to destroy on-demand. There was a DEF CON 23 talk [1] exploring ways to quickly wipe your servers in situ using physical methods.

[1] https://www.youtube.com/watch?v=-bpX8YvNg6Y

allenz|8 years ago

Entertaining talk, but the best method is to discard the key for your fully encrypted disk. It's 2017, all your disks use FDE, right?

snvzz|8 years ago

Just encrypt each and every one of your drives.

It makes their end of life that much easier.

cmurf|8 years ago

I think magnets could compromise the read/write head, or other electronic on the drive. So why not just mulch the drive with a grinding service?

If you're looking to reuse the drive, use one of the NIST SP 800-88 Revision 1 recommendations. It lists the methods in the preferred order. Ideally the drive supports ATA crypto secure erase, where it just wipes the DEK and KEK, poof, in effect the crypto encoded form of you data can no longer be turned into plain text. You can mimic this with software FDE (Bitlocker, LUKS/dm-crypt, Filevault). Fast.

But they also say it's adequate to use the other kinds of secure erase, because other than firmware bugs/exploits it's the only way to erase sectors not assigned an LBA, e.g. sectors that once had an LBA, had data written to them, but subsequently failed overwrite and the LBA remapped to a reserve sector, leaving data on a sector that cannot be overwritten via SATA commands.

OliverJones|8 years ago

HIPAA - regulated health data requires physical destruction of retired hard drives. Usually this is done in sight of a video camera. The operator shows the drive's serial number to the camera and then drops it into the grinder.

CMS (Centers for Medicare and Medicaid Services) can require proof of destruction. That video does it.

rasz|8 years ago

so secure, guess nobody heard of $100 label printers

nixpulvis|8 years ago

This is exactly how I got out of a final project in middle school. Wiped my HDD with a Neodymium magnet right before the deadline and claimed my computer was "broken"... Of course this wasn't done for highly paranoid reasons where I needed to ensure the data was really all gone, but funny story nonetheless. People are more sympathetic when they think a computer "randomly" stopped working.

keithpeter|8 years ago

Alas, such a strategy will not work at universities local to me (UK). They specifically exclude computer malfunction as grounds for extenuating circumstances.

dboreham|8 years ago

No. You need to cast it into the fires of Mordor. Or something similar.

ravenstine|8 years ago

What I've done is not that dissimilar. It's pretty easy to build a furnace out of basic household items. With charcoal and a leafblower, you can get it up to a temperature where an entire HDD will melt or burn.

oldandtired|8 years ago

There are techniques used to recover previously erased information on HDDs. These techniques have been available since the 90's. The best way to make it unrecoverable is to melt the disks by the use of whatever techniques you have available, including ox-acetylene torches (the favoured method for the company at the time I was working for them), putting into a furnace (as suggest by others here), etc.

The problem with erasure is that there is residual amounts of magnetic fields that can be picked up by the right equipment. In the day, it was reported that they had success with recovery of information that had been overwritten by 8 - 10 times. It just took a lot of patience to do so. Those who want to recover this information will have that patience.

rasz|8 years ago

These techniques are theoretical from the time HDDs needed a user low level format(think RLL controller in your XT), and even then a myth nobody ever demonstrated in practice.

mark-r|8 years ago

Is it really necessary to overwrite the data multiple times to erase it? With the densities provided by today's hard drives, the techniques you used to be able to use to get partially erased data are routinely used by the disk drive itself for normal reads.

FooHentai|8 years ago

What's your threat model? Data must not be recoverable for at least the next X years, or data must not be recoverable within any future time frame, no exceptions?

For the former, you're absolutely right. For the latter, multiple-pass overwrite provides greater assurance than single pass. Following that up with physical destruction of the platters provides further assurance.

abrookewood|8 years ago

It's totally not required to wipe it/over write it more than once. I wish I could find the reference, but someone made a fairly comprehensive attempt to read data that had been over written once and they couldn't detect anything.

richev|8 years ago

When I had a few old hard drives to dispose of I drilled several holes in each one, through the case and platters, then filled them with water and left them outside for a few days so that anything that might rust would do so.

wheresmyusern|8 years ago

even if you drill a hole in the drive, data can still be recovered from it. anything that leaves large pieces of drive intact really isnt ideal. over the years i had collected dozens of platters from both myself and other people. for some reason, when i was younger i was obsessed with collecting hard drive magnets and also smart enough to understand that i probably shouldnt throw the platters away. so a few years ago i decided it was time to destroy all of these annoying platters that i have to worry about misplacing. i naturally assumed that it was going to be easy to find some kind of service, shredding or wiping, for hard drives or hard drive platters. there were no good options. so i tried smashing the platters into small pieces, and this worked for some of the thinner laptop hdd platters. one strong hit would break them into millions of tiny pieces. but most of them just bent or dented. and to thoroughly bend and dent the whole surface of all the platters would be super annoying. so i decided i should just melt them -- they are made of aluminum which has a low melting point. it was surprisingly easy. just get an old coffee can or better yet a stainless steel gas cylinder or even a ceramic crucible. they arent too expensive as far as i know. i used a can. then just surround the can with some bricks for insulation and apply a normal blow torch. set the torch down so it blows into the void between your vessel and the brick jacket. after the platters are melted you can even cast them into something, like a belt buckle. its all a bit silly, but it does feel nice to know that it is literally impossible for anyone to ever know what was on those platters.

kosma|8 years ago

You don't even need to melt them. Just reaching the Curie point should be enough.

robocat|8 years ago

Boiling off the rare earth surfaces and breathing them in could be a health risk?

tinus_hn|8 years ago

Even if the test would have succeeded, this is a bad idea.

With a magnetic swipe card that you demagnetize so it is no longer read successfully, you may well be able to recover the information using a better reader.

Depending on drive age the same may be possible using a hard drive.

The best option for modern drives is still to use software to wipe the drive and if reuse is not required destroy the reading mechanism and platters.

Filligree|8 years ago

I won't say it's completely impossible, but modern HDD read heads are already close to our technical limit, and the signal they get is so noisy as to require extensive processing.

There definitely was a period where labs could recover data this way, but I think it's passed.

golem14|8 years ago

For quickly destroying hard drives, drive big nails through the entire case in several places. Restoration is at least very manual and annoying, in many cases not worth the effort.

If you need more security, building a simple furnace isn't too hard:

http://eecue.com/c/driveslag

mirimir|8 years ago

You don't need to go that fancy. Just use a small steel drum, with holes punched around the bottom, sitting on bricks. Burn dry hardwood, plus occasional chunks of paraffin. Everything burns off, except for the steel.

tfha|8 years ago

Best method is to use LUKs and then wipe the master key. Luks has a forensic stretching technique to take a 32 byte master key and stretch it to 1 MiB, such that loss of a single bit means the original key is unrecoverable.

That really helps you wipe things like SSDs which can copy and migrate data, and make it hard to be certain you destroyed a sector

darkmighty|8 years ago

> such that loss of a single bit means the original key is unrecoverable

That can't be right (I don't know anything about this though). If you control the data (with a non-interactive non-destructive decryption process), a loss of a single bit just means you have to test two possible keys. In terms of brute forcing, the security is the same per number of bits lost. The benefit of using a large key would be that if you lose a certain fraction of your key (say 10%), then that would correspond to more bits (as long as you erase 128 or more bits you'd be fine).

Also beware of key stretching, use it only when absolutely necessary. Key stretching doesn't modify the ratio of work necessary for your encryption/decryption vs the work necessary for brute forcing -- i.e. it doesn't improve the security factor. You're essentially doing an economic defense vs a mathematical one, and hoping that computers won't improve and your attacker isn't willing to spend much relative to what you spent.

rgbrenner|8 years ago

most ssds already encrypt data with aes.. you can just send a command to the drive telling it to erase the key.

nilram|8 years ago

A friend uses a saws-all (or something of that ilk) and cuts them in half. I'm figuring on taking my old drives to him for that treatment. I don't want to resell them and have a casual snooper recover my data, and I'm not of enough interest for anyone to piece the halves together.

Symbiote|8 years ago

What's the risk from simply writing over the drives with zeros, and sticking them in the electronics recycling?

I don't think anything I or my employer has would be worth the effort to recover.

bluedino|8 years ago

I use a drill or press at work to do the same thing. Bens s drive in half or put a couple holes in the platters

amluto|8 years ago

A ferromagnetic cage such as a hard drive enclosure can shield against magnetic fields pretty well. The field lines are concentrated in the enclosure and mostly avoid the inside. I would imagine you need to open the drive up to have much effect.

jimmyswimmy|8 years ago

TFA said specifically that they could tell that the larger magnets were imposing a field inside the drive itself, and they could tell it was so because they could hear sounds coming from inside the drive. They presumed that the sounds were generated by deflection of the discs under the magnetic field. Therefore it is evident that the field is penetrating through the outer case.

They surmise that it was the higher coercive ty of modern drive plates that causes them to be resistive to reprogramming bits with a static magnetic field.

cptskippy|8 years ago

I normally unsubscribe from junk mail and advertising from e-commerce sites, KJ Magnetics is one of the few exceptions. I always look forward to their emails and blog entries.

X86BSD|8 years ago

I think I’d rather store the data on a gbde encrypted disk and simply toss it when I’m done. Then I know the data can’t be read.

rodgerd|8 years ago

An angle grinder through the drive, repeatedly, may or may not be the most effective mechanism, but the sparks sure are pretty.

codewritinfool|8 years ago

take it apart, screw the platters to railroad ties. use belt sander on platter. flip the platters over. repeat. burn sandpaper.

take a hammer to platters to seriously deform them and throw them in the trash.

not recoverable, imo.

coretx|8 years ago

Microwave ovens do wonders.