Linux
Welcome to c/linux!
Welcome to our thriving Linux community! Whether you're a seasoned Linux enthusiast or just starting your journey, we're excited to have you here. Explore, learn, and collaborate with like-minded individuals who share a passion for open-source software and the endless possibilities it offers. Together, let's dive into the world of Linux and embrace the power of freedom, customization, and innovation. Enjoy your stay and feel free to join the vibrant discussions that await you!
Rules:
-
Stay on topic: Posts and discussions should be related to Linux, open source software, and related technologies.
-
Be respectful: Treat fellow community members with respect and courtesy.
-
Quality over quantity: Share informative and thought-provoking content.
-
No spam or self-promotion: Avoid excessive self-promotion or spamming.
-
No NSFW adult content
-
Follow general lemmy guidelines.
view the rest of the comments
Not necessarily true. SSDs can mark sectors that have been written too much as bad, so the data still there to be read forensically, but you can't write to it anymore.
If you're that worried about privacy, then your only option is hammer+fire+spread the remains in multiple places. For the average paranoid I think it's enough to make generic file recovery tools ineffective.
It's much easier to use full disc encryption, and just change the keys
But every company I've ever worked for, when they retire machines they keep the drives no exceptions.
If it's good enough for corporate security, we know works at least.
For context, a cheap internal SSD is about $20. Not some crazy impossible expense. When we talk about taking the storage device out of the computer, we're talking about investing $20 to not have to worry about data leaking into the future. And at that cost it's basically a no-brainer. It would be crazy not to do it