Questions tagged [flash-memory]
The flash-memory tag has no summary.
40 questions
0
votes
1
answer
210
views
How does flash encryption actually work
I have been reading about NVS flash partitions for use in embedded systems and that the NVS key-value data can be encrypted by using a symmetric key. This symmetric key is then stored in a separate ...
2
votes
0
answers
178
views
How long does SSD garbage collection take? [closed]
Let's say I have an SSD on a Windows machine that supports TRIM. After I delete a file / some files on it, assume the TRIM command is sent, and those pages are marked as invalid. At some point, the ...
1
vote
0
answers
177
views
Erasing a file or partition on an SSD or flash drive "reasonably" securely
There is a lot of information online and on this forum indicating that it is difficult to securely erase SSD or flash drives. Normally, the expectation would be that data is erased by overwriting it, ...
1
vote
0
answers
112
views
Effectiveness of USB flash testing software
So I've just had an SD card ruined & while it's not very expensive, I'd rather have it last me a much, much longer time. As a precaution going forward now, I'd like to be able to detect right away ...
1
vote
2
answers
2k
views
Which temperature ensures permanent erasure of data on flash?
Which heat ensures permanent loss of data on flash memory, in particular, on consumer-grade USB thumb drives (e.g., http://www.amazon.de/dp/B085SXT9FS or http://www.hood.de/0094819941.htm )? How long ...
6
votes
2
answers
5k
views
Data recovery from TRIMmed SSDs
Assuming a given SSD supports TRIM, and is on a physical bus that supports sending that command, and the connected computer is running an OS that is aware of TRIM:
If the drive is formatted, or has ...
2
votes
2
answers
2k
views
I snapped my micro SD card into 8 pieces before throwing it away. Should I be worried that someone can get my data?
The card was a 16gb SanDisk micro SD card (monolithic).
10
votes
4
answers
42k
views
How to physically destroy an SSD at home?
SSDs seem to be notoriously tricky to properly erase (see for example this question and answers here). An easier and potentially safer solution could be to physically destroy the SSD device.
I am ...
2
votes
1
answer
866
views
Tamper Protected VS. Tamper Proof for write-protected memories
I read in the answer here by Marcus that ROM is Tamper-proof.
What is the difference between tamper-proof, tamper protected and tamper-resistant?
Now, there are some re-writable memory (eg. eNVM) ...
3
votes
1
answer
691
views
Read-only vs. Write-protected
From an information security aspect, is there a difference between saying "read-only" or "write-protected" storage/memory?
Is there a chance that a read-only memory would not be write-protected at ...
1
vote
1
answer
494
views
How can I verify that my laptop does not have malware in the firmware? [duplicate]
I purchased a used laptop on eBay.
I scrubbed the hard disk to make sure there were no lingering or unknown viruses left on the disk and then installed fresh Windows 10.
But, what about the firmware?...
14
votes
2
answers
2k
views
Recovery of EEPROM data after bulk erase operation
I am aware of research which shows that single (or sometimes double) random overwrites on a magnetic hard drive is enough to ensure data is not recoverable, but is there any research into the recovery ...
32
votes
5
answers
13k
views
How to safely wipe a USB flash drive [duplicate]
I want to wipe all residual data left behind even after a format on a regular 64GB fash drive, the ones someone can scan and recover data. What's the most efficient but quickest way to do this? Any ...
2
votes
2
answers
325
views
How is it possible that hardware-encrypted flash devices are safe?
I start with the fact that I understand how flash devices (pendrives) can be encrypted with software, for example Bitlocker. Simply, the encryption key is the password given during encryption and ...
1
vote
1
answer
189
views
Understanding the philosophy of recovering data
It can be understood that if i delete some data, those bytes may not be written by other data can be extracted because the data actually resides on those sectors/cells.
But i wounder how the bytes ...