this post was submitted on 22 Nov 2025
74 points (96.2% liked)

Technology

40749 readers
720 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 3 years ago
MODERATORS
all 28 comments
sorted by: hot top controversial new old
[–] heyWhatsay@slrpnk.net 3 points 2 days ago
[–] sefra1@lemmy.zip 23 points 3 days ago (3 children)

So, let's see if I understand, the device only destroys the data after it's connected to a computer.

So an adversary can just not connect it to a computer and extract the data through alternative means (like unsoldering the chip and reading it directly.

The device should be able to destroy itself either from an internal battery or some physical or chemical mechanism.

[–] nekusoul@lemmy.nekusoul.de 11 points 3 days ago

My assumption is that it probably uses the same mechanism that most other SSDs already have where it always saves the data with internal encryption and simply overwrites the encryption key when a wipe is requested.

This same mechanism already allows SSDs to be formatted quickly while still being secure without having to zero out everything, which would cause a lot of additional wear.

The additional complete wiping would just be the cherry on top.

[–] Sidhean@piefed.social 3 points 3 days ago

The image you posted seems to disagree with you. There is some sort of "Physical Data Destruction" in phase 2. The article says the switch breaks some chips, but I didn't get much beyond that. In any case, lets hope the delete-when-plugged-in thing is redundant.

[–] Tolookah@discuss.tchncs.de 16 points 3 days ago (1 children)

So it's a fidget with a slider AND a button?

[–] ryannathans@aussie.zone 5 points 3 days ago

Two stage slider

[–] unexposedhazard@discuss.tchncs.de 13 points 3 days ago* (last edited 3 days ago) (2 children)

Or you could just use an encrypted file system...

If they are willing to torture you for the decryption key, then they are also willing to kill you if you destroy the drive.

[–] pankuleczkapl@lemmy.dbzer0.com 14 points 3 days ago

Def not true about the justice system, killing you does not do them any good, they just want good prosecution statistics

[–] huquad@lemmy.ml 3 points 3 days ago (2 children)

What we really need is encryption with a duress password that just shows some harmless files. Maybe have it overwrite the sensitive data if they want to verify size of the drive. Does something like that already exist? I know standard duress password does, but that could go down as destruction of evidence.

[–] AlchemicalAgent@mander.xyz 2 points 3 days ago (1 children)

TrueCrypt had/has that feature for full-drive encryption. But I don't think anyone serious uses them anymore due to the current code maintainers having some questionable allegiances.

[–] passenger@sopuli.xyz 2 points 2 days ago

Truecrypt is followed by VeraCrypt which is now the standard. Don't use TrueCrypt

[–] unexposedhazard@discuss.tchncs.de 1 points 3 days ago* (last edited 3 days ago)

You can embed encrypted data inside media files like video, image and audio files. Thats your best bet i think. You cant really hide an entire filesystem afaik unless you build a custom storage device with a controller that only physically connects certain sections under specific conditions.

[–] Kissaki@beehaw.org 4 points 3 days ago* (last edited 3 days ago) (1 children)

Help, my cat stepped on the button, how do I recover my data?

To prevent accidental and catastrophic presses, the drive’s self-destruct button is designed with a two-stage sliding switch.

Looks like they prevent that.

[–] wicked_samurai@beehaw.org 2 points 3 days ago

CATastropic preesses are prevented? Sounds PURRfect.

[–] irotsoma@piefed.blahaj.zone 3 points 3 days ago (1 children)

Fatal flaw is it has to be connected to a computer to start the process. If someone truly wants the data they could just disassemble the device before it gets connected if the button has been pressed. They should have found a way to do it with a small onboard battery reserved only for that purpose.

[–] theneverfox@pawb.social 1 points 3 days ago (1 children)

I mean, it could just be a capacitor. It's easier to fry something than make it delete itself

[–] irotsoma@piefed.blahaj.zone 1 points 2 days ago (1 children)

Capacitor wouldn't allow long enough to wipe the data first. It's a two pass system. Wipe data then destroy. Also capacitors lose charge over time much, much more quickly than a battery. You still would need to have plugged it in very recently. And yes to build enough voltage to destroy electronics physically and quickly with a battery, it would actually probably need both battery and capacitors anyway which would also increase size. I'm guessing it was a tradeoff of size vs functionality, but having it not work until it's plugged in after pressing the button which is bright red when pressed, seems like a very simple way to bypass the destruction by simply disassembling it before plugging it in. Only good if the thief/agent doesn't know why there's a big red spot on it before plugging it in, which is a bad assumption for security especially if you deploy these widely so everyone knows what they are.

[–] theneverfox@pawb.social 1 points 2 days ago (1 children)

Why are you wiping the data? Why not just slag the whole chip... Hard to read an SSD in liquid form

[–] irotsoma@piefed.blahaj.zone 1 points 2 days ago (1 children)

What if the destruction fails, or isn't thorough. Much harder to retrieve information from a partial block of memory if it has also been overwritten with garbage to erase it. Redundancy is essential to security.

A device like that isn't putting enough voltage into it to "melt" it. It you want it that well destroyed you're going to need a high temperature incinerator with a good filter since it's not safe to breath the smoke it will create. Or at the very least a heating element inside it, but then you need layers of heat protection so it doesn't catch everything around it on fire or burn the person pushing the button.

This isn't that. This is meant to destroy the data at a moment's notice with the push of a button. Problem is that it has to be plugged in to do it, which in my mind is defeating the purpose.

[–] theneverfox@pawb.social 1 points 2 days ago (1 children)

I mean, you could probably pick two strategic pins and fry the wells... You might have to do a few of them to make sure that your hit every bank. If you blow through the insulation between them, I can't imagine any method could recover the data. And it shouldn't take much current

The liquid thing was just because... You know, solid state drive

[–] irotsoma@piefed.blahaj.zone 1 points 1 day ago (1 children)

Yeah, but again, that requires precise destruction in a cheap chip while making sure both not to do it accidentally and making sure it's successful afterwards. With redundancy, if one thing fails, there's something else to do the job. Most corporations have abandoned this idea in exchange for short term profit and planned obsolescence. But it's actually super important in real security.

[–] theneverfox@pawb.social 1 points 1 day ago (1 children)

But like... You could just make it physical. Put a couple extra leads on the PCB, charge the capacitor, and let the button close the circuit mechanically. You might have to do a couple tests, but that's better than having storage with a delete button on it

What does a delete button add? It'll take minutes. Might as well put an e-stop button on your desk that connects to your computer by USB

It's basically security theatre

[–] irotsoma@piefed.blahaj.zone 1 points 1 day ago

But charge the capacitor with what? That's the point. If it doesn't kill the data immediately upon pushing the button, even when unplugged, it's useless unless some bumbling idiot thief/cop/agent plugs it in before just disarming the button.

And as for fully physical, do tests with what? Another computer? Its a memory storage device with only an I/O driver and basic firmware. There's no CPU to separately run software to detect if the components are destroyed. And if there were, that would have to be physically/electrically separated from the short that is going to kill the device and then physically reconnected, which would mean some kind of mechanical device most likely. Now were getting into a huge device, not a flash drive. The device already has capabilities to read and write data. Very easy to add a chip to give that random data to write over the existing data and a lot less power than a processor and motorized components.

And again, it doesn't solve the redundancy problem. Single point of failure is always going to go wrong at least one in some number of cases. Even top of the line components and the best quality control available can't beat redundancy and it's way, way cheaper.

[–] halm@leminal.space 3 points 3 days ago

I'm not sure I trust myself with that functionality.

[–] Toes@ani.social 2 points 3 days ago

My friends kid loves to press the power button on her computer. This looks too tempting. haha

kinda like the recompute base encryption hash button in sales guy vs web dude