Jump to content

FEDELST

Members
  • Posts

    2
  • Joined

  • Last visited

Reputation

0 Neutral
  1. I think we are discussing at least 4 issues here.. 1/ restoring performance to SSD devices (the original topic) 2/ The functional value of CCleaner referenced on the OCZ forums. 3/ The operational value of Secure Erase in restoring performance to SSD Devices (as referenced in the article references on the Anandtech.com site) 4/ How to invoke the TRIM feature on SSD devices. As my area of expertise is in data destruction technology and policy, I will touch on a couple concerns related to the CCleaner and Secure Erase issues. I will send a link to this thread to Anand LaShimpi of Anandtech in hopes that he will respond to the other issues, as he is probably one of the mosr knowledgeable resources on this very topic. CCleaner is a block level overwrite utility initially designed for clearing magnetic media type storage devices. The multipass overwrtite process was designed specifically for the purpose to obfuscate written data to the sectors processed assuring that all bits are processed, rendering no recoverable data at the end of the process. This process is subject to controller access level restrictions to regions that are addressable to the process running the overwrite process. Accordingly, ATA devices will not permit access to Protected Service Areas, but for the purpose of this thread, this is irrelevant. Unlike Secure Erase, CCleaner can be configured to clear all free space, overwrite selected files, or process all accessible storage space. Clearly if the intent is to regain performance by clearing the free space CCLeaner is the way to go. Secure Erase is an embedded single pass process that purges data on ALL regions of the media surface in magnetic storage devices, and all regions of flash in SSD hardware. When processing magnetic media, the CMRR states the process uses an optimized write signal to effectively purge all latent data from the media... in flash, we will presume that SSD manufacturers have interpreted the Secure Erase process to initialize all bits in the flash storage space. Secure Erase is not selective and can not be set to TRIM, or process only free space. It eliminates everything like a tornado in a trailer park. So, from the perspective that SE will revert the drive to it's original performance by eliminating all data, the practice appears to be sound. Using CCleaner as an attempt to TRIM all abandoned legacy data from unused data blocks will most likely have an effect that will vary based on the amount of RAM being processed. Just my 5 cents...
  2. Fact is that Secure Erase is in face a component of the ATA specification and is integrated into all standards compliant ATA devices in production since 2001. This is not just for SSD technology but also applies to all ATA, IDE, PATA, and SATA magnetic media based hard drive devices as well. Created by IBM in 1994 as a feature for the TravelStar line of drives, the Center for Magnetic Recording Research at the University of California San Diego had at the insistence of the NSA developed the current version of the Secure Erase technology. Secure Erase is embedded in the drive controller microcode and is initiated by an externally issued command sequence. Once initiated, SE uses an optimized single pass process that addresses all regions of the storage media, including the Protected Service Areas (when properly launched using compatible hardware). Protected service areas include G-List, Host Protected Area, and the Device Control Overlay (search Wikipedia for a detailed description of the role of each component of the PSA). Despite the fact that it is launched by external command, and is a highly effective PURGE level sanitization technology it can not be reliably launched in on most host equipment due to host controller protection of the HPA, and the fact that many BIOS manufacturers inhibit SE from being launched due to security concerns. The issue being that if virus or malware were to initiate SE, the target computer would be purged rapidly, and with no hope for recovery. It is for this reason that Secure Erase is not being exploited en masse by every software vendor. Effectively, the only truly effective means to purge using SE is by using purpose built hardware such as the Digital Shredder manufactured by Ensconce Data Technology (www.deadondemand.com) or other dedicated appliance based solution. For more information on SSD performance issues, an excellent paper can be found at www.anandtech.com under the storage heading. The comments are well informed, and from the hip.. truly an excellent read. If you want accurate and up to date guidance on developing policy for the destruction of digital data, I had co-authored a guide with Dr. gordon Hughes of the CMRR titled 'The best Practices for the Destruction of Digital Data' which is based on a review of all available guidance collected from Government, Academic, and vendor sources, as well as, input by industry and security experts. In this guide we present hardware considerations, classification concerns, and review acceptable (and unacceptable) practice... essentially all the tools one needs to create accurate and reliable data destruction policy. The paper is available as a no charge download at www.converge-net.com, select English, and go to the news page to link to the download request form. I hope this helps. Ryk
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.