I have tried both hdparm and openSeagate methods with an SSD. The device was compatible with block erase and crypto erase. I started the crypto erase method and checked for the status using the --progress sanitize command. However, I received an output like "sanitize command is not currently in progress. It is either complete or has not been run". Please note that I executed the status checking command within 1 minute of running the sanitize command. Even after that I tried block erase and the output was exactly the same.
gparted shows 2 partitions of the same drive, one is the boot p1 and the other is the drive. If I'm correct I would need to identify the p2 in the sanitize command to prevent sanitizing the boot drive as well since there is only one drive on my laptop.
Thank you for creating valuable content. I would really like to learn about other methods as well, such as SG utils. Can you please make more videos on those ?
Could you explain the response from 'grep sanicap', was the first response a mistake having missed the '-A 5' or a required step. And how are '-A 5' and '-a 2' determined. Is it just your experience that tells you those are the commands, or is it something in the list you got from a prior command that tells you which action to call? Is '-a 2' always sanitize?
These are the options I see available. It is in Binary. -a 2 is block erase, -a 3 is overwrite sanitize, and -a 4 method is a crypto rekey of the drive. -a :: --sanact=:: Sanitize Action: 000b - Reserved 001b - Exit Failure Mode 010b - Start a Block Erase sanitize operation 011b - Start an Overwrite sanitize operation 100b - Start a Crypto Erase sanitize operation
Thank you for the video. I’ve been trying to learn more about how to properly restrained before I sell them. However, isn’t there some sort of program that will walk you through this graphically? There is no way I’m gonna remember all the typing in a little coat as you enter here, please let us know if there is an application that will walk you through this and make it easier. Thank you.
agree a nice open source GUI for media sanitization would be great. Most motherboards have secure erase built in as a BIOS option. Wish they would just change the name to allow a real sanitize (secure erase can be a proper sanitize in SATA, but in NVMe sometimes they call a format unit with crypto erase a secure erase)
i have this ssd that had some problem where it stopped showing up. After a while i was able to make it showing again but the data is just not showing up. The drive is blue in disk management somehow it's like no data is installed at all. Nothing is working i thought maybe if i just deleted everything on it then i could start over again and reinstall the games i had on the ssd. Or should i just admit defeat and that the ssd is broken and i should go get a new one?
how do check where is my boot drive located in? I have 2 sdd that are identical and one has endeavour os and the other one has fedora, how do I tell them a part?
not beginner user friendly to be frank. what if you're not familiar with that method? Do you have a video first for us average windows 10 users who are not fluent using git hub or how to get the software you're using? The only reason Im here is Samsung nvme ssd 970 pro its own secure erase wants a usb made. This is a hassle. its not the main drive, its a secondary drive so why do i need a usb to use its secure erase ? can your method help? but you go right into using it with regard for us lambs.
Interesting about not wanting to write repeatedly to SSD...what I'm seeking is an ability to wipe folders/directories/unused space (previously deleted) instead of reinstalling OS. I guess proper partitioning would have prevented that...
Why is there nothing like this for windows?.. No one seems to have bothered making a free utility, so we have to rely on the manufacturers utilities which don't always work, and many time refuse to work with any other brand NVME.
What's not to understand. You either have an ATA/SATA storage option or an NVMe option, so use the right tool. If you have a sanitize function, use it. Otherwise use enhanced secure erase otherwise secure erase. You identify the drive type, then you identify the device identifier, then you identify its capabilities, then select the best method to sanitize it, finally you execute your choice of command to carry out the action.
We are suspicious of anyone with a clicky keyboard. ....it's like a barking dog who has a deaf owner. ..noise for noise sake, no care whatsoever for anyone within hearing range
Have you heard 'angry typists?' It's a thing...they are nuts in places like libraries, coffee shops or airports, it can't be any faster but they fly and hammer on their keys, so annoying.
You just made my boss very happy. We were looking at hours of DOD erase on NVME but this saved the day
Thanks. I've been looking for programs to sanitze my SSD prior to travel... Now, I found it... Thank you...
Better to list the commands so we can easily use them
I have tried both hdparm and openSeagate methods with an SSD. The device was compatible with block erase and crypto erase. I started the crypto erase method and checked for the status using the --progress sanitize command. However, I received an output like "sanitize command is not currently in progress. It is either complete or has not been run". Please note that I executed the status checking command within 1 minute of running the sanitize command. Even after that I tried block erase and the output was exactly the same.
gparted shows 2 partitions of the same drive, one is the boot p1 and the other is the drive. If I'm correct I would need to identify the p2 in the sanitize command to prevent sanitizing the boot drive as well since there is only one drive on my laptop.
Thank you for creating valuable content. I would really like to learn about other methods as well, such as SG utils. Can you please make more videos on those ?
I bought some 2.5 inch sas hard drives , 4 of them are write protected. I cant seem to erase the drives . Will that sanitize method work for that ?
diskpart command in windows should work just find with clean all
Just a question is shredding also a safe type to wipe hd and ssd drives and consider a cryptographic erase. Thank you
Which commands do we use in windows? And does it work on Windows with non-Seagate SSDs?
Could you explain the response from 'grep sanicap', was the first response a mistake having missed the '-A 5' or a required step. And how are '-A 5' and '-a 2' determined. Is it just your experience that tells you those are the commands, or is it something in the list you got from a prior command that tells you which action to call? Is '-a 2' always sanitize?
These are the options I see available. It is in Binary.
-a 2 is block erase, -a 3 is overwrite sanitize, and -a 4 method is a crypto rekey of the drive.
-a ::
--sanact=::
Sanitize Action:
000b - Reserved
001b - Exit Failure Mode
010b - Start a Block Erase sanitize operation
011b - Start an Overwrite sanitize operation
100b - Start a Crypto Erase sanitize operation
Thank you for the video. I’ve been trying to learn more about how to properly restrained before I sell them. However, isn’t there some sort of program that will walk you through this graphically? There is no way I’m gonna remember all the typing in a little coat as you enter here, please let us know if there is an application that will walk you through this and make it easier. Thank you.
agree a nice open source GUI for media sanitization would be great. Most motherboards have secure erase built in as a BIOS option. Wish they would just change the name to allow a real sanitize (secure erase can be a proper sanitize in SATA, but in NVMe sometimes they call a format unit with crypto erase a secure erase)
i have this ssd that had some problem where it stopped showing up. After a while i was able to make it showing again but the data is just not showing up. The drive is blue in disk management somehow it's like no data is installed at all. Nothing is working i thought maybe if i just deleted everything on it then i could start over again and reinstall the games i had on the ssd. Or should i just admit defeat and that the ssd is broken and i should go get a new one?
For me, my Samsung 970 Evo Plus nvme drives shows "Block Erase Sanitize Operation Not Supported"...
how do check where is my boot drive located in? I have 2 sdd that are identical and one has endeavour os and the other one has fedora, how do I tell them a part?
not beginner user friendly to be frank. what if you're not familiar with that method? Do you have a video first for us average windows 10 users who are not fluent using git hub or how to get the software you're using? The only reason Im here is Samsung nvme ssd 970 pro its own secure erase wants a usb made. This is a hassle. its not the main drive, its a secondary drive so why do i need a usb to use its secure erase ? can your method help? but you go right into using it with regard for us lambs.
Interesting about not wanting to write repeatedly to SSD...what I'm seeking is an ability to wipe folders/directories/unused space (previously deleted) instead of reinstalling OS. I guess proper partitioning would have prevented that...
How would you do this on windows
How to install the openseagate
Heard that there is some kind of D.O.D. erasure requirement for some sensitive data.
Check out the article I linked debunking that one. Spec was end of life in 2003
Why is there nothing like this for windows?.. No one seems to have bothered making a free utility, so we have to rely on the manufacturers utilities which don't always work, and many time refuse to work with any other brand NVME.
OpenSeaChest has a Windows build!
Windows can wipe a drive. ..with the cmd : wipe all
@@relaxingnature2617 Is that a secure erase so no one could use recovery software to get the data off it?..
Title should specify Linux, Windows users can’t use the same way can they?
OpenSeaChest supports windows as well
WSL as well should work. I doubt it will let you wipe the media running Windows though.
5 sec: bios of mb: security erase ssd. Done!
I presume rhis utility is for skilled programers, quite difficult to understand for a layman like me
I have no idea what this guy is talking about.
What's not to understand. You either have an ATA/SATA storage option or an NVMe option, so use the right tool. If you have a sanitize function, use it. Otherwise use enhanced secure erase otherwise secure erase.
You identify the drive type, then you identify the device identifier, then you identify its capabilities, then select the best method to sanitize it, finally you execute your choice of command to carry out the action.
We are suspicious of anyone with a clicky keyboard. ....it's like a barking dog who
has a deaf owner. ..noise for noise sake, no care whatsoever for anyone within hearing range
Have you heard 'angry typists?' It's a thing...they are nuts in places like libraries, coffee shops or airports, it can't be any faster but they fly and hammer on their keys, so annoying.