hi,

My company gave me a laptop for work and after some time they will give it to another person when I quit the company so I want to make sure I don’t leave any of my data behind so which command should I run to delete my home directory to delete all the data?

is it just rm -rf /home/myname

  • groet@infosec.pub
    link
    fedilink
    English
    arrow-up
    16
    ·
    7 months ago

    Deleting a file does not overwrite the data. It just marks that area of the drive as “free”. Using forensic tools (or simply dd) you can read data from “empty” parts of the drive. To be save you have to overwrite each file. You can try tools like shred to scramble the data of a file before deleting it, but as they say themselfes, unfortunately your filesystem might not actually let you do that (scroll to the CAUTION section).

    You can use dd to write bytes to arbitrary places of the drive, but again, the filesystem might lie to you where a file is actually located. The ONLY way to be entirely sure is to wipe the whole drive. And if your IT does not do that before handing a system to a new employee, then they are not doing their job correctly.

    Not legal advice: just tell them you installed a few viruses (while the system was not connected to the company network of course) and they should nuke the system before handing it to anybody else.

    (You can also wipe the drive yourself by booting from a stick and overwriting the entire drive)

    • lurch (he/him)@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      4
      ·
      7 months ago

      you can fill up the disk a few times after deleting files, so the system has to use up all free space and no matter where your data was it gets overwritten.

      • jet@hackertalks.com
        link
        fedilink
        English
        arrow-up
        2
        ·
        7 months ago

        Not necessarily true. SSDs can mark sectors that have been written too much as bad, so the data still there to be read forensically, but you can’t write to it anymore.

        • Tyoda@lemm.ee
          link
          fedilink
          English
          arrow-up
          6
          ·
          7 months ago

          If you’re that worried about privacy, then your only option is hammer+fire+spread the remains in multiple places. For the average paranoid I think it’s enough to make generic file recovery tools ineffective.

          • jet@hackertalks.com
            link
            fedilink
            English
            arrow-up
            4
            ·
            edit-2
            7 months ago

            It’s much easier to use full disc encryption, and just change the keys

            But every company I’ve ever worked for, when they retire machines they keep the drives no exceptions.

            If it’s good enough for corporate security, we know works at least.

            For context, a cheap internal SSD is about $20. Not some crazy impossible expense. When we talk about taking the storage device out of the computer, we’re talking about investing $20 to not have to worry about data leaking into the future. And at that cost it’s basically a no-brainer. It would be crazy not to do it