This post has been de-listed
It is no longer included in search results and normal feeds (front page, hot posts, subreddit posts, etc). It remains visible only via the author's post history.
Like the title says, Iām curious what the current state of forensic recovery from a fully encrypted SSD that was wiped with Parted Magic or whatever other disk utility uses ATA secure erase commands. I can only seem to find stuff from 2011 but a lot has changed since then and SSD technology has come a long way.
So theoretically could an attacker be they state or nonstate recover anything from a SSD that has been securely erased and that had full disk encryption?
Obviously I know the most reliable method of secure erasing is a hammer but I recently have been trying to get into proper netsec so Iām learning as much as I can
Thanks for any information
Subreddit
Post Details
- Posted
- 6 years ago
- Reddit URL
- View post on reddit.com
- External URL
- reddit.com/r/VeraCrypt/c...