The manufacturer requires that the faulty HDD be sent back. It’s 18 TB, so ShredOS estimates 100 hours to completely wipe the drive. I really would rather not go through that. Does anyone else have experience with this?
No one cares. I’d quick format it and call it a day. There’s no chain of custody so it’s never proof of anything in any sense that matters.
I’m pretty sure the oem is not hooking up every rma drive and looking for files.
“well, new rma drive? Let’s pop it in the USB caddy and see what’s there… Hmm, some files… jpgs… Mpegs… Oh look. Pdfs with embedded viruses. Good thing we didn’t connect this drive to… Oops”
They’re sending that thing straight to the industrial degausser and then certification for possible resale.
As company policy? No. But their employees are people too.
I used to work for a large ISP that shall remain nameless. The ISP abuse department absolutely DID look at every pub ftp they were told to shut down, and grabbed whatever they found interesting before shutting it down. There may even have been a massive MP3 share on one of their servers to store their ill-gotten gains.
Absolutely NOT company policy, but it happened.
But the question here is: should OP worry about his ‘linux isos’ getting him in trouble. Even accounting for overly curious employees, the answer is still NO.
There may even have been a massive MP3 share
I never understood the “gotta have 'em all” mentality of mp3 collecting.
“Hey! Check out my massive collection of bitrate/dynamic range/frequency range -decimated music. I don’t need CDs anymore.”
With your logic we would not have recertified drives.
Yeah, this is the rational line of thinking honestly. I just overly worry.
100 hours seems excessive. If you want to zero a drive, one pass is plenty.
Yeah I didn’t realize until you said this that the default option on ShredOS is a 3 pass… that explains the 100 hours.
Those are all your legitimate backups. What are you talking about?
Oops you’re right, my bad!
Recently had a Seagate Ironwolf fail in its first couple months, it had 10Tb of my personal Blu-ray movie backup archive on it. They recovered it and sent it back on an external drive for free. Nobody cares
The HDD manufacturer can’t be arsed to care what MPAA thinks, nor can the MPAA compel them to do diddly squat.
This is why I do full disk encryption always. Throwing it out is much easier.
Drillbit takes care of that nicely.
No one will mind. If it lets you sleep better at night, wipe it if possible. They just put it onto a test system, see if it is really broken and throw it into a bin container for recycling.
Worst that can happen is, that someone want’s to have your movie collection and restores it off the HDD on a side setup for personal use. No one will forward it to the movie association for legal prosecution!
If you’re really worried about it, grab a free Linux dvd from a random computer magazine. Ctrl+A, then delete everything on the drive. Empty the recycle bin. Now copy and paste the dvd onto the drive as many times as it takes to fill it completely. When done, Ctrl+A again, delete and empty recycle bin again.
If you’ve got an agreed RMA, they’re not going to go a deep dive file recovery, they’ll be logging the serial number in a database and chucking the drive in the recycle pile. Emptying, filling and emptying again is more than enough.
Data erasure procedures are built into the drive (and have been for decades). Search for “ATA erase howto”
Faffing around with “erasure utilities” is a waste of time and effort
ATA secure disk erase should change the pre existing encryption key and effectively wipe the drive beyond recovery in seconds
Even if the drive does it the long way, the command itself only takes a few seconds to issue, doesn’t tie up tbe computer whilst the procedure is underway and is MORE effective than any kind of software wipe - particularly for any kind of shingled drive, where it’s the only valid way of erasing a drive
Peter Guttman’s famous recovery of data with an atomic force microscope was performed on stepper-motor based 5-10MB drives and has not been able to be replicated on 200MB ones let alone anything larger.
He issued a followup paper to the original stating that most “military grade overwrite” and other claims are simply voodoo/mumbo-jumbo on modern drives (2-10GB at the time he wrote it)
multiple overwrite procedures were created in the days of 10-12 inch platters and stepper motors without disk head tracking servos - for the simple reason that the military mindset usually wanted to blow old equipment up whilst technical staff wanted safer/cheaper/more effective methods which could be done before data left sensitive areas
I wouldn’t worry personally. I sent a 16tb Iron Wolf to Seagate that shit the bed. It exclusively had pirated movies/shows/games. The free recovery didn’t pull anything, so they just sent me a new drive instead.
My experience this year, I claimed on a Seagate NAS + 6 Ironwolf drives. Had a fair bit of moves/tv, they did data recovery for me as well.
There was no issue & I was assured my digital content would be treated as private and confidential.
Isn’t the format drive without ticking quick format on Windows the same? It took me around 36hrs for the 5TB yesterday
You should always zero a drive, if you can before sending back.
If a drive ever has sensitive data and you can’t zero it, you shouldn’t ever return it.
Let’s say the drive was full of pirated movies and games. Then you send it back to them. What’s the worst that can happen - has anyone ever HEARD of an hdd manufacturer making a stink about it?