We again got a device irrecoverable wiped like NIST 800-88
http//
These guys are not using Mobilogy Forensic Wipe that we know for sure. But what tool is in the wild that is so extrem capable to run fast for mass-wipping?
Please PM me only cause DFI!
How do you know that the device was wiped according to NIST 800-88?
How do you know that the wiping was fast?
How do you know it has been employed in mass-wiping? (that is if you got "a" device)
Some random words
KrollOntrack, Blackbelt, Blancco (and of course any number of other manufacturers/Authors)
The fact that the software you explicitly and publicly mentioned (thus definitely feeding *someone*) is actually compliant with and certified in accordance with the mentioned (again possibly feeding *someone*) specs, does not mean that other software is not compliant with them or that a non-compliant software cannot anyway effectively wipe the device.
jaclaz
Good points. Cannot reveal the full case. Sneak peek of huge.
Built in secure erase is supposed to be fast.
Never used it, only government approved wipers and DBAN for less critical refurbish stuff.
Built in secure erase is supposed to be fast.
Sure ) , it is the fastest possible wiping but it is part of the ATA specifications, It seems like Rolf was talking of mobile devices, not of "conventional" hard disks and similar.
jaclaz
Well, flash media would be fast regardless.
Then either it was run locally using pre existing software (+ hard reset to get rid of remaining in memory artefacts) or has been attached to a separate device that ran software against the flash storage - or it is possible that they could have acquired an empty decoy device.
EDIT Having a resized smaller partition would also increase the speed of the wipe.
Without knowing anything about the device, its capacity for external storage media and port connectivity one can only speculate.