ATTENTION: You are viewing a page formatted for mobile devices; to view the full web page, click HERE.

DonationCoder.com Software > Coding Snacks

Rename folder and files before deleting

(1/3) > >>

dcwul62:
When running Recuva deleted file names are displayed.
Secure deleting files on SSD is not recommended (TRIM should take care of it?)

I just ran Recuva on an SSD and it showed a lot of files and foldernames, even though TRIM is active.

Up front, I don't know whether it is workable or not, but I just  -wondered- ...

Say that once you are deleting a file (for the sake of argument, let's call it 'safe delete')
So, let's say you are 'safe deleting' a file, using 'some kind of special instruction/or tool'
it would then go as follows:
the file will be renamed to some random name e.g. l2LCAnnRpIMkUTmpKf0q.tst 
then it will be moved to a scratch folder with some random name as well, for instance, it is moved to D:\lCQgD45dJSEX1DFLkW8E
then it will be deleted there.
Recuva will show weird paths and weird name, making it at least difficult to guess what it is about.

Right now, within Recuva, one can often guess based on path names.

Again, it is just an idea!

There may be tools that secure delete files on SSD, but they do not clear the MFT records.

4wd:
TRIM speeds up write access by periodically clearing blocks marked for deletion rather than wait to delete when a write is required, (simplified version).

AFAIK, SSDs have Secure Erase which only act on the whole drive but the SSD has to support it.

Regarding the MFT:
http://www.moo0.com/software/AntiRecovery/

If you're that concerned about someone able to see what's been on the SSD, Bitlocker it, (or some other encryption).

dcwul62:
Yes, the SSD software (Samsung Magician) also provides secure erase.
That covers the entire drive and will probably run for a century.

Other software,  like Eraser,  can securely delete files only, which in most cases is enough.
In most cases there is no need to secure erase each and every file, but only specific ones, or specific folders.

However, in such cases, after securely deleting files and after running recovery software the file names / folder names are displayed.
Even though files can not be recovered, names show what they were about.

That's the background of my idea.

So, as securely deleting  -files-  on SSD is not possible, at least not that I know of, then the only thing left is to 'hide' them as best as possible
using random names and random 'scratch' folder.
So:
- randomize file name
- create a scratch folder with a random name
- move file to that folder
- delete that folder

Anyway, that is just an idea.


4wd:
So:
- randomize file name
- create a scratch folder with a random name
- move file to that folder
- delete that folder-dcwul62 (May 06, 2018, 01:32 AM)
--- End quote ---

I find your logic a little flawed with this procedure to supposedly disguise what folder a file originally came from in the event anyone tries to recover deleted files.


* The original folder still exists, pretty much any attempt to disguise where any file came from is pointless since if anyone is interested enough to care about the name of that folder they should rightly assume that any and possibly all files came from that folder regardless of their name or where they now appear on the drive.
* Given 1, it's enough to securely delete the file in the original folder without screwing around wasting write cycles on the SSD.

4wd:
A clean SSD with just one folder and two files, Recuva set for DeepScan, show everything:

Two files on an SSD:
Rename folder and files before deleting

Two files deleted, top one using DOpus secure delete, (since you were asking over there), the bottom using Moo0 FileShredder:
Rename folder and files before deleting

After Moo0 Anti-Recovery (with just the MFT options selected, takes a couple of seconds):
Rename folder and files before deleting

And just for an added extra, single file deleted with Microsoft's own SDelete:
Rename folder and files before deleting

You'll note the file name has partially become the original folder name, you could easily write a PoSh script that renames the folder, runs SDelete on the file(s), and then changes the folder name back.

Navigation

[0] Message Index

[#] Next page

Go to full version