Feeds

Take a hammer to your hard drive, shrieks Which?

Wiping-tech confidence collapse insanity

The Power of One eBook: Top reasons to choose HP BladeSystem

Which? Computing has lost faith in wiping technology and advised punters to take a hammer to hard discs they intend to get rid of. Reg readers and experts have slammed the advice as misguided and irresponsible.

The possibility that dodgy sorts might be able to recover deleted data with the help of specialist software from PCs or hard discs flogged through auction sites or even "disposed" of through council rubbish dumps is real enough, and something we've covered several times on El Reg, going back ten years to the incident when Paul McCartney's banking details turned up on a carelessly discarded PC.

Still, getting medieval on computer kit, while it might be emotionally satisfying, carries a risk of potential eye injury through shrapnel, for example, and is generally a dumb idea. A better approach would be to wipe data securely before getting rid of it or, better still, donating it to charities such as Computer Aid International so that up-to-date second-hand kit can be given a second lease of life in the third world.

Which? Computing reckons wiping has become unreliable, but experts dismiss this view. "There's lots of software out there that does wiping very well, such as Blancco Data Destruction, and it doesn't cost much," said Harlan Simpson, director of Disklabs.

Appetite for destruction

Which? Computing bought eight second-hand hard drives from eBay. Unsurprisingly it found potentially confidential data on these drives. Even after using an unspecified and free data destruction package, the computer magazine was "able to recover 22,000 'deleted' files, including images, music files and spreadsheets", it reports.

Having lost faith with data destruction, on the basis of its experience with one wiping tool, Which? Computing goes on to advise that "if you want to be absolutely sure your files are deleted, remove the hard drive from your PC and destroy it with a hammer".

"It sounds extreme, but the only way to be 100 per cent safe is to smash your hard drive into smithereens," said Sarah Kidner, editor of Which? Computing.

Disklabs' Simpson acknowledged that consumers need to be careful about the capability of data destruction products but nonetheless dismissed the Which? Computing advice out of hand. "As long as consumers use a certified and approved product they'll be fine. Which? Computing is sending out the wrong message," he added.

Reg reader Dave Compton is even more dismissive about the initial Which? Computing "study" as well as the BBC's decision to uncritically report on its findings, alongside a how to box-out.

"Imagine the injuries people will sustain (especially with shattered glass platters), not to mention the waste of good hardware," Compton said.

Which? is published by the Consumer Association and has a long history of offering sensible advice on everything from car maintenance to home finance and computers. Its latest advice - particularly with the risk it poses of personal injury - is therefore all the more puzzling. A helpful spokeswoman acknowledged we might have a point about the personal injury risk and said it would always advise the use of protective kit - something not actually mentioned in its press release. ®

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.