Is there a way to make sure that a deleted file can not be recovered?
As you know, deleting a file by pressing shift-del or using trash doesn't mean that file is gone forever. It resides somewhere in the computer.
In day to day life, law enforcement or thieves use recovery programs to reveal our private data or something else.
They can recover all data that resides on hard disk, in RAM, and even USB.
To protect us from these people, what should one do? Which program should one use?
Note: I don't want an answer like first use a recovery program then erase that file with shred. With just one program, I want to erase all unused/deleted files on my computer.
Shred
This command line tool is already installed from the core utilities in Ubuntu to securely erase and overwrite single files using the Gutman method.
Fast shredding
erases whole partitions by overwriting everything with
0
s in a single iteration. If no legal aspects require another procedure, doing so is most probably safe to securely delete your private data.from Craig Wright Lecture Notes in Computer Science, 2008, 5352, 243-257.
Secure shredding
erases the whole partition using 3 iterations with random numbers. In addition (option
-z
) this writes zeros to hide the shredding process at the end. This will take 4 times longer than the fast method.NOTE: By shredding a partition we will overwrite this partition with
0
or random numbers. It therefore efficiently deletes everything including file system caches on that partition forever. This can also be used to remove unwanted remnants of deleted files. Files we want to keep will have to be backed up before shredding.Wipe
More options, and the possibility of erasing directories in addition to single files, are offered by this command line utility.
Additional notes on journaling file systems and SSDs:
Please read the notes in the linked manpages on security issues arising from still recoverable backups in journaling file systems when erasing single files. Overwriting whole partitions rather than single files will effectively erase all data even when using a journaling file system.
Erasing data on a solid state disk (SSD) can if at all only be done by overwriting the whole drive (not only single partitions) with several iterations. Some SSDs may have an inbuilt feature to erase data but this may not always be efficient (see this link from comment). At present there is no general recommendation on the wiping processes or number of erase iterations needed to securely remove all data remnants on all SSDs available.
These options can be added in the context menu of Nautilus and Thunar.
Add (the plus sign)
Name "Shred File"
Description whatever you like
Action "shred -u %f"
Similarly for
wipe
.Select "Appearance Conditions" and select "Other Files"
There isn't one command that you can run which will easily clean up all the already-deleted files for you. However, there are a number of things you can do to reduce your vulnerability to this sort of attack in future.
As others have said, using tools like shred or srm allows you to delete a specific file by actually overwriting it, rather than just removing it from the filesystem. If you're feeling bold, you can replace the
rm
command withshred
orsrm
to securely delete files going forward. That means that whenever you (or another program) tries to delete something usingrm
, the secure delete command will run instead.However, if you're using a solid state disk, or even some newer mechanical disks, shred and other overwriting-based methods may not be effective, since the disk may not actually write where you think it's writing (source).
Full-Disk Encryption
A more convenient option is full-disk encryption. If you use the alternate installer, Ubuntu can automatically set up a fully-encrypted disk for you you, but you can also customize and configure the settings yourself. Once installed, the encryption is almost invisible to you: after you enter the passphrase (be sure to pick a good, long one) when the computer starts up, everything looks and feels just like normal Ubuntu.
You can also encrypt external media like USB drives using Ubuntu's Disk Utility. Setting up an encrypted external disk is as simple as checking the "encrypt underlying filesystem" box when formatting the disk. You can even store the passphrase on your (encrypted) keyring, so that you don't need to enter the phrase every time you plug that disk into your computer.
If your whole disk -- and all your removable media -- is encrypted, there's much less to worry about. A thief or police officer would need to swipe your computer while it's on, (or within a minute or two of turning it off if they're very good) in order to access your data. If you hibernate (rather than suspend) your computer when it's not in use, then you should be pretty safe.
If you ever need to completely destroy all your data, you don't need to do a Gutmann wipe of your whole disk. Simply overwrite the very beginning of the disk, to destroy the headers for the encrypted volume. Unlike with a regular filesystem, this will actually make it impossible to recover the data.
So, how do you go from your current setup to a safely encrypted disk? It's quite a challenge to retrofit a currently-installed operating system to use an encrypted disk. The easiest approach is to backup all your data and settings, then reinstall with an encrypted disk. When backing up, make sure to back up your data to an encrypted external drive, but don't save the passphrase in your keyring.
After you've backed everything up, you may want to aggressively wipe your hard drive, to make sure that none of your existing data can be recovered in the future. If you're using an SSD, the process is even more challenging, so depending how much you want to invest in the process, it might be worth destroying your current disk (a challenging proposition) and starting with a new one.
When reinstalling the OS, if you haven't aggressively wiped the disk already, you should make sure to completely fill the new encrypted partition, which will overwrite all your old data. Once you've restored your backup, you may want to aggressively wipe the start of the backup disk, to destroy the encryption header, so that it can't be recovered again.
Update: If you have not yet deleted the file that you want to be non-recoverable, use the accepted answer. If, however, you already deleted the file[s], then this is the next best method that I know of.
If I read you right, you want to erase all your previously deleted files. Here is a simple way to do that:
Let that run till it complains till it gets a disk write error [out of space]. Then delete the file! What this does is just fill up your empty disk with 000s, so all your previous files get overwritten. Make sure to delete the file now, or you will not have any disk left. You might want to do this a few times if you are really paranoid. Or if you want to write random to your disk, I'd suggest replace
/dev/zero
with/dev/urandom
.However, this will take much much longer, so I'd run it overnight. Also, if you want a progress meter, do this instead:
First you are getting your free disk space with du, awk, and tail, then using dd to get /dev/zero, piping that to
pv
which stands for "pipe viewer", that redirects everything totmp_file
Once again, delete the file afterwards.$ rm tmp_file
Anyway, hope someone finds this useful! :)
First, delete files with rm on the terminal or with shift-delete on nautilus. Better yet, use
srm
, from the Secure-Delete tools package.You can install the secure delete tools like this:
Second, use sfill to wipe out unused space on your disk:
This will take some time, since it is using crypto techniques to fill out the disk.
Warning: this is going through your whole filesystem, and you are root. Use with care!
This will create a file which wipes out all previously existing data. The file will be created in
<directory>
.A GUI program for this is BleachBit (it's also in the sources). More recent (deb file) version at the BleachBit Sourceforge page.
Beyond simply deleting files, it includes advanced features such as shredding files to prevent recovery, wiping free disk space to hide traces of files deleted by other applications.
BleachBit has several advanced cleaners:
For details on how to use Bleachbit to delete securely specific files and folders see this answer.
If you want a solution which can't be thwarted by a pathologically obsessed individual then you should consider some combination (limited by monetary resources) of:
These solutions range drastically in cost & ingenuity. A few:
For SSDs and other flash storage media
SSDs and many other flash storage media use a technique called “wear levelling” that reassigns unused blocks of storage cells based on their number of previous write cycles to prolong the drive’s life time. As a consequence, overwriting block ranges doesn’t work as a method to erase storage content securely (or even efficiently) like it does for hard disk drives. On the other hand, flash storage allows much faster and efficient secure erasure of blocks, block ranges, or entire drives.
Erase the entire drive
(source)
If the command output in step 1 is empty the drive does not support secure erasure but may still support the TRIM command required for the section below.
Erase a drive partition
The
blkdiscard(8)
2 can erase block devices securely if the drive supports it1:where
/dev/sdXN
is the path to the block device node referring to the drive or partition to erase.1 If your drive is inside an external casing with a USB or FireWire connection the translation chipset may block support of some optional features like secure erasure and TRIM even if the enclosed drive supports it.
2 Available and installed by default since Ubuntu Xenial Xerus (16.04).
I would say the the solution is a combination of several answers given here. For already-deleted files and partitions still in use, I agree with Matt.
Then, for the future I would suggest to start using secure-delete tools instead of simple 'rm'.
Last, when it will be possible to reformat the partition, the option of encrypt the partition should be considered. Perhaps using some approach that offers Plausible deniability like in Truecrypt
I use truecrypt file image for such essential data. I't handy, free, crossplatform and I don't need a full disk nor using any extra software to "really delete" the file.
Just make sure you have strong password and make make backup of the image file. I keep backup in a cloud.
The first option is shred. The previous answer in regards to shred is lacking some needed details. You will not overcome the file system caching, snapshots and journaling, etc. if you run shred on the partition (as in the example of
sdc5
), and data will remain, lots of it potentially.For shred to be effective, especially on modern SSD's etc, you must run it on the device not the partition. This would be
/dev/sdc
... without a number on the end (partition number).You will need to do this from a live USB if the drive you wish to clean is the primary device for your computer. In this case, you will be best to add persistence to the live USB when you create it so that you can download a few extra tools to do the job properly also.
Run the command:
sudo shred -vfxz /dev/sdc
orsda
or whatever the device name is. If you are unsure of name, open Disks or GParted to identify your device, or run the command-lsblk
in the terminal and identify the name of your device there.Adding the letters
f
andx
to the command is important as f= force permissions and x=exact size of files. Without these you may miss data that required permission to read or write, or miss data when the file is rounded up to the block size.You can add a desired number of write passes by adding
-n
(number you desire). Example:sudo shred -vfxz -n 5 /dev/sdc
This is the first port of call to wipe your drive. It may help to run similar tools such as shrub, secure-delete and nwipe. They all work in the same way with very similar commands and slightly different methods and patterns. Go to the Linux man page or Google them to quickly become familiar with how to use the commands. It is not likely you will need more than the standard 4 shred passes, but if it is important you might as well go the extra mile as it could possibly help.
Your RAM may well have data on it. After installing secure-delete, run the command for sdmem. This will wipe your RAM memory. However the first data you ever filled the RAM with, plus any data that stayed in RAM for prolonged periods, may well have left a trace.
When buying new RAM(or HD's/SSD's for that matter), it is best to fill the drive to completion a few times. You could use shred, but dd is probably better here. Command:
It is also best with RAM to repeat this procedure before using sensitive data if you want to increase your security, and wipe sensitive data from RAM as quickly as possible afterwards. It is this time left in place that is mostly responsible for its ability to leave a trace.
The only thing left to do is create a partition or install your next distro.
Encryption - People often state this as a reliable method, but if you are going to continue to use your hard drive or pass it on to someone else, this is not an effective option. With regard to legal trouble, failing to unlock an encrypted device is often not an option and can be presumed guilt or an actual offense in many places. It may stop a thief, etc. though (stealing data only lol).
Also note, an encrypted home folder is very different and protects nothing from physically being examined on your computer, it is for online/system safety essentially and can be circumvented.
If disposing of the device - After wiping with shred, then encrypting with a long password that contains special characters like * etc. to break up the letters and numbers of your password, use shred again but you can just specify the first 10gig of the drive (depends on size, but this is a large safe number). Example:
sudo shred -vfxzs10G /dev/sdc
This is quicker and just as effective as shredding the whole drive in these circumstances.Then to be sure, take the hard drive and RAM out, the RAM is easy to snap and destroy, SSDs are too. You can get creative and release that paranoid energy while breaking them.