No one cares. I'd quick format it and call it a day. There's no chain of custody so it's never proof of anything in any sense that matters.
Data Hoarder
We are digital librarians. Among us are represented the various reasons to keep data -- legal requirements, competitive requirements, uncertainty of permanence of cloud services, distaste for transmitting your data externally (e.g. government or corporate espionage), cultural and familial archivists, internet collapse preppers, and people who do it themselves so they're sure it's done right. Everyone has their reasons for curating the data they have decided to keep (either forever or For A Damn Long Time (tm) ). Along the way we have sought out like-minded individuals to exchange strategies, war stories, and cautionary tales of failures.
Yeah, this is the rational line of thinking honestly. I just overly worry.
I'm pretty sure the oem is not hooking up every rma drive and looking for files.
"well, new rma drive? Let's pop it in the USB caddy and see what's there... Hmm, some files... jpgs... Mpegs... Oh look. Pdfs with embedded viruses. Good thing we didn't connect this drive to... Oops"
They're sending that thing straight to the industrial degausser and then certification for possible resale.
As company policy? No. But their employees are people too.
I used to work for a large ISP that shall remain nameless. The ISP abuse department absolutely DID look at every pub ftp they were told to shut down, and grabbed whatever they found interesting before shutting it down. There may even have been a massive MP3 share on one of their servers to store their ill-gotten gains.
Absolutely NOT company policy, but it happened.
But the question here is: should OP worry about his 'linux isos' getting him in trouble. Even accounting for overly curious employees, the answer is still NO.
There may even have been a massive MP3 share
I never understood the "gotta have 'em all" mentality of mp3 collecting.
"Hey! Check out my massive collection of bitrate/dynamic range/frequency range -decimated music. I don't need CDs anymore."
With your logic we would not have recertified drives.
100 hours seems excessive. If you want to zero a drive, one pass is plenty.
Yeah I didn't realize until you said this that the default option on ShredOS is a 3 pass... that explains the 100 hours.
Those are all your legitimate backups. What are you talking about?
Oops you're right, my bad!
My experience this year, I claimed on a Seagate NAS + 6 Ironwolf drives. Had a fair bit of moves/tv, they did data recovery for me as well.
There was no issue & I was assured my digital content would be treated as private and confidential.
Isn't the format drive without ticking quick format on Windows the same? It took me around 36hrs for the 5TB yesterday
You should always zero a drive, if you can before sending back.
If a drive ever has sensitive data and you can't zero it, you shouldn't ever return it.
Let's say the drive was full of pirated movies and games. Then you send it back to them. What's the worst that can happen - has anyone ever HEARD of an hdd manufacturer making a stink about it?
All good advice this time. Next time crypto the drive. Remember you can't wipe a dead drive so if you're super paranoid crypto it before hand then you don't care.
It’s true you can’t wipe a dead drive if you want to return it and get it RMA’d. On the other hand, I’m willing to bet a hard drive with a few 1/2” holes in it —or platters that got too close to an orbital sander—is going to be recovered by anyone other than a state actor with an agenda.
Has someone who has work in a service reparation center, we don’t care because we don’t have the time Same has « I’ve some trouble with my internet and a tech come to my house did it can view if I torrenting ? » Yes we can (Open port & if you torrenting in the same time we analyse what’s in the network to determine where it’s fucked up) but we don’t care, we are paid to repair thing not snitching (we don’t have a bonus for that)
No.
If the drive has Instant Secure Erase ISE or something, you can get it done in just few minutes. Data in rendered unreadable.
You should use ATA Secure Erase, it is much faster then most if not all the other methods. It generally works better on failing drives in my experience as well.
There are various ways to do it depending on your system/OS. Some BIOS have an ATA Secure Erase option built into them. (Parted Magic has a nice GUI, hdparm, etc.)
It has been a while since I used it on a super large drive, but I am guessing your 18TB will take a few hours.
Just make sure to select the correct drive (or have it be the only drive in the system preferable) as there is no recovery if you choose the wrong drive.
Just zero it out, and send it back. You have a piece of comfort that way.
Recently had a Seagate Ironwolf fail in its first couple months, it had 10Tb of my personal Blu-ray movie backup archive on it. They recovered it and sent it back on an external drive for free. Nobody cares
The HDD manufacturer can't be arsed to care what MPAA thinks, nor can the MPAA compel them to do diddly squat.
This is why I do full disk encryption always. Throwing it out is much easier.
Drillbit takes care of that nicely.
No one will mind. If it lets you sleep better at night, wipe it if possible. They just put it onto a test system, see if it is really broken and throw it into a bin container for recycling.
Worst that can happen is, that someone want's to have your movie collection and restores it off the HDD on a side setup for personal use. No one will forward it to the movie association for legal prosecution!
If you're really worried about it, grab a free Linux dvd from a random computer magazine. Ctrl+A, then delete everything on the drive. Empty the recycle bin. Now copy and paste the dvd onto the drive as many times as it takes to fill it completely. When done, Ctrl+A again, delete and empty recycle bin again.
If you've got an agreed RMA, they're not going to go a deep dive file recovery, they'll be logging the serial number in a database and chucking the drive in the recycle pile. Emptying, filling and emptying again is more than enough.
Data erasure procedures are built into the drive (and have been for decades). Search for "ATA erase howto"
Faffing around with "erasure utilities" is a waste of time and effort
ATA secure disk erase should change the pre existing encryption key and effectively wipe the drive beyond recovery in seconds
Even if the drive does it the long way, the command itself only takes a few seconds to issue, doesn't tie up tbe computer whilst the procedure is underway and is MORE effective than any kind of software wipe - particularly for any kind of shingled drive, where it's the only valid way of erasing a drive
Peter Guttman's famous recovery of data with an atomic force microscope was performed on stepper-motor based 5-10MB drives and has not been able to be replicated on 200MB ones let alone anything larger.
He issued a followup paper to the original stating that most "military grade overwrite" and other claims are simply voodoo/mumbo-jumbo on modern drives (2-10GB at the time he wrote it)
multiple overwrite procedures were created in the days of 10-12 inch platters and stepper motors without disk head tracking servos - for the simple reason that the military mindset usually wanted to blow old equipment up whilst technical staff wanted safer/cheaper/more effective methods which could be done before data left sensitive areas
I wouldn't worry personally. I sent a 16tb Iron Wolf to Seagate that shit the bed. It exclusively had pirated movies/shows/games. The free recovery didn't pull anything, so they just sent me a new drive instead.