this post was submitted on 09 Jun 2024
18 points (90.9% liked)

Linux

7936 readers
8 users here now

Welcome to c/linux!

Welcome to our thriving Linux community! Whether you're a seasoned Linux enthusiast or just starting your journey, we're excited to have you here. Explore, learn, and collaborate with like-minded individuals who share a passion for open-source software and the endless possibilities it offers. Together, let's dive into the world of Linux and embrace the power of freedom, customization, and innovation. Enjoy your stay and feel free to join the vibrant discussions that await you!

Rules:

  1. Stay on topic: Posts and discussions should be related to Linux, open source software, and related technologies.

  2. Be respectful: Treat fellow community members with respect and courtesy.

  3. Quality over quantity: Share informative and thought-provoking content.

  4. No spam or self-promotion: Avoid excessive self-promotion or spamming.

  5. No NSFW adult content

  6. Follow general lemmy guidelines.

founded 1 year ago
MODERATORS
 

hi,

My company gave me a laptop for work and after some time they will give it to another person when I quit the company so I want to make sure I don't leave any of my data behind so which command should I run to delete my home directory to delete all the data?

is it just rm -rf /home/myname

you are viewing a single comment's thread
view the rest of the comments
[–] lurch@sh.itjust.works 4 points 4 months ago (1 children)

you can fill up the disk a few times after deleting files, so the system has to use up all free space and no matter where your data was it gets overwritten.

[–] jet@hackertalks.com 2 points 4 months ago (1 children)

Not necessarily true. SSDs can mark sectors that have been written too much as bad, so the data still there to be read forensically, but you can't write to it anymore.

[–] Tyoda@lemm.ee 6 points 4 months ago (1 children)

If you're that worried about privacy, then your only option is hammer+fire+spread the remains in multiple places. For the average paranoid I think it's enough to make generic file recovery tools ineffective.

[–] jet@hackertalks.com 4 points 4 months ago* (last edited 4 months ago)

It's much easier to use full disc encryption, and just change the keys

But every company I've ever worked for, when they retire machines they keep the drives no exceptions.

If it's good enough for corporate security, we know works at least.

For context, a cheap internal SSD is about $20. Not some crazy impossible expense. When we talk about taking the storage device out of the computer, we're talking about investing $20 to not have to worry about data leaking into the future. And at that cost it's basically a no-brainer. It would be crazy not to do it