- Is the data securely overwritten or could it possibly be recovered by a new user, should you give your PB away or sell it? I'm not talking about recovering the wiped data by looking for it on the PB itself, obviously it wouldn't be visible on the PB itself once a wipe was done. I was thinking more of someone scanning the PB with some type of data recovery software from a pc via the usb port for example and possibly recovering any sensitive data that way.
And if the data is not securely overwritten, what apps are available to do this for the PB?
Thanks for any info.01-09-12 11:42 PMLike 0 - The built in secure wipe is safe enough for standard users. If someone really really want the data then it's not impossible to retirve data. It will take hours to recover it so it all depends on the motive of thief. I will be comfortable with the wipe and giving it to someone else.01-10-12 01:23 AMLike 0
- The built in secure wipe is safe enough for standard users. If someone really really want the data then it's not impossible to retirve data. It will take hours to recover it so it all depends on the motive of thief. I will be comfortable with the wipe and giving it to someone else.
I very highly doubt even a motivated thief could get data back from a wiped device (based on the assumption that RIM is smart enough to at LEAST wipe do a basic wipe of zeroes) within years let alone hours.01-10-12 01:50 AMLike 0 -
I would guess that if the CIA really wants my data from a wiped pb, they may be able to retrieve some of it but it might take them a while.01-10-12 10:10 AMLike 4 - Sith_ApprenticeMod Team EmeritusThe BlackBerry data wipe, with content protection (entire disk ecryption) enabled is secure enough that it passes the muster for wiping classified information, and authorized for use in a DoD environment.01-10-12 10:12 AMLike 0
- Sith_ApprenticeMod Team EmeritusAll of those forensic tv shows do it without any real problems. They take two pixels of an image and reproduce the entire jpg and can read the license plate, too!
I would guess that if the CIA really wants my data from a wiped pb, they may be able to retrieve some of it but it might take them a while.01-10-12 10:14 AMLike 0 - Thanks for the replies.
I was thinking of using the free program called Eraser (from my pc via usb cable) to overwrite anything I put on my PB that I wouldn't want recovered, just to be extra safe before I do the standard PB security wipe. I figure I can do a couple extra overwrites that way. That should be ok/safe to do, correct?01-10-12 04:43 PMLike 0 - I was thinking of using the free program called Eraser (from my pc via usb cable) to overwrite anything I put on my PB that I wouldn't want recovered, just to be extra safe before I do the standard PB security wipe. I figure I can do a couple extra overwrites that way. That should be ok/safe to do, correct?01-10-12 04:47 PMLike 0
- Ok, thanks. Do you know of a similar app that would work like Eraser - e.g. overwrite selected files/folders before the PB security wipe?
Last edited by space_traveler; 01-10-12 at 04:54 PM.
01-10-12 04:51 PMLike 0 - Overwriting files would require a low level filesystem access that nothing outside the PB will have, as that would have security implications. Just use the security wipe, it is more than good enough. As was explained earlier, BB security wipe meets US DoD specifications. You don't get any more secure than that.01-10-12 05:20 PMLike 0
- While I do respect peoples opinions here, as it sounds like many of you are more knowledgeable than myself on the matter, I still can't help but wonder how fully secure this PB security wipe really is.
It appears (based on previous posts) the PB security wipe does a simple single overwrite with zeros, which I agree would be pretty darn secure, but does anyone have any documentation on this?
Also, what about the free space on the drive? Is that overwritten (with zeros) as well? Could data possibly still be recovered off the free space after a PB security wipe?
Thanks again.01-10-12 05:38 PMLike 0 - RIM doesn't give the exact details for the PlayBook, however assuming that it's similar to the smartphones is a reasonable assumption. The details are listed at KB16307-Actions performed by the BlackBerry smartphone during the removal of stored user and application data . All forms of security wipe "Overwrites BlackBerry smartphone memory".space_traveler likes this.01-10-12 05:51 PMLike 1
- While I do respect peoples opinions here, as it sounds like many of you are more knowledgeable than myself on the matter, I still can't help but wonder how fully secure this PB security wipe really is.
It appears (based on previous posts) the PB security wipe does a simple single overwrite with zeros, which I agree would be pretty darn secure, but does anyone have any documentation on this?
Also, what about the free space on the drive? Is that overwritten (with zeros) as well? Could data possibly still be recovered off the free space after a PB security wipe?
Thanks again.
I don't want to make light of your dilemma but neither do I think anyone here is privy to the exact mechanism that RIM uses to erase data. Anything you see here would be sheer speculation. Perhaps you need to contact RIM directly or hire a security expert if this information is so vital to you.01-10-12 05:57 PMLike 0 -
- In either case, the following procedure should render the data unreadable:
1. Do security wipe and reinstall OS
2. Fill shared storage to capacity with random files
3 Delete all files in shared storage
4. Repeat steps 2 and 3 97 times
5. Repeat steps 1, through 4 inclusive 16 times
6. Incinerate device01-10-12 11:20 PMLike 2 - While I do respect peoples opinions here, as it sounds like many of you are more knowledgeable than myself on the matter, I still can't help but wonder how fully secure this PB security wipe really is.
It appears (based on previous posts) the PB security wipe does a simple single overwrite with zeros, which I agree would be pretty darn secure, but does anyone have any documentation on this?
Also, what about the free space on the drive? Is that overwritten (with zeros) as well? Could data possibly still be recovered off the free space after a PB security wipe?
I don't think it looks like an overwrite-with zeros necessarily. Flash devices don't work the same as hard drives. More likely the flash memory supports a single secure erase operation which wipes everything back to empty (which is usually all-ones for that matter). I understand the filesystems may also be encrypted, but that might be only the corporate partitions... I have no details on it.
I will say I was able to dig and get just enough info today to give me some confidence that what's being done is well beyond what I'd consider minimal, which would be ensuring someone with physical access, the ability to root the device, and an unlimited number of low-level tools could not retrieve my data after a wipe. I don't know yet whether the protection goes beyond that, protecting against someone who would physically remove the flash chips from the PCB and do, say, electron microscope scanning or some such.
I can only speak for myself, but I'm willing to entrust my passwords and such to the thing. I would, however, really like to know more about this as well, but reading up on the certifications would seem to be the first step.01-10-12 11:43 PMLike 3 - @ peter9477
Thanks peter9477, as usual another thoughtful and indepth reply.
I think I will try contacting RIM and see what they have to say first though. Best place to start I think.01-11-12 02:35 PMLike 0 - It seems we have all the usual thoughtless comments about the inquirer being "paranoid" and "just go destroy your device" remarks aimed at anyone who simply wants to better understand the security of their device/PB, typical really lol.
But what I'm especially surprised not to see is the usual shallow comments about how your "pr0n collection isn't worth all the effort" type comments. But I guess the thread isn't locked yet, right? Lmao.01-11-12 02:51 PMLike 0 - Don't go beating up on BuzzStarField, if that's the "destroy your device" remark to which you referred... he's sometimes got a pretty dry and subtle sense of humour and wasn't trying to make any snide statements about what you're trying to do.BuzzStarField likes this.01-11-12 04:00 PMLike 1
- BrantaRetired Network ModIf a device or its software meets FIPS approval that is probably good enough - provided you compare the requirements with the attacks you need to resist (risk assessment). The first approach might be to list your requirement on paper, then read the appropriate FIPS approval scheme - it is available online. I can't get to it immediately but I remember seeing relevant "performance standards" with which approved equipment must comply. I'm almost certain that zeroing of relevant stored data (encryption keys) was included in all cases and would effectively make user level stored data useless even if it could be recovered. Attack by physical removal of chips is covered at higher levels of approval.
The RIM security scheme is widely regarded as one of the best and most secure in the industry. If the standard protection is not adequate for your needs the real question is not destruction of the device, but whether you should be using a mobile device to access data of such sensitivity.01-11-12 04:02 PMLike 0 - It seems we have all the usual thoughtless comments about the inquirer being "paranoid" and "just go destroy your device" remarks aimed at anyone who simply wants to better understand the security of their device/PB, typical really lol.
But what I'm especially surprised not to see is the usual shallow comments about how your "pr0n collection isn't worth all the effort" type comments. But I guess the thread isn't locked yet, right? Lmao.
I actually thought about writing an app that would erase data with sufficient certainty to satisfy a paranoid person's particular needs. My idea involved writing and rewriting the flash drive with random stuff - but then I thought about the application data areas and other hiding places where I couldn't write random bits to. I quickly dismissed the app idea because I didn't know the answers to the questions that you were asking. Besides I doubted that there would be a huge market for a app like that anyway. And I could get into a liability pickle if it didn't work properly.
I decided that the app idea was crazy but I did ask myself what I would do if I couldn't trust RIM's wipe process and there was "stuff" that needed purging. The only reasonable thing to do in my mind would be to destroy the storage device.
Now all of this analysis crossed my mind in a split second and I chuckled out loud. For some reason, I thought that I needed to document the really convoluted way a paranoid person might proceed in order to hide some evidence. That's just the way my mind works and once again I apologize if I sent the wrong message.01-11-12 05:46 PMLike 2
- Forum
- BlackBerry PlayBook Forums
- BlackBerry PlayBook
How secure is security wipe?
LINK TO POST COPIED TO CLIPBOARD