Quote:
Originally Posted by PB PM
Not practical, no doubt, but doable. If some nefarious person controls a huge botnet for example they could spread the workload to millions of machines.
|
Only if you are first able to extract the flash chip at all (there are techniques for this, but you risk bricking the chip in the process). But yes, if so, you can parallelize the work.
Quote:
Originally Posted by PB PM
Not something the average person would have to worry about, but if someone was targeting you, that could be an issue.
|
I kind of feel like you've moved the goalposts a fair amount away from "hey, why doesn't the Apple Store provide customers with loaners?" (which does annoy me — their support experience could be far better here) to "well, if the customer they've previously loaned something to is being targeted, and the Apple Store has an employee who's in on the conspiracy, and if you can read data of the chip that by the design has no API to read its raw data, then that would be risky".
Quote:
Originally Posted by PB PM
It’s well known that even writing multiple zeros to a disc isn’t good enough to prevent data recovery.
|
Zero'ing data on an SSD is more likely to needlessly wear its cells than to bring a security benefit.