this post was submitted on 05 Mar 2025
65 points (92.2% liked)

No Stupid Questions

38158 readers
1082 users here now

No such thing. Ask away!

!nostupidquestions is a community dedicated to being helpful and answering each others' questions on various topics.

The rules for posting and commenting, besides the rules defined here for lemmy.world, are as follows:

Rules (interactive)


Rule 1- All posts must be legitimate questions. All post titles must include a question.

All posts must be legitimate questions, and all post titles must include a question. Questions that are joke or trolling questions, memes, song lyrics as title, etc. are not allowed here. See Rule 6 for all exceptions.



Rule 2- Your question subject cannot be illegal or NSFW material.

Your question subject cannot be illegal or NSFW material. You will be warned first, banned second.



Rule 3- Do not seek mental, medical and professional help here.

Do not seek mental, medical and professional help here. Breaking this rule will not get you or your post removed, but it will put you at risk, and possibly in danger.



Rule 4- No self promotion or upvote-farming of any kind.

That's it.



Rule 5- No baiting or sealioning or promoting an agenda.

Questions which, instead of being of an innocuous nature, are specifically intended (based on reports and in the opinion of our crack moderation team) to bait users into ideological wars on charged political topics will be removed and the authors warned - or banned - depending on severity.



Rule 6- Regarding META posts and joke questions.

Provided it is about the community itself, you may post non-question posts using the [META] tag on your post title.

On fridays, you are allowed to post meme and troll questions, on the condition that it's in text format only, and conforms with our other rules. These posts MUST include the [NSQ Friday] tag in their title.

If you post a serious question on friday and are looking only for legitimate answers, then please include the [Serious] tag on your post. Irrelevant replies will then be removed by moderators.



Rule 7- You can't intentionally annoy, mock, or harass other members.

If you intentionally annoy, mock, harass, or discriminate against any individual member, you will be removed.

Likewise, if you are a member, sympathiser or a resemblant of a movement that is known to largely hate, mock, discriminate against, and/or want to take lives of a group of people, and you were provably vocal about your hate, then you will be banned on sight.



Rule 8- All comments should try to stay relevant to their parent content.



Rule 9- Reposts from other platforms are not allowed.

Let everyone have their own content.



Rule 10- Majority of bots aren't allowed to participate here.



Credits

Our breathtaking icon was bestowed upon us by @Cevilia!

The greatest banner of all time: by @TheOneWithTheHair!

founded 2 years ago
MODERATORS
 

So I learned that if a MicroSD card gets snapped in half, its unrecoverable.

Okay, so suppose you were in war, and enemy soldiers were about to raid you. You just snap the cards in half and the data is un-recoverable, right?

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 48 points 3 days ago* (last edited 3 days ago) (3 children)

As long as the silicon got snapped and not just the softer plastic around the silicon.

If it's actually important data that a nation state would want, most of the data could still be read off with an electron microscope.

[–] [email protected] 27 points 3 days ago (2 children)

most of the data could still be read off with an electro microscop

So what you're saying is that, its recoverable, just not by the average data recovery company.

[–] [email protected] 14 points 3 days ago* (last edited 3 days ago) (2 children)

Your best bet would be to shred the data multiple times (for example with the shred command) and then break the card physically. But shredding takes time so I guess that's not very applicable to your case.

If you have a lighter, you also can try to melt the SD card's insides. That should be impossible to recover.

In any case, you should keep it encrypted all the time and only decrypt it on the fly. For example with LUKS2.

[–] [email protected] 7 points 2 days ago (2 children)

Shredding might not work the way you expect on a SD card.

The memory cells in a SD Card can only handle a limited amount of write operations. A SD card typically has more cells than needed, so the controller can switch through different cells to improve the overall lifetime of the card. Which means you can't be sure which cells gets rewritten when shredding, so the data you want to be gone, could still be readable.

If you want to secure your data, use strong encryption. Because what you gonna do, if you can't destroy or get rid of the SD card?

[–] [email protected] 1 points 9 hours ago (1 children)

So I probably shouldn’t store my MacOS time machine backups on a 250GB microSD card? (It was the only practical thing I had when I started it and I never got around to changing it)

[–] [email protected] 1 points 2 hours ago

I don't know how MacOS time machine works exactly, but if it constantly writes on the SD card you should consider changing to an external SSD or HDD. The best backup isn't helpful if your backup medium dies.

[–] [email protected] 1 points 2 days ago

So that's why I recovered 4GB of pictures out of a 1GB card from my dad's camera huh? TIL

[–] [email protected] 4 points 3 days ago (1 children)

I was going to say burn it too.

[–] [email protected] 2 points 3 days ago

And if you really want to burn it good look into getting/making thermite.

[–] Kowowow 7 points 3 days ago (1 children)

At that point chewing on it might be your best bet

[–] [email protected] 6 points 3 days ago (1 children)

Are your teeth able to do significant damage? You can of course dent the plastic shell, but the inside is protected by harder things.

[–] [email protected] 7 points 3 days ago

The silicon die could easily chip a tooth as well, the stuff is insanely hard.

[–] [email protected] 4 points 3 days ago (2 children)
[–] [email protected] 4 points 3 days ago (1 children)
[–] [email protected] 1 points 3 days ago (1 children)

The first two links that you posted don't appear to cover electron microscopy at all. The last appears to show a potential method of attack--which is noted in the link that I posted--but does not seem to show that it's actually been successfully implemented. ("Using SEM operator-free acquisition and standard image processing technique we demonstrate the possible [emphasis added] automating of such technique over a full memory. [...] The technique is a first step [emphasis added] for reverse engineering secure embedded systems.")

[–] [email protected] 1 points 2 days ago* (last edited 2 days ago)

Sorry the first link was wrong but the second link was a research paper that showed them doing it.

Just google electron microscope eeprom and you will find hundreds of documents on the procedure. The second link I provided wasn't theoretical. It showed it actually being done.

https://www.researchgate.net/publication/312551555_Reverse_engineering_Flash_EEPROM_memories_using_Scanning_Electron_Microscopy "All those parameters allowed us to obtain clear differences between '0' and '1' states as seen in Figure 4. It has to be noted that this image is obtained without additional image processing to highlight differences between '0' and '1' states."

"demonstrate the possible [emphasis added] automating "

It doesn't say it isn't possible but that they have a possible way of AUTOMATING it. That is instead of someone looking at the image and reading off the bits into bytes, they could take the image and output the data without human intervention.

[–] [email protected] 1 points 3 days ago

This article is focused on reading them electrically.

I too have heard you can read flash storage with electron microscopes.