Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Where is SECURE ERASE FREE SPACE in El Capitan Disk Utility ?

Can't find anymore (since I installed El Capitan) the SECURE ERASE FREE SPACE in Disk Utility.
I can securly erase the whole disk.. but I want to securly erase just the empty space... Before I had this option. Now the new Disk Util (with the coloured HDD structure like iOs) doesn't give me anymore this option.

Please help

Mac mini (Late 2012), OS X Mavericks (10.9.1)

Posted on Oct 2, 2015 5:05 AM

Reply
Question marked as Best reply

Posted on Oct 15, 2015 11:41 AM

This method is potentially disastrous for the integrity of your OS and not in the best interest for the casual user:


from the article:

Warning! It’s critically important that you include the

freespace
portion of that command. If you don’t,
diskutil
will happily start securely erasing the entire disk, instead of just the free space!

Instead of that possibility it may be safer to use the Delete Immediately option by selecting the file in the finder

then go to FILE while holding down the OPTION KEY

It can also be used for individual or multiple files in the trash by opening trash, selecting the file(s) and RMB or LMB+OPTION and selecting Delete Immediatly

User uploaded file

51 replies
Question marked as Best reply

Oct 15, 2015 11:41 AM in response to Mac_You_Sir

This method is potentially disastrous for the integrity of your OS and not in the best interest for the casual user:


from the article:

Warning! It’s critically important that you include the

freespace
portion of that command. If you don’t,
diskutil
will happily start securely erasing the entire disk, instead of just the free space!

Instead of that possibility it may be safer to use the Delete Immediately option by selecting the file in the finder

then go to FILE while holding down the OPTION KEY

It can also be used for individual or multiple files in the trash by opening trash, selecting the file(s) and RMB or LMB+OPTION and selecting Delete Immediatly

User uploaded file

Oct 15, 2015 10:41 AM in response to MarcelloM1973

I have the same question.


I have discovered that you can perform the secure erase free space function from the terminal window using the diskutil secureErase freespace command, as described in the article below.


http://www.macworld.com/article/1139688/erasefreespace.html


I've read more than a few comments from people saying that running this utility creates a temp file to create the overwrite data to securely erase your free space, and that if your hard drive doesn't have enough free space to hold this temp file (someone said "More than half" of the hard drive should be free), you could end up with this situation where your computer locks up and bad things happen while running secureErase, so I'm sort of scared to try it. DEFINITELY back up your computer first if you are considering using this command.


Has anyone that reads this thread been able to successfully run this command? Any pitfalls to look out for so I don't brick my laptop?


I also have a stupid (related) question....when I perform "diskutil list" in the terminal window (so I can find the exact name of the drive for which I want to erase the free space), I have two "Macintosh HD" volumes listed....one is "Apple_CoreStorage" under /dev/disk0 (internal,physical), and the other is "Apple_HFS" under dev/disk1 (internal, virtual). I'm assuming this "Internal,virtual" drive has something to do with the fact that I enabled that FileVault encryption thing, so this is related to mounting the unencrypted drive (my guess)....but if I DO perform secureErase, I'm supposed to do it to the Apple_CoreStorage (physical) Macintosh HD, right? Not the Apple_HFS (virtual) one? Complete NOOB question, sorry.

Oct 15, 2015 11:57 AM in response to Old Toad

This is different.. SECRUELY ERASE had different options including 7-pass erase. This means not only deleting but writen random data then 000 then random data etc.. many times up to government secure standards. DELETE IMMEDIATLY is something else.. it just jumps the EMPTY TRASH part.
There is a way... for the future... to securely delete and it's to have the drive encripted from the beginning. So everything you delete will stay encripeted. But if you have a drive already up and running and you want to securely erase empty space... at present it can't be done.. and I don't know why they took it away

Oct 15, 2015 4:35 PM in response to MarcelloM1973

MarcelloM1973 wrote:


This is different.. SECRUELY ERASE had different options including 7-pass erase. This means not only deleting but writen random data then 000 then random data etc.. many times up to government secure standards.

Except the security bulletin states it wasn't actually doing that reliably.

An issue existed in guaranteeing secure deletion of Trash files on some systems, such as those with flash storage.

So, I would suggest you encrypt your disk, which is reliable, and you won't have to waste time securely erasing the disk.

Nov 21, 2015 11:14 PM in response to Old Toad

"wear and tear" -- really?


Isn't that something you typically hear from your auto mechanic? These aren't gaskets that wear out. This is writing binary data over binary data. There's no more wear and tear than any other heavy processing a computer might do. And it's an infrequently used feature anyway.


I'm not one for conspiracy theories, but it's not hard (and most unfortunate) to suspect that this is more likely the result of nudging from Washington D.C. and northern Virginia to make it more difficult for Americans to destroy data.


The feature was convenient to use, even though a little intimidating. Now it's far more intimidating as that article out. Triple-check to make sure that "freespace" is in the command.


First, you can use the Disk Utility to determine the device name of the disk, which is usually "disk1" before using Terminal.

Nov 22, 2015 12:41 AM in response to iRaindrop

iRaindrop wrote:


"wear and tear" -- really?


Isn't that something you typically hear from your auto mechanic? These aren't gaskets that wear out. This is writing binary data over binary data.

Except that:

1) With SSDs it isn't writing binary data over binary data -- that's the main reason the command was removed.

2) SSDs are composed of memory cells that do gradually wear out, loosing their ability to retain data. That's why they include wear leveling routines to extend their service lives.

Nov 22, 2015 12:43 PM in response to R C-R

Thanks R C-R, and Old Toad, I stand corrected. My apologies, and to Apple as well. I am suspect these days, given the headlines, when talking about security and everyday terms such as 'wear-and-tear' are used - as they seem to be convenient to placate the novices.


Below is my experience from running the command. I just did a 1 pass, but it took a LOT longer than when the feature was in Disk Utility. The error (69847) happened in Yosemite too (when I got my mac) so it looks like the same thing. Nevertheless, it worked as Wondershare's data recovery app found absolutely nothing.


<my>-MacBook-Pro:~ <me>$ diskutil secureErase freespace 1 /dev/disk1

Started erase on disk1 Macintosh HD

Creating a temporary file

Securely erasing a file

Creating a secondary temporary file

Mounting disk

Error: -69847: Couldn't create temporary file

Underlying error: 1: POSIX reports: Operation not permitted

<my>-MacBook-Pro:~ <me>$


But better than erasing free disk space is secure erase - which is also still available in Terminal, and explained in this article.

Nov 22, 2015 3:42 PM in response to iRaindrop

iRaindrop wrote:

I am suspect these days, given the headlines, when talking about security and everyday terms such as 'wear-and-tear' are used - as they seem to be convenient to placate the novices.


The irony of this is that Apple is in fact trying to discourage users from relying on "secure" erase options that are not really effective or reliable, thus making it much easier for those agencies the headlines scream about to recover data from users' drives if they rely on any of those methods, including command line tools like srm. That OS X daily article mentions but glosses over the fact that, as it says, the srm method is nothing more than equivalent to the now removed Disk Utility option. That means it is subject to exactly the same limitations!


The bottom line is even if one of these methods succeeds in overwriting the virtual storage location the storage device uses for the file (which is unlikely in the extreme for SSDs) the physical location of some or all of that files data could be different & inaccessible by the OS ... but not by agencies using advanced forensic tools & techniques.

Nov 22, 2015 5:17 PM in response to R C-R

Good info, RC-R. I would just add that there is a need for a "secure" erase for those who are not in the league as the folks who are trying to evade ultra advanced forensics. For example such data as NDA documents, code projects, financial stuff, pics you don't want the tabloids to get, etc, where a secure erase is sufficient to avoid most file recovery programs - but not trying to to beat the advanced electromagnetic forensics that only a lab can do. There is still value for the customer in that, even through it is not 100% secure.

Nov 22, 2015 5:03 PM in response to iRaindrop

iRaindrop wrote:


Good info, RC-R. I would just add that there is a need for a "secure" erase for those who are not in the league as the folks who are trying to evade ultra advanced forensics. For example such data as NDA documents, code projects, financial stuff, adult ****, etc, where a secure erase is sufficient to avoid most file recovery programs - but not trying to to beat the advanced electromagnetic forensics that only a lab can do. There is still value for the customer in that, even through it is not 100% secure.

Or, they can just encrypt their hard drive with FileVault.

Where is SECURE ERASE FREE SPACE in El Capitan Disk Utility ?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.