Most digital security advice focuses on passwords and two-factor authentication, but The Hated One argues that the physical layer of your device is where the real vulnerabilities lie. This piece cuts through the noise of software patches to reveal a startling reality: deleting a file is often an illusion, and the only true protection against data recovery is full disk encryption. For busy professionals managing sensitive information, the distinction between "erasing" and "encrypting" isn't just technical—it's the difference between being compromised and being secure.
The Physical Attack Surface
The Hated One begins with a bottom-up approach, starting with peripheral devices like USB sticks and monitors. The author warns that "all these connections have some kind of API and some kind of protocol they speak and lots of these connections can be abused to hack you." This reframing is crucial; it shifts the threat model from a distant hacker to a local actor who might hand you a seemingly innocent drive. The advice is stark: avoid USB sticks entirely if possible. Instead, "use SD cards for data transfer between two" devices because they possess the "lowest attack surface and are really only about data and not about all the other funky stuff."
The commentary here is effective because it simplifies complex hardware protocols into a practical rule of thumb. By suggesting that users "never hook up something that's not yours to your laptop," The Hated One addresses the most common vector for physical attacks without requiring the reader to become a hardware engineer. However, critics might note that for high-level threats, even SD cards can be compromised if the device itself is physically tampered with, a scenario the author acknowledges by suggesting one might need to "glue all your parts" in extreme threat models.
The Illusion of Deletion
Perhaps the most critical insight in the piece concerns how operating systems handle deleted files. The Hated One explains that when you delete a file, the system "just tells the file system that the space that was used by the file is now available again." This means that without specific intervention, data remains recoverable. The author illustrates this with a cautionary tale of a colleague who "deleted the photos, took out the SD card, put a new one in... and used a tool to recover it again. It was never gone."
This section dismantles the common misconception that hitting "delete" is sufficient for security. The Hated One notes that while tools exist to overwrite free space, "a much cleaner method is to override the whole hard drive with random data or zeros." Yet, the author pivots quickly to the limitations of this approach on modern solid-state drives (SSDs). Because these drives use wear-leveling to manage memory cells, "there might be still data lingering around in the SD card that is inaccessible except if you have lots of resources and you really open this thing up." This nuance is vital for readers using modern laptops and phones, as traditional wiping methods are becoming less reliable.
The only thing that solves all these data address problems is to use full disk encryption. Never ever write data plain text on your hard drive always encrypted because it's really way easier to just throw away the encryption key than to delete all the data.
Encryption as the Ultimate Shield
The core of The Hated One's argument is that encryption renders the debate over wiping moot. If data is encrypted, destroying the key makes the data "unreadable and no one can recover it anymore." The author clarifies a common misunderstanding: enabling full disk encryption does not automatically wipe existing data. "If you set up full disk encryption the hard drive... will just mark the hard drive as... lay a foundation for it... and then only when you write a file to the hard drive, the operating system will encrypt all the chunks."
This distinction is a vital operational detail. Users who simply toggle an encryption setting without wiping the drive first may leave old, unencrypted data exposed until it is overwritten. The Hated One advises that for high-stakes scenarios, one should "fill the whole disc with random data" to mask the fact that wiping occurred. While the US intelligence community once recommended wiping seven times, the author dismisses this as unnecessary for most, stating that "once is enough" for lower threat models and "twice is enough" even for the most paranoid.
Critics might argue that relying solely on encryption assumes the user will never lose the key or that the encryption implementation is flawless. The Hated One addresses this by noting that if an adversary has root access, they can "snatch the data while it was in memory," a vulnerability that no amount of disk encryption can prevent. This admission highlights the limits of defensive security: if an attacker fully controls the device, the game is largely lost.
Bottom Line
The Hated One delivers a compelling, actionable guide that prioritizes encryption over deletion, a shift in mindset that is essential for modern digital hygiene. The strongest part of the argument is the clear explanation of why "deleting" is insufficient and how encryption provides a more robust, manageable solution. The piece's biggest vulnerability is the inherent difficulty of securing the physical device against a determined, local adversary, but the author wisely frames this as a low-probability, high-impact risk for most users. The takeaway is simple: stop worrying about wiping drives and start encrypting everything.