← Back to Library

Digital security part 2 - how to protect yourself on the internet

Most digital security advice focuses on passwords and two-factor authentication, but The Hated One argues that the physical layer of your device is where the real vulnerabilities lie. This piece cuts through the noise of software patches to reveal a startling reality: deleting a file is often an illusion, and the only true protection against data recovery is full disk encryption. For busy professionals managing sensitive information, the distinction between "erasing" and "encrypting" isn't just technical—it's the difference between being compromised and being secure.

The Physical Attack Surface

The Hated One begins with a bottom-up approach, starting with peripheral devices like USB sticks and monitors. The author warns that "all these connections have some kind of API and some kind of protocol they speak and lots of these connections can be abused to hack you." This reframing is crucial; it shifts the threat model from a distant hacker to a local actor who might hand you a seemingly innocent drive. The advice is stark: avoid USB sticks entirely if possible. Instead, "use SD cards for data transfer between two" devices because they possess the "lowest attack surface and are really only about data and not about all the other funky stuff."

Digital security part 2 - how to protect yourself on the internet

The commentary here is effective because it simplifies complex hardware protocols into a practical rule of thumb. By suggesting that users "never hook up something that's not yours to your laptop," The Hated One addresses the most common vector for physical attacks without requiring the reader to become a hardware engineer. However, critics might note that for high-level threats, even SD cards can be compromised if the device itself is physically tampered with, a scenario the author acknowledges by suggesting one might need to "glue all your parts" in extreme threat models.

The Illusion of Deletion

Perhaps the most critical insight in the piece concerns how operating systems handle deleted files. The Hated One explains that when you delete a file, the system "just tells the file system that the space that was used by the file is now available again." This means that without specific intervention, data remains recoverable. The author illustrates this with a cautionary tale of a colleague who "deleted the photos, took out the SD card, put a new one in... and used a tool to recover it again. It was never gone."

This section dismantles the common misconception that hitting "delete" is sufficient for security. The Hated One notes that while tools exist to overwrite free space, "a much cleaner method is to override the whole hard drive with random data or zeros." Yet, the author pivots quickly to the limitations of this approach on modern solid-state drives (SSDs). Because these drives use wear-leveling to manage memory cells, "there might be still data lingering around in the SD card that is inaccessible except if you have lots of resources and you really open this thing up." This nuance is vital for readers using modern laptops and phones, as traditional wiping methods are becoming less reliable.

The only thing that solves all these data address problems is to use full disk encryption. Never ever write data plain text on your hard drive always encrypted because it's really way easier to just throw away the encryption key than to delete all the data.

Encryption as the Ultimate Shield

The core of The Hated One's argument is that encryption renders the debate over wiping moot. If data is encrypted, destroying the key makes the data "unreadable and no one can recover it anymore." The author clarifies a common misunderstanding: enabling full disk encryption does not automatically wipe existing data. "If you set up full disk encryption the hard drive... will just mark the hard drive as... lay a foundation for it... and then only when you write a file to the hard drive, the operating system will encrypt all the chunks."

This distinction is a vital operational detail. Users who simply toggle an encryption setting without wiping the drive first may leave old, unencrypted data exposed until it is overwritten. The Hated One advises that for high-stakes scenarios, one should "fill the whole disc with random data" to mask the fact that wiping occurred. While the US intelligence community once recommended wiping seven times, the author dismisses this as unnecessary for most, stating that "once is enough" for lower threat models and "twice is enough" even for the most paranoid.

Critics might argue that relying solely on encryption assumes the user will never lose the key or that the encryption implementation is flawless. The Hated One addresses this by noting that if an adversary has root access, they can "snatch the data while it was in memory," a vulnerability that no amount of disk encryption can prevent. This admission highlights the limits of defensive security: if an attacker fully controls the device, the game is largely lost.

Bottom Line

The Hated One delivers a compelling, actionable guide that prioritizes encryption over deletion, a shift in mindset that is essential for modern digital hygiene. The strongest part of the argument is the clear explanation of why "deleting" is insufficient and how encryption provides a more robust, manageable solution. The piece's biggest vulnerability is the inherent difficulty of securing the physical device against a determined, local adversary, but the author wisely frames this as a low-probability, high-impact risk for most users. The takeaway is simple: stop worrying about wiping drives and start encrypting everything.

Sources

Digital security part 2 - how to protect yourself on the internet

by The Hated One · The Hated One · Watch video

Okay. So, I guess we'll continue to the actual topics that we want to cover today. Okay. in that sense, I'd like to take like a bottom up approach.

Mhm. Start like with physical security and then go up through all like kind of the layers of the technology. okay. So first topic is peripheral devices.

So these are like USB sticks, everything you plug into your PC, your laptop, that's everything that's not kind of your laptop itself. So also your monitor, all that stuff. all these connections have some kind of API and some kind of protocol they speak and lots of these connections can be abused to hack you. especially USB is a thing here.

also FireWire and the successor of FireWire I think it's called Lightning, isn't it? Is that a thing? you would have to explain what fire wire and lightning is. Okay.

So Firewire is something similar to USB but I think it was invented by Apple. Mhm. And then we have Oh, Thunderbolt. That's it.

Thunderbolt is also done, I think, by Apple. Yeah. And maybe others. It's just similar to USB.

It's like kind of a universal thing you hook things up to. And you want to be careful with all that stuff. I think for threat model number one which is a low res active actor you will be most concerned about USB sticks and infected USB sticks because they're quite easy to make and someone can just like hand you a document on a USB stick and he might be able to he might have found some kind of exploit kit. on the internet and we'll try to hack it with that.

So one general advice is to use SD cards for data transfer between two. So, if you can't use the internet, which is always the best thing to do because you don't attach anything to your to your device, then use SD cards because SD cards have the lowest attack surface and are really only about data and not about all the other funky stuff. So, these are the cards you put in your camera. You put them in your Android smartphone to extend your storage.

That's the small card I'm I'm talking about. So that's kind of like a basic protection on a physical layer where especially like the higher you go up in the threat models ...