Safely Dispose of Data on Solid-State Drives

When it comes to data security, simple deletion is not enough, especially when dealing with Solid-state drives (SSDs). In this article, we dive into the critical issue of securely destroying information on SSDs. Learn why traditional methods fall short and discover effective strategies for ensuring your data remains safe and confidential. Don’t compromise your privacy – read now to learn how to securely destroy data on SSDs!

Safely Dispose of Data on Solid-State Drives

SSD Data Recovery Issues

The very existence of garbage collection and the TRIM command in particular brings havoc to both the recovery and destruction of information stored on TRIM-enabled SSD drives. Indeed, simply deleting a file does not immediately result in the wiping of its content. However, via the TRIM command, the operating system will instruct the controller of the SSD drive that disk space that was previously occupied by the deleted file is now available. Background garbage collection will then pick up newly released disk space and physically erase those data blocks. There are good technical reasons to do so described in one of the previously published articles; today we’re just discussing the effect of this behavior on data recovery and destruction.

So, garbage collection will, at some point, erase data blocks holding the content of a deleted file. But can it be recovered in the meanwhile? The answer is no. SSD controller knows that a particular block is empty by reading a corresponding flag, so it will return all zeroes if an operating system or data recovery tool attempts to read that block. There’s no easy way around it except using a special forensic device.

Go to view
Recovering Data from SSD After File Deletion or Disk Formatting ⚕️📁💥

Recovering Data from SSD After File Deletion or Disk Formatting ⚕️📁💥

SSD Secure Data Destruction Issues

The very existence of that special forensic device makes securely destroying information stored on SSD drives a vital issue. The way SSD drives are designed makes traditional file shredding techniques ineffective, as new data will almost inevitable be written into different flash cells due to the implementation of data leveling, a technology designed to extend the life of an SSD drive by evenly distributing writes among different cells.

All modern manufacturers of SSD drives (Corsair, Toshiba, etc) offer more memory than it says on the box. A 120 GB SSD drive can easily come with 130 or even 140 GB of actual flash memory in order to further improve life expectance and performance of the drive. This in turn means that running a tool that writes random data to all accessible sectors is not nearly enough to securely destroy information as remnants of user data may remain in those extra blocks.

SSD Secure Erase

Go to view
How to Delete Files Without the Opportunity to Restore Them – Software Encryption 📁🚫⚕️

How to Delete Files Without the Opportunity to Restore Them – Software Encryption 📁🚫⚕️

For securely wiping the entire content of an SSD, one must invoke a special Secure Erase command in the disk controller. The result of Secure Erase will be a fresh SSD drive that’s as empty as one that just came from the factory. Secure Erase wipes the entire content of the SSD drive, resetting all flash cells including those that contain hidden and reserved blocks. No remnants of user data will be left after initializing the drive with Secure Erase.

There’s no easy or obvious way to do it; you must use a special tool (such as PartedMagic) and possible boot your PC into a special mode in order to be able to proceed. The situation gets even more complicated as not all SSD drives support Secure Erase, and of those that do not every model supports it in a proper way. There’s simply too much uncertainty at the moment when it comes to SSD drives, but if you’re not working for the military or an unnamed government agency, you’ll be well-served by Secure Erase.

Oleg Afonin

Author: , Technical Writer

Oleg Afonin is an expert in mobile forensics, data recovery and computer systems. He often attends large data security conferences, and writes several blogs for such resources as, Elcomsoft and Habr. In addition to his online activities, Oleg’s articles are also published in professional magazines. Also, Oleg Afonin is the co-author of a well-known book, Mobile Forensics - Advanced Investigative Strategies.

Vladimir Artiukh

Editor: , Technical Writer

Vladimir Artiukh is a technical writer for Hetman Software, as well as the voice and face of their English-speaking YouTube channel, Hetman Software: Data Recovery for Windows. He handles tutorials, how-tos, and detailed reviews on how the company’s tools work with all kinds of data storage devices.

Recommended For You

Hello! This is AI-based Hetman Software virtual assistant, and it will answer any of your questions right away.
Start Chat