How To Securely Erase Your SSD Without Destroying It

How To Securely Erase Your SSD Without Destroying It

Ads by Google

Solid state drives are frequently referred to as the best upgrade you can make to your PC. Trading off disk space for speed is an increasingly popular option, but just like USB sticks and SD memory cards, SSDs can only be written to a limited number of times.

This presents some interesting problems, particularly when it comes to erasing data (and doing so securely). Tools like Darik’s Boot and Nuke are not only ineffective, their write-intensive nature can vastly reduce performance and shorten SSD drive life.

Don’t get it wrong, securely erase your SSD the right way (if you even need to at all).

Only Do This If You Have To

Generally speaking, you should never have to perform any maintenance on your solid state drive. Such storage media has been designed with self-sufficiency in mind, using a series of algorithms and failsafes put in place to both maximise drive life and ensure data is properly discarded. The first protection comes in the form of wear levelling, designed to evenly distribute stored data between SSD blocks to ensure even wear.

SSD HDD

As a reminder, traditional hard drives store files in physical locations on a magnetic platter, which is then indexed in the file system and accessed using a mechanical arm – a very linear way of doing things. While SSDs also use file systems to communicate data storage locations to the host system, they independently re-shuffle data for wear levelling. Those changes are recorded on a separate map. In other words, SSDs do not use any physically indexable locations, and software cannot specifically target sectors on the disk. Basically, your computer has no way of telling “where” that information was just copied to.

To comply with wear levelling, the SSD must constantly move data around the drive to ensure all blocks are worn at an equal rate. Using a secure “file shredder” to overwrite a specific file or folder many numbers of times is not going to work, because the drive writes all new incoming data to various different blocks, depending on its needs. Only the drive knows where this data is written, so secure deletion tools actually harm SSDs by performing an unnecessary number of additional writes.

Ads by Google

You’re probably wondering how data is ever deleted from an SSD, particularly if data is constantly moved. Thankfully the TRIM command is designed to solve such a conundrum by marking blocks of data the drive no longer considers in use to be wiped internally. Simply put, your discarded data will eventually vanish into thin nothing and be irretrievable, but only your drive really knows when that will be.

SSD Rocks

For a much more detailed look at TRIM and garbage collection you should read Matt Smith’s article exploring the usefulness of TRIM on modern SSDs.

It’s also worth remembering that these drives often use a small amount of unallocated space as a buffer for moving data around, which you’re very unlikely to be able to access. This would technically mean data remains on a drive even after it has been securely erased.

Securely Erasing An SSD

Fortunately it is possible to erase most SSDs, though this is closer to a “reset” than a wipe. The “ATA Secure Erase” command instructs the drive to flush all stored electrons, forcing the drive to “forget” all stored data. This command essentially resets all available blocks to the “erase” state, which is what TRIM uses for garbage collection purposes.

ATA Secure Erase

This command does not actually write anything to the drive. Instead it causes the SSD to apply a voltage spike to all available NAND in unison, resetting every available block of space in one operation. By doing this, you will use one whole program-erase cycle for your drive – a small dent in drive life, but still unnecessary unless you’re troubleshooting.

Secure Erase Using Manufacturer Software

Most manufacturers supply software for their solid state drives in order to update firmware and perform tasks like secure erase. While it’s impossible for us to check every manufacturer, we’ve made a list of available downloads for major brands below.

While this is the first place we’d recommend you go, this won’t always work as you’ll often need to run the software in Windows (and you probably installed Windows to your SSD). You might also find that your manufacturer hasn’t implemented the “ATA Secure Erase” command into their software, yet. In this case, try the next step.

Download: Intel Solid State Toolbox / OCZ Toolbox / Corsair SSD Toolbox / Samsung Magician / SanDisk SSD Toolkit

Secure Erase Using Parted Magic

We’ve covered Parted Magic in the past – it’s a veritable box of tricks. Before it was swallowed up by Symantec, Partition Magic made all kinds of functions that previously required long command lines easy. Parted Magic does the same, except it’s a whole Linux distribution and it now costs $4.99.

Parted Magic

The project was free in the past, but users selling pre-loaded USB sticks on eBay and dwindling donations prompted the project’s leader to place the files behind a paywall. Still, $5 to restore your SSD to “factory fresh” levels of performance isn’t a huge ask:

  1. Download Parted Magic and create a mountable USB drive using Unetbootin.
  2. Boot the drive and choose option 1, Default Settings.
  3. Once booted head to Start (bottom left) > System Tools > Erase Disk.
  4. Choose the “Internal:Secure Erase command writes zeroes to entire data area” option, then confirm the drive you want to erase on the next screen.
  5. If you are told your drive is “frozen”, you will need to click the Sleep button and repeat this process until you can proceed further. If your drive indicates a password requirement, leave the password as “NULL”.
  6. Confirm that you have read and understand the risks, hit Yes to erase your drive.

The erase process takes a matter of seconds, then you’re done.

A Word For Mac Users

According to forum chatter, Parted Magic works just fine on a Mac – provided you can get it to boot in the first place. While Macs can boot operating systems from USB drive, it’s notoriously difficult to get right. If your Mac SSD has a problem and it’s under warranty, it’s much easier to let Apple deal with it – even if it’s just a software problem.

You can check out our own guide to booting a USB stick on a Mac, but as you can see from the comments your mileage may vary. If you’re only after a fresh start, you can reinstall OS X like you would on any Mac, just don’t choose to securely erase by “shredding” when formatting.

Image credits: Laineema Via Flickr, HDD vs. SSD Test (Simon Wüllhorst), Intel Branding (Brandon Daniel)

Join live MakeUseOf Groups on Grouvi App Join live Groups on Grouvi
Mac Troubleshooting
Mac Troubleshooting
5 Members
Apple Hardware Discussion
Apple Hardware Discussion
7 Members
Apple News & Rumors
Apple News & Rumors
7 Members
Apple TV Tips & Hacks
Apple TV Tips & Hacks
5 Members
Mac Switchers
Mac Switchers
6 Members
Mac OS X & Software
Mac OS X & Software
4 Members
Mac Gamers
Mac Gamers
5 Members
Ads by Google
Comments (18)
  • Edwin

    All,
    I am new to SSD and how they work. I recently did an Active Book Disk image of Win 7 Pro 64bit restore to a new HP 840G1 EliteBook and it appears to have killed the system. Now I get a variety of errors at boot. Everything from missing files, corrupted files, bad patch file, etc. There doesn’t seem to be a specific error. I wiped the drive, with Active Boot Disk and did a plan Win7 install and I get the same errors. I don’t even know if this is a SSD problem but I have done this procedure dozens of times before on non-SSD systems and all worked as designed. Any suggestion would be appreciated.

  • LG

    Is secure erase erasing the data to forensic level?

  • RedHat

    I don’t understand why you can’t just a do a low level format? Either way the entire drive gets flagged and overwritten once, but a low level format can easily be done from Windows without purchasing any other software.

    • BlueHat

      Wouldn’t work properly because the OS cannot control where it writes to on the drive. The SSD’s controller is responsible for that, and due to wear leveling algorithms, wouldn’t get you the intended results. With an SSD, all you need is to perform a “secure erase.”

  • Godel

    Makers of erasure programs such as CCleaner should add a simple “delete” option to their programs for SSD users, as opposed to the usual overwrite methods, and allow Trim to get rid of every-day garbage.

    The cleaner programs would still have a function in that they can locate the tmp, log, etc files scattered all over the place, they’d just rely on the SSD’s Trim to do the actual deletion.

    If you REALLY need to keep your disk secure, the only way is full disk encryption from the beginning, using something like Truecrypt or Bitlocker.

  • James

    It amazes me in this day and age that all OSes don’t have and free option built in to store users data encrypted and/or erase it securely as part of an OS “reset”.

Load 10 more
Affiliate Disclamer

This review may contain affiliate links, which pays us a small compensation if you do decide to make a purchase based on our recommendation. Our judgement is in no way biased, and our recommendations are always based on the merits of the items.

For more details, please read our disclosure.
Affiliate Disclamer

This review may contain affiliate links, which pays us a small compensation if you do decide to make a purchase based on our recommendation. Our judgement is in no way biased, and our recommendations are always based on the merits of the items.

For more details, please read our disclosure.