Secure Delete on SSD

Short answer: overwriting sectors from outside the SSD, (for example, by using a "traditional" secure delete utility) does not guarantee that the underlying data will be deleted.

For more in-depth information, you might want to look at this presentation from some folks at UCSD who have been running experiments on this subject. See: http://cseweb.ucsd.edu/users/m3wei/assets/pdf/FMS-2010-Secure-Erase.pdf

Their data seems to say that:

  • Many current implementations of the "secure erase" command (a command to securely delete all of the data on an ATA device) do not work.
  • Techniques that try to overwrite just one file, or even all of the free space in an SSD, do not reliably destroy data.

Personally, I don't think you'll be able to securely delete an individual file on an SSD without some sort of firmware support inside the SSD that can track and overwrite all of the internal pages that have residual copies of the data.


Secure erase is built into the ATA spec, so you should be able to issue a secure erase command to your SSD device and let it take care of itself - that way you don't have to worry about whether or not the SSD is re-mapping sectors.


The behavior of SSD-unaware secure-delete utilities is not predictable. Whether or not the chipset on the drive will overwrite a specific flash cell, flag it for later TRIMing and leave it in place until later, or simply flag it 'dirty' and overwrite another clean sector entirely depends completely on the chipset in question. It varies from manufacturer to manufacturer and even within product lines based on the firmware being used.

I would not trust these utilities on SSDs, at least until they become SSD-aware.