Is there a way to securely erase an SSD on my MacBook Air?

If you have a USB Flash Drive of 8 GB of size, you can make a Lion Installer and use it to securely erase the Drive.

http://macintoshhowto.com/osx/how-to-make-an-os-x-lion-usb-thumb-drive.html

You can also make a USB Bootable Recovery Disk as explained here by Apple:

http://support.apple.com/kb/DL1433

Once you have done either you can hold down the OPTION key while restarting your computer and booting from it.

When it loads up, it will give you a few different options, you will need to use the Disk Utility part and highlight your HD and choose the Erase Tab. Under the erase settings will be a security option when you can write the disk to 0 once or even multiple times.

There is a guide on it here:

https://discussions.apple.com/docs/DOC-3251

See the part where it says

How to Zero erase and install OS X

I hope that helps you out.

Updated

The guy at the bottom of this post:

http://forums.macrumors.com/showthread.php?t=1267158

points out a work around to securely erase the SSD drive in the MacBook Air through encryption.

This is what he says:

cmace127

I found a workaround. Restart the computer and hold option to enter the setup screen. Go into disk utility and select the drive. Erase the drive using "Mac OS Extended (Case-sensitive, Journaled, Encrypted). Make a password for the encryption, it doesn't matter what it is because you won't need it. Hit "Erase". Now select the volume and the "Erase Free Space" and "Security Options" buttons should no longer be grayed out. Click and select your level of security and off you go. I presume "Erase Free Space" and "Security Options" should do the same thing because you just erased the drive so all space is considered free. This worked for me so let me know if it helps.

Let me know if that's works, this should securely erase the drive since it will then be encrypted.

Also, in the future with Lion be sure to use FileVault 2 so that you don't have to worry about this again.


It looks like securely erasing an SSD is a different chore than erasing a traditional hard drive. Unconfirmed, but it looks like Apple is actively disabling the legacy erase techniques for SSD drives, since they don't work as noted in Ask Ars: How can I securely erase the data from my SSD drive?

As pointed out in a recent research article, there isn't a standard method for securely deleting data from a solid state drive. Hard disk drives have had this problem solved for ages, and can execute a secure delete by filling the space occupied by an incriminating file with zeroes or multiple writes of different characters...

The overwriting procedure that works so well for HDDs doesn't work as well for SSDs for a couple of reasons. One is that many SSDs have extra storage space that's not accessible by users. This is called over-provisioning, and some deletion tools won't give you access to this area (if you can go through the BIOS and uninstall your drive, you can get full access). While the research paper noted above that overwriting did obscure all of the data in some of the SSDs they tested, some still had old readable data on them after twenty overwrites. This can happen because of firmware bugs, and unless you're able to physically confirm that this procedure works on your SSD of choice, it's not reliable enough for a real secure erase.

...

Likewise, it is almost impossible to securely delete an individual file on an SSD, because the way that SSDs write and delete files is scattered, and a user has no control over what an SSD is doing where. If that's the kind of security you're looking for, your best bet is encryption, which we will cover in a little bit.

...

Many SSDs today also come preinstalled with secure wiping utilities that are meant to actually eradicate data from cells. But of the twelve drives tested by those researchers, only four of twelve erased their data reliably, and one that claimed to be securely erasing everything was just doing the old "forget where everything is and leave it there for now" trick, and all the data was still retrievable. Some drives are known to have better erase tools than others—for instance, drives with Indilinx controllers have a "Sanitary Erase" that deletes all data and restores drives to their out-of-the box condition.

Your best bet going forward is to use encryption and then throw away the encryption key to "securely erase" it. So going forward, if you are concerned with security and you're using SSD, you may want to enable FileVault2 immediately before you start putting data on the SSD. Unfortunately, for data that's already on the drive, it may be extremely difficult to securely delete it, depending on the SSD used in the MacBook Air. There maybe be a reset tool for the SSD from the manufacturer, but seeing how it's an Apple OEM specific part from a 3rd party vendor, it's probably going to be unlikely to exist.

If security is an issue, you may want to hang onto the SSD or destroy the SSD to be the most secure.

If your MacBook Air supports Lion Recovery Mode, and you're using full disk encryption such as FileVault2, you will not need anything else to do it other than following the steps below.

  1. Boot your MacBook Air into Recovery Mode by holding down Command+R while booting it.

  2. Open the Disk Utility Program, select the drive you want to securely erase.

  3. Select the "Erase" tab.

  4. Click "Security Options..."

  5. Drag the slider to the Most Secure setting or somewhere in between and then select "OK".

  6. Then click "Erase..." and follow the remaining on-screen prompts.

Note: For more information on how secure the Disk Utilities Secure Erase feature is, see About Disk Utility's erase free space feature


You can do this by booting into the Recovery partition, launch Terminal from the Utilities menu and use the diskutil command.

Enter diskutil secureErase or man diskutil for some explanation how erasing with diskutil works. To find the diskidentifier of the volume you want to erase (for instance disk0s2), enter diskutil list.

The following example will erase a volume with US DoE 3-pass secure erase:

diskutil secureErase 4 disk0s2