Is secure deletion on SSDs (flash storage) even possible?
The short answer is: Yes. For protection against data recovery by software (such as Recuva or PhotoRec), SecureDelete is absolutely effective. From version 8.38 onwards , the program even goes a step further and uses low-level hardware commands to directly address the physical characteristics of SSDs.
With a traditional hard disk drive (HDD), data is always overwritten in the same location. With an SSD, the controller prevents this through a process called wear leveling :
* When you overwrite a file, the SSD often writes this data to new memory cells to distribute wear evenly.
* The original data could theoretically remain as "orphaned fragments" in the old cells until the controller deletes them in the background.
2.) The solution: The new 5-step security plan (from version V8.38)
To solve precisely this problem, SecureDelete, starting with version 8.38, uses an optimized workflow that combines hardware and software:
1. Anonymization: The file is first renamed to remove the original filename from the file system.
2. Logical Overwriting: The content is filled with random numbers or zeros. This makes the data unreadable for any recovery software.
3. Hardware TRIM (New): The program now sends the command `FSCTL_FILE_LEVEL_TRIM` . This directly informs the SSD controller that the physical sectors of this file are no longer needed and are immediately released for deletion (garbage collection).
4. Metadata Reset: The timestamps (creation and modification dates) are neutralized.
5. Finalization: The file is permanently deleted.
3.) Why Secure Erase is essential for SSDs:
* Active hardware communication: By integrating TRIM commands, the SSD controller is instructed to perform physical self-cleaning – a feature often lacking in conventional shredders.
* Forensic protection: Even if specialized labs were to directly read the memory chip, the TRIM command ensures that the cells are promptly discharged and erased.
* Hardware protection: One pass is sufficient! Thanks to TRIM technology, multiple overwrites (e.g., 32 times) on SSDs are no longer necessary. This saves time and extends the lifespan of your SSD.
4.) Recommended procedure
1. Single Pass: For SSDs, select "Single Pass." This, combined with our new TRIM feature, is the safest and most hardware-friendly method.
2. Fill Free Space: Occasionally use the "Fill Free Space" function . This forces the controller to also clean up those reserve cells that are not directly accessible via the file system.
3. Full Disk Encryption: For maximum security with extremely sensitive data, we recommend using disk encryption (e.g., BitLocker) in combination with Secure Erase.
> Developer's Conclusion: With version 8.38, Secure Erase closes the gap between software erasure and hardware management. It is the safest and simplest approach for everyday digital use on modern Windows 11 systems.
Detailed questions and answers on the topic "Who benefits most from securely deleting files and data, and when and who should use it?" for Windows 10, 11
You can quite easily add The File Eraser to the Send To context menu of MS Explorer and / or remove This works with BlankAndSecure in Windows 11 and 10
Safeerase and Windows 10 / 11 disabled Windows Defender directory protection, problems occur when using the portable version of the File Eraser Blank-And-Secure
I did not want to include data overwriting up to 35 times in " SafeDelete ", but some users insisted on this feature. Since it was not a big hassle for me,
It is easy to uninstall the File Eraser from Windows 11, 10, 8.1, , or other Windows Operating Systems It is sometimes necessary to "Remove File Eraser"
This website does not store personal data. However, third-party providers are used to display ads, which are managed by Google and comply with the IAB Transparency and Consent Framework (IAB-TCF). The CMP ID is 300 and can be individually customized at the bottom of the page. more Infos & Privacy Policy ....