![ata secure erase ssd ata secure erase ssd](https://techgage.com/wp-content/uploads/2013/07/Parted-Magic-Erase-SSD.png)
![ata secure erase ssd ata secure erase ssd](https://www.gigabyte.com/FileUpload/Global/KeyFeature/997/images/toolbox_GBT_M2-3.png)
Essentially, everything that is written to the SSD is first encrypted with a master key. Secure erase works through encryption, usually AES. No on both counts, assuming the implementation is within spec. It would be nice to have more recent data, because SSD designs have changed a good deal since 2011. The wide variance among the drives leads us to conclude that each implementation of the security commands must be individually tested before it can be trusted Was recently reset, otherwise the command would onlyĮrase the first LBA. UNIT command from working unless the drive firmware More drives suffered a bug that prevented the ERASE In fact, the filesystem was still mountable. That sanitization was successful, but all the data remained The rest didn't, to varying degrees:ĭrive B’s behavior is the most disturbing: it reported So in 2010/2011, out of 12 commercially available SSDs models 8 advertised that they support ATA Secure Erase, and either 4 or 5 models performed a secure erase. Of the remaining seven, only four executed the “ERASE UNIT” command reliably. Verify if the sanitization was successful. One of these encrypts data, so we could not Of the 12 drives we tested, Eight of theĭrives reported that they supported the ATA SECURITYįeature set. A paper from 2011 by four people from the University of California, San Diego writes in section "3.2.1 Built-in sanitize commands":