On 2020-06-26 21:00, David Christensen wrote:
On 2020-06-26 18:25, David Wright wrote:
There's still the problem of what one does about sensitive data if
one has been rash enough to write it unencrypted onto an SSD. Would
shred -n 1 be preferable? Not really, because that doesn't hit the
ex-file areas. What then?
The best option is to command the SSD firmware to do a "secure delete".
Some SSD manufacturers provide utilities for doing this. Alternatively,
it can be done from the command line with Linux.
Correction "ATA Secure Erase command":
https://ata.wiki.kernel.org/index.php/ATA_Secure_Erase
David