| ▲ | qmr 4 days ago |
| Call me crazy, (“you’re crazy!”) but I still zero all storage before destruction, sale or repurposing. Belt and suspenders. |
|
| ▲ | johncolanduoni 4 days ago | parent | next [-] |
| For SSDs that doesn’t actually guarantee deletion - there could still be some over-provisioned erase blocks that have the old data due to wear leveling. |
| |
| ▲ | jshier 4 days ago | parent [-] | | Apple's SSDs are all encrypted at the controller nowadays. No need to rewrite, just reformat and it cycles the key, leaving any recoverable data irrevocably encrypted (until we break modern encryption). | | |
| ▲ | burnerthrow008 4 days ago | parent [-] | | I thought all SSDs did that for wear-leveling purposes. | | |
| ▲ | johncolanduoni 3 days ago | parent [-] | | They do, but consumer ones usually don't implement the additional API (TCG Opal) that lets you lock/unlock the hardware encryption key. Without that capability you can't use it to implement full-disk encryption. They do usually implement the NVMe secure erase feature though, which will rotate it. |
|
|
|
|
| ▲ | wpm 4 days ago | parent | prev [-] |
| I mean, if you regularly deal with data worth the effort necessary to recover, that isn’t crazy at all |
| |
| ▲ | adastra22 a day ago | parent [-] | | On a modern SSD it is cargo culting though. Every write is assigned to a new sector. Makes sense when wiping the whole drive though. |
|