easteregg
Dark background with blue accents with light reflectionsDark background with blue accents with light reflectionsDark background with blue accents with light reflections

Securely Erase an SSD
Step-by-Step Guide to Safe Data Wiping (2025 Update)

Securely Erase an SSD - Step-by-Step Guide to Safe Data Wiping (2025 Update)Securely Erase an SSD - Step-by-Step Guide to Safe Data Wiping (2025 Update)

Securely wiping an SSD is a very important step in protecting your information from falling into the wrong hands-or, actually, into any other people's hands at all. If you've ever deleted a file from your SSD, you need to know that your files were never actually erased at all; they just became hidden.

Quick Answer: Best Way to Securely Wipe an SSD

  1. BIOS Secure Erase - Most effective for entire drive wipes
  2. Manufacturer Tools - Samsung Magician, Crucial Storage Executive, etc.
  3. File Shredding Software - Best for selective file deletion (recommended: Offigneum)

Most people don't realize that when you hit delete or even format your solid-state drive, your personal data, all of the information, all the files, and even folder names will often remain recoverable. This becomes particularly concerning if you're planning to sell your computer, hand down an old laptop, or dispose of a drive containing sensitive information-or just generally trying to delete something that definitely should not be recoverable.

And this is only a glimpse of why you might want to securely erase your SSD-the disk completely, or maybe only some files on it. In this guide, we'll walk you through everything you need to know about securely wiping your SSD and give you step-by-step instructions for multiple secure wiping methods that you can use. By the end, you'll have all the knowledge needed to ensure your private data stays private-just how you expect it to be.

Why your deleted files aren't actually gone

First, let's talk about some technical details on why files that you delete from your SSD are never actually erased. Of course, you can skip this part if you want to; however, it is always best to first form a good understanding of the issue and only then resolve it. But to keep it short, in case you don't want to read all those complex technical things, let's explain what happens: To keep it simple, when you delete files from an SSD, your computer only removes the "signposts" pointing to your data, not the actual data itself. SSDs also use special technology that spreads your information across different areas of the drive to make it last longer, which means your deleted files often remain untouched in their original locations rather than being overwritten. To make it even worse, SSDs can often contain hidden storage areas where copies of your data might exist, making it possible for recovery software to find and restore files you thought were gone forever.

Now, to explain it a bit more: When you delete a file from your SSD, the operating system doesn't immediately erase the data. Instead, it simply removes the reference to that file in the file system table-essentially, the drive marks the space occupied by that file as "available for new data." However, the original information remains on the drive until it's overwritten by new files.

Another analogy would be to think of it like erasing a building from Maps without demolishing the actual building. The building (your data) is still there-and the building will not magically disappear only because you removed it from the map or removed its address. Maybe it will become harder to find without the map, but it is still very easily doable. This is exactly what happens when you "delete" a file.

This is known as "data persistence," and it becomes particularly problematic with SSDs because of how they store and manage information. Unlike traditional hard disk drives (HDDs) that use magnetic platters, SSDs utilize flash memory cells organized in complex patterns with sophisticated controllers managing where and how data is written.

Technical challenges of SSD data removal

Securely wiping an SSD presents unique challenges that don't exist with traditional HDDs. To explain it quickly-as of course you don't want to spend a day learning about all those wonderful technologies such as "Wear-Leveling Algorithms," "Over-Provisioning," or even more scary words-let's keep it simple.

First, when you delete a file on a traditional hard drive, the data is also not actually removed-which is the same for SSDs, USB flash drives, and any other storage devices. However, with HDDs, you could overwrite this data multiple times with random patterns to make it unrecoverable, and it will erase the data.

But SSDs work differently, and sadly, they are much more complicated and harder to wipe. Thanks to those "wear-leveling algorithms" mentioned earlier, when you think you're overwriting sensitive information, the SSD might actually store the new data elsewhere, leaving your original sensitive data intact but invisible to the operating system. Think of it as erasing some text on a sheet of paper-but the catch is that the text on this very sheet of paper can jump around physically and be at any position on your paper. You think that it is on top of the paper, but it might actually be on the other side of the sheet, in the bottom right corner.

This is even further complicated by the "over-provisioning" feature-your SSD actually has more storage space than advertised, and some of your data fragments might be hiding in this extra space, completely inaccessible through normal means but potentially recoverable with the right forensic tools. While your SSD might have "400GB" written on it, physically, it can store 512GB of information-and just imagine what can fit into those 120GB that are "over-provisioned."

You also might have heard of some magic "TRIM" command being commonly referenced when talking about secure data erasure. While the TRIM command was designed to help SSDs manage deleted data, it is not a reliable security measure. TRIM is more about maintaining performance than securing your data-you could compare it to a housekeeper that walks around the house and blows off some dust from furniture to keep it nice and tidy-not throwing away things from this very furniture into fire for it to burn.

Finally: how to securely wipe your SSD

Now that we understand why special measures are necessary for SSDs, let's take a look at the most effective methods for securely wiping solid-state drives.

Method 1: BIOS/UEFI secure erase feature

Some modern motherboards include a Secure Erase feature directly in the BIOS or UEFI firmware. This method communicates directly with your SSD's controller to reset all memory cells to their factory state, making previous data unrecoverable.

Here's how to use this feature:

  1. Back up any important data you want to keep. This process will permanently erase everything on the entire drive.
  2. Restart your computer and enter the BIOS/UEFI setup by pressing the appropriate key during startup. Common keys worth trying out are F2, Delete, F10, F12, or Esc, depending on your motherboard's manufacturer.
  3. Navigate through the BIOS/UEFI menu to locate the Secure Erase feature. It's typically found under sections labeled "Advanced," "Storage," or "Security."
  4. Select your SSD from the list of available drives. Be cautious to select the correct drive if you have multiple storage devices.
  5. Initiate the Secure Erase process and confirm your decision when prompted.
  6. Wait for the process to complete. This may take several hours depending on your drive's capacity and the specific implementation of the Secure Erase feature of your SSD's manufacturer.
  7. Once finished, restart your computer. Your SSD will now be in a clean state, similar to when it was first manufactured.

While this method is highly effective, it does have some limitations. First of all, not all motherboards support this feature, and you also cannot use Secure Erase on your system drive (the one containing your operating system) while Windows is running. You also need to be somewhat of a techie to navigate around more complicated BIOS/UEFI interfaces, which is definitely not the best solution for most people.

Method 2: Windows diskpart utility

Windows includes a command-line utility called Diskpart that can help wipe your SSD. While not as thorough as a proper Secure Erase, it's still somewhat effective for many situations and doesn't require special hardware support. The steps to use it are not the easiest, and you might need to be more comfortable with TUI (text-only user interfaces), meaning you can't use your mouse to click on nice buttons-instead, you have to type in commands in your computer's command line/terminal.

Follow these steps to use Diskpart:

  1. Connect the SSD you want to wipe. If it's an internal drive, ensure it's not your system drive (the one Windows is running from).
  2. Press the Windows key + X and select "Command Prompt (Admin)" or "Windows PowerShell (Admin)" or "Terminal (Admin)" to open an elevated command prompt-its name can be different for you based on your Windows version, so look for all of them and find the option you have available.
  3. Type in diskpart and press Enter to launch the Diskpart utility.
  4. Type list disk and press Enter to display all connected storage devices.
  5. Find your SSD in the list. It will be shown as "Disk X" where X is a number. You can check if this is the right drive by looking at its size and label.
  6. Type select disk X (replace X with your SSD's number) and press Enter.
  7. Double-check that you've selected the correct drive by examining the disk information once again. You can type detail disk to see more information about the selected drive.
  8. Once you're certain you have the right drive, type clean and press Enter.
  9. The process will begin and may take from several minutes to several hours depending on your drive's size. The command prompt won't show a progress bar, so you can't know when it will be done or track the progress, but you'll know it's finished when the command prompt returns and is ready for new input.
  10. When complete, type exit to close Diskpart, or simply close the Command Prompt window.

After using Diskpart's "clean" command, your drive will need to be reinitialized before you can use it again. To do this, open Disk Management (right-click the Start button and select "Disk Management"), locate your wiped SSD (which will show as "Unallocated Space"), right-click it, and select "Initialize Disk" or "Format" (depending on your Windows version).

While Diskpart is convenient, it may not fully access all areas of your SSD, and most importantly, it was not designed as a secure erasure method-its primary function is not to safely wipe, but to format the drive, which does not guarantee data destruction, meaning it does not provide a proper level of security.

Method 3: manufacturer-specific utilities

Some SSD manufacturers can provide specialized software tools designed specifically for their drives. These utilities offer direct access to the drive's firmware and can sometimes perform erasure operations.

Samsung SSDs: Samsung Magician

Samsung's Magician software includes a secure erase feature specifically designed for their SSDs:

  1. Download Samsung Magician from Samsung's official website.
  2. Install and launch the software.
  3. Connect your Samsung SSD. Note that you cannot securely erase the drive containing your operating system while it's running.
  4. In Samsung Magician, navigate to the "Drive Management" tab and select your drive.
  5. Look for the "Secure Erase" option and follow the on-screen instructions.
  6. The software may require you to create a bootable USB drive to complete the process, especially if you're erasing your system drive.

Crucial SSDs: Crucial Storage Executive

Crucial provides a similar utility for their SSDs:

  1. Download Crucial Storage Executive from Crucial's website.
  2. Install and run the software.
  3. Select your Crucial SSD from the list of detected drives.
  4. Look for the "Sanitize Drive" option in the features menu.
  5. Follow the prompts to complete the secure erase process.

Western Digital (WD) SSDs: WD Dashboard

Western Digital's Dashboard tool offers secure erasure for their SSDs:

  1. Download WD Dashboard from Western Digital's support site.
  2. Install and launch the program.
  3. Select your Western Digital SSD from the dashboard.
  4. Look for "Sanitize Drive" or "Secure Erase" in the tools or settings menu.
  5. Follow the on-screen instructions to complete the process.

Method 4: individual file shredding with Offigneum

While the methods above are excellent for wiping entire drives, what if you only need to permanently delete specific files or folders while keeping your operating system and other data intact? Completely wiping an SSD drive wears it out significantly and is also a long process. This is why you need specialized file shredding software like Offigneum to securely erase files without compromising on long wait times and hardware wear.

Offigneum stands out as a premier solution for securely deleting individual files and folders from SSDs, as well as providing features to securely wipe your SSD drive. Unlike basic deletion tools, Offigneum was specifically designed with modern SSD architecture in mind, and it offers amazing support for all storage devices, from SSDs to HDDs, USB flash drives, and SD cards, as well as providing highly secure deletion.

Why Offigneum excels at SSD file shredding

Offigneum offers several advantages that make it particularly effective for SSD secure deletion, making it the world's most powerful file shredding software.

  1. SSD-Optimized Algorithms: Offigneum features specialized wiping algorithms (WiperTurbo, WiperPrime, and WiperDeep) that are specifically engineered to work with the unique characteristics of solid-state storage, preserving them, carefully erasing data, while not wearing them out.
  2. Comprehensive Coverage: The software accounts for the specific nuances of SSDs by implementing advanced techniques that ensure data is truly unrecoverable.
  3. Versatile Shredding Options: With 51 different shredding algorithms available, including military-grade methods and algorithms used by governments worldwide, allowing you to select from the highest levels of security in the world.
  4. User-Friendly Interface: Despite its powerful capabilities, Offigneum features an intuitive interface, with drag-and-drop functionality, all in an elegant and beautiful design, that makes secure deletion accessible to users of all technical skill levels.

Using Offigneum to shred files securely

Here's how to use Offigneum to permanently delete sensitive files from your SSD:

  1. Launch Offigneum and drag-and-drop files/folders you wish to erase onto Offigneum's window.
  2. Choose your preferred shredding algorithm from the available options. Offigneum's proprietary algorithm WiperPrime provides a superior level of security while maintaining effective speed, but you can also select from other 51 algorithms including military and government standards.
  3. Click the "Shred" button to begin the secure deletion process.
  4. Once complete, Offigneum will display a confirmation indicating that the files have been securely deleted and are now unrecoverable.

Using Offigneum to securely wipe SSD

You can also use Offigneum to completely erase your SSD. For this, follow the simple steps below.

  1. From Explorer, right-click on the drive you wish to securely erase and select "Format."
  2. Follow Windows steps to format your drive. Offigneum supports all major file systems, including NTFS, FAT32, and EXFAT.
  3. Launch Offigneum. From the menu, select "Wipe Space."
  4. Follow simple steps in Offigneum to select the disk you wish to safely wipe and confirm your choice.
  5. Once the disk is completely wiped, Offigneum will display a confirmation window indicating that the disk was fully erased.

Making the right choice: full drive wipe vs. file shredding

When deciding between wiping an entire drive or shredding individual files, you might want to consider your specific situation and end goal.

When to Wipe the Entire SSD:

  • You're selling, donating, or disposing of the drive
  • You're repurposing the drive for a different user
  • You're returning a device under warranty or to an employer

In these scenarios, you most likely should securely wipe your SSD completely. Otherwise, if you need to securely erase only some part of your files-not your entire drive-you should use file shredding instead. In any case, whatever you wish to do-whether it's wiping your drive completely or shredding select files-Offigneum provides you the most secure, efficient, hardware-friendly, and user-friendly way to ensure your data privacy.

There are many other reasons when you might want to shred files, including:

  • You need to delete specific sensitive files (financial records, personal documents, etc.) while keeping your system intact
  • You regularly handle confidential information that requires secure deletion when no longer needed
  • You share a computer with others and want to ensure your deleted files remain private
  • You want to clear space on your drive by removing old files without leaving recoverable traces

File shredding with Offigneum offers you a selective approach, allowing you to permanently delete specific information without affecting your entire system, offering you the most secure and easy way to remove unwanted data from your system.

Protecting your privacy

As we store more of our lives on digital devices, properly securing our data becomes increasingly important. The methods described in this guide provide options for different scenarios, from wiping entire drives to shredding individual files.

Remember that conventional deletion methods simply don't provide adequate security. By using tools like Offigneum for regular secure file deletion, you can ensure your private information remains private, even after you've moved on from your current devices. Take control of your data today. Get Offigneum for as low as $4.99 and experience truly secure file deletion for your computer.

Learn more about Offigneum and the full list of its features on its official website:
www.ambeteco.com/Offigneum/


Legal Disclaimer: The information provided in this article is for general informational purposes only and does not constitute legal or technical advice. The methods and tools described, including Offigneum file-shredding software, are intended to enhance data security and privacy. However, no data erasure method can guarantee absolute protection against data recovery, due to many factors, including user error, improper handling of storage media, and external environmental influences. Users should exercise caution and consult a professional if unsure about data deletion processes. Offigneum and its developers disclaim any liability for damages or losses arising from the use or inability to use the described tools or techniques or instructions. For specific legal and technical concerns, please seek appropriate professional guidance.

FAQ about Securely Erase an SSD

Question

Why is deleting files from an SSD different from deleting files from a hard drive?

Answer

On a traditional spinning hard drive, data is written to fixed magnetic locations on physical platters. Overwriting those locations with new data reliably destroys the original, which is why multi-pass overwrite tools like DBAN work well for HDDs. SSDs work fundamentally differently. They use NAND flash memory managed by a drive controller that distributes writes across all available memory cells through a process called wear leveling, which extends drive lifespan by preventing any single cell from being written to repeatedly. The result is that when you try to overwrite a specific file on an SSD, the controller may write the new data to an entirely different physical location than the original, leaving the original intact. SSDs also maintain over-provisioned storage — a hidden reserve of cells the operating system cannot see — where copies of data can persist after deletion. This means that overwrite tools designed for HDDs are largely ineffective on SSDs, and SSD-specific methods such as hardware-level Secure Erase commands or software that works with the drive controller directly are required.

Question

What is the most secure way to wipe an SSD before selling?

Answer

The most reliable method for wiping an SSD before selling is the ATA Secure Erase command (for SATA SSDs) or NVMe Format (for NVMe SSDs). These commands are built into the drive's own firmware and instruct the controller to apply a voltage spike to every NAND memory cell simultaneously, resetting all stored data — including cells in the hidden over-provisioned area — to a factory-empty state. This is the method recognized by NIST SP 800-88 as meeting the Purge standard. You can issue this command through your SSD manufacturer's utility (Samsung Magician, Crucial Storage Executive, WD Dashboard, Kingston SSD Manager, etc.), through BIOS/UEFI secure erase if your motherboard supports it, or through dedicated file shredding software like Offigneum that automates the command for you. If your SSD has been encrypted with BitLocker throughout its use, cryptographic erase — deleting the encryption key — is equally effective and faster. Standard formatting and Windows Reset do not qualify as secure wipes for SSDs.

Question

Does Windows Reset this PC with Remove Everything securely wipe an SSD?

Answer

Choosing 'Remove everything' in Windows Reset this PC provides more protection than a basic reset, but it does not constitute a secure wipe for an SSD. When you select the 'Clean data' option during the reset, Windows attempts to overwrite user files, which improves security over standard deletion. However, this process does not issue hardware-level Secure Erase or NVMe Format commands, does not access over-provisioned storage areas, and does not provide a verified result confirming that all data is unrecoverable. For everyday personal use with low-sensitivity data, this method may be acceptable. For anyone selling a device that held financial records, passwords, health information, or professional documents, it does not provide adequate protection. The correct approach for SSDs is using manufacturer utilities, BIOS-based Secure Erase, or dedicated file shredding software that issues proper hardware-level erasure commands.

Question

What is over-provisioning on an SSD and why does it create a data security risk?

Answer

Over-provisioning is a design feature of SSDs where the drive physically contains more NAND flash memory than its advertised capacity. For example, a drive labeled 400GB might have 512GB of physical storage, with the extra roughly 112GB reserved for the controller's internal use — managing wear leveling, replacing failed blocks, and optimizing write performance. Because this reserved space is completely invisible to the operating system and to any overwrite tools running at the software level, data fragments stored in these over-provisioned cells can persist after standard deletion or formatting and remain potentially recoverable with forensic tools. This is one of the core reasons why HDD-centric tools like DBAN are ineffective on SSDs — they cannot address storage areas the OS cannot access. Hardware-level Secure Erase commands bypass this limitation by instructing the drive's own controller to reset every cell, including over-provisioned areas, simultaneously.

Question

What is the difference between ATA Secure Erase and NVMe Format for SSDs?

Answer

ATA Secure Erase and NVMe Format are both hardware-level commands built into SSD firmware that reset all memory cells including hidden over-provisioned areas, but they apply to different drive types. ATA Secure Erase is the command for SATA-interface SSDs — the older standard using the SATA data connector common in laptops and desktops from the 2010s. NVMe Format (also called nvme format) is the equivalent command for NVMe SSDs, which connect via M.2 or PCIe slots and are standard in most computers made since around 2018. Both commands meet the NIST SP 800-88 Purge standard when properly executed and make data unrecoverable by any known software-based recovery method. Before initiating either command, confirm your drive type: M.2 drives can be either SATA or NVMe, so the physical connector alone does not tell you which command to use. Your manufacturer's utility or a tool like CrystalDiskInfo can confirm the interface type. If you are unsure, dedicated file shredding software like Offigneum detects your drive type automatically and applies the correct command.

Question

Is the TRIM command enough to securely erase data from an SSD?

Answer

No — TRIM is a performance optimization feature, not a security tool, and it does not provide secure data erasure. When you delete a file on an SSD with TRIM enabled, the operating system sends a TRIM command to the drive informing it that certain storage blocks are no longer needed. The drive then schedules those blocks for erasure during idle time, which improves future write performance by ensuring the controller does not need to erase before writing. However, TRIM operates on the controller's schedule, not immediately on deletion, and it does not guarantee that all traces of the data are removed, particularly from over-provisioned areas. TRIM also only functions when the SSD is connected through a primary SATA or NVMe channel — when connected via USB, as is common when testing a secondhand drive, TRIM is disabled entirely and deleted data remains fully intact. For secure erasure, hardware-level Secure Erase commands or dedicated file shredding software are required.

Question

Can I use DBAN to wipe an SSD?

Answer

No — DBAN (Darik's Boot and Nuke) should not be used to wipe SSDs and will not provide effective data erasure on them. DBAN was designed for traditional spinning hard drives and works by repeatedly overwriting every addressable sector with data patterns. On HDDs, this physically replaces the magnetic encoding of the original data. On SSDs, DBAN's overwrite commands are intercepted by the drive controller, which routes writes to different physical cells than those containing the original data due to wear leveling. As a result, DBAN may report success while gigabytes of personal data remain untouched in other physical locations, including over-provisioned areas the tool cannot access at all. Repeatedly running DBAN on an SSD also causes unnecessary write cycles, degrading the drive's lifespan without providing meaningful security benefit. For SSD wiping, use manufacturer-specific secure erase utilities, BIOS/UEFI Secure Erase, or dedicated SSD-aware file shredding software.

Question

What should I do if I only want to delete specific files from my SSD, not wipe the entire drive?

Answer

If you need to securely delete individual files or folders from an SSD while keeping your operating system and other data intact, full-drive wipe methods like BIOS Secure Erase or manufacturer utilities are not appropriate — those erase everything. Instead, use dedicated file shredding software specifically designed to handle SSD architecture. Offigneum for Windows provides SSD-optimized algorithms (WiperTurbo, WiperPrime, and WiperDeep) that target individual files while accounting for wear-leveling behavior, overwriting the file's content and metadata — including file names, folder paths, and timestamps — without causing unnecessary write cycles across the entire drive. MacGlacio provides equivalent functionality for macOS. This approach is particularly important when you regularly handle sensitive files such as financial documents, scanned identity documents, or client records that must be permanently removed after their useful life. Wiping free space is also recommended after bulk deletion, as it overwrites storage locations where previously deleted files may still physically reside.

Question

How long does a Secure Erase take on an SSD compared to a full format?

Answer

ATA Secure Erase and NVMe Format commands are extremely fast compared to traditional formatting methods because they instruct the drive's controller to reset all memory cells simultaneously at the hardware level rather than writing data sector by sector at the software level. A Secure Erase on most SSDs completes in under five minutes regardless of drive capacity — some drives finish in under one minute. By contrast, a full software-based format of a 1TB SSD can take 30 minutes to several hours depending on the tool and the number of overwrite passes specified. This speed advantage makes hardware-level Secure Erase the preferred method not only for security reasons but also for practical efficiency, especially in business environments processing large numbers of devices. Note that if the secure erase is performed through BIOS, some implementations may take longer as they include additional verification steps. The drive will typically need to be reformatted after Secure Erase before it can be used again, which adds a few minutes.

Question

What is cryptographic erase and when is it the best option for wiping an SSD?

Answer

Cryptographic erase (also called crypto erase) is a technique for wiping an SSD by permanently deleting or replacing the drive's encryption key rather than overwriting the data itself. If an SSD is a self-encrypting drive (SED) — meaning it has been encrypting all stored data automatically from the time it was first used — then destroying the key renders all stored data mathematically unreadable without any need to overwrite a single byte. This meets the NIST SP 800-88 Purge standard and is recognized by enterprise security frameworks including those used in healthcare and financial services. The main advantage over ATA Secure Erase is speed: cryptographic erase completes almost instantly regardless of drive capacity. It also places zero additional write stress on the drive. The critical caveat is that it only works correctly if encryption was active from the moment the drive was first used. If the drive was not encrypted from day one, there may be unencrypted data fragments present that the cryptographic erase cannot reach. BitLocker on Windows and FileVault on Mac are common implementations; if either was enabled throughout the device's use, deleting the encryption key through a factory reset or a certified erase tool provides strong protection.

Offigneum

World's most powerful shredder