I'm planning to sell my laptop, which has an NVMe disk, and I want to make sure none of my information can be recovered from it. I have disk encryption on, but I'm feeling paranoid since my password has been leaked before and I want to ensure the data is unrecoverable. I'd prefer a method that involves zeroing out every byte on the disk. I remember learning that for traditional hard drives, it was recommended to overwrite data multiple times. Is that still necessary for NVMe disks? What do you think is the best approach here?
4 Answers
Honestly, I think people are overthinking this. A quick command like `blkdiscard` can effectively erase everything for you without needing to go through multiple overwrites like with older drives. NVME drives are designed to handle data wiping differently than HDDs, and running the correct commands will get the job done fast and effectively!
You have a couple of solid options for securely wiping NVMe SSDs. You can either do a secure erase directly from the BIOS if your drive supports it. This usually trusts the SSD to handle the wipe correctly. Alternatively, I suggest using a reliable hard drive wiping software to ensure all data is gone. It's easy to worry about someone recovering your data, but remember that a good wipe should be sufficient, and don't get too caught up in paranoia!
Secure erase generally works by sending a command to the drive that tells it to clear all data effectively. For NVMe drives, it should be reliable. But, if you're really concerned, running a dedicated wiping tool might give you more peace of mind. Crushing the drive is always the final option if you have no other choice!
If you're really anxious, you might also try using a hard drive wiping tool that has a good reputation. Just remember that the tech has come a long way since the days of multiple overwrites. Tools nowadays are made to wipe data from flash drives securely and efficiently!
For most cases, a secure erase using tools like `nvme-cli` will do the trick. It’s efficient and designed specifically for SSDs. If you’re using Linux, there are guides available to walk you through the process! Just be careful about how you do it, and it will clear all internal data and caches from the drive.

I'm mainly worried that leftover data like passwords and SSH keys could still be hanging around because of software bugs. How exactly does the BIOS secure erase work? Does it really zero everything out or is just one pass enough for NVMEs?