How can I securely erase my m.2 SSD?

I’m going to sell my computer and need to securely wipe my m.2 SSD. The drive has personal data, and I want to ensure it’s completely erased and unrecoverable. What are the best methods or software for doing this? Any step-by-step guides or tips would be greatly appreciated.

You want to securely erase your M.2 SSD? Honestly, good luck. Most methods out there are just smoke and mirrors. You might want to try a software like ‘Parted Magic’. They claim to securely wipe SSDs, but let’s be real - nothing’s guaranteed.

Okay, ‘Parted Magic’ has a Secure Erase feature that’s built into it. They say it’s compatible with SSDs and M.2 drives, but you still need to create a bootable USB, which is a hassle. Plus, you have to pay for it now, which wasn’t the case before. The pro is that it’s pretty thorough with overwriting data, and it’s a tool used by pros.

Other options like ‘Blancco’ or ‘DBAN’ might do the trick too, but DBAN doesn’t even claim to work on SSDs properly. Yeah, they’re cheaper or even free, but with M.2 SSDs, not all of them support the firmware-based secure erasure commands these tools use.

A more extreme approach is physically destroying the SSD. Sure, it’s overkill and leaves you without a drive, but it’s probably the only way to be 100% sure nobody’s getting your data.

In the end, you can spend hours with these tools, but be aware you’re taking a gamble. Whatever you do, don’t trust these methods totally.

I see where @techchizkid is coming from, but let’s add some nuance here. First off, it’s essential to know that SSDs, including M.2 ones, operate differently from traditional hard drives, so not all erasure tools work effectively on them.

Feature-focused recommendation here: One tool that’s often overlooked but quite powerful is the built-in utilities that many SSD manufacturers include with their products. For instance, Samsung has the Samsung Magician software for their drives, which supports a secure erase function designed explicitly for SSDs. If you’re using a different brand, check their site for a similar tool. These utilities are tailored for the specific quirks of their hardware, making them more reliable than generic solutions.

Also, while Parted Magic is a solid option despite the fee, another free tool to consider is the “Secure Erase” function in GParted. It’s a bit more user-friendly for beginners if you’re comfortable creating a bootable USB. Plus, it’s open-source, which is a thumbs-up for many.

Now, about the “nothing’s guaranteed” point – @techchizkid isn’t too far off. For most consumer-level needs, the software methods are sufficient, but the extreme method of physical destruction is indeed the only way to be 100% sure. If you’re not into the idea of destroying your SSD, consider encrypting your data before wiping it. By encrypting the entire drive first, you ensure that even if some data lingers post-wipe, it will be essentially unreadable without the decryption key.

Lastly, for a balanced approach, check out ATA Secure Erase commands from your BIOS. A lot of modern motherboards support these commands which trigger the SSD’s firmware to erase all data. It requires rebooting into BIOS/UEFI but is relatively straightforward and free.

For peace of mind, you might combine encryption with a secure wipe tool and then run a regular wipe utility afterward. That way, you’ve got multiple layers of data destruction, covering your bases.m

Ah, selling your computer makes sense you need to securely wipe your M.2 SSD. Let’s get into the thick of it. First off, scratching the surface with just software tools can be a gamble – not to say all of 'em are useless, but they’re not the Holy Grail either.

1. Manufacturer-Specific Tools:
One overlooked aspect is the manufacturer-provided tools. If you have a Samsung SSD, Super Important to use the Samsung Magician software. It’s tailored and would give you better results. Same with other brands – head to their official websites and see if they got a similar tool. I know even WD, Intel, and Crucial have such utilities. Samsung Magician, for example, does a secure erase that aligns with the SSD architecture to make sure data isn’t recoverable.

2. ATA Secure Erase from BIOS/UEFI:
The BIOS/UEFI method is robust and it’s more reliable than a generic solution. Boot into your BIOS/UEFI firmware settings, check for storage settings, and find ‘Secure Erase’. This command wipes the drive at the firmware level, ensuring it genuinely erases the NAND cells. Some concerns here though – make sure your SSD supports this function. Not all of them do.

3. Encryption Before Erase:
This is slightly offbeat but combines multiple layers of security. Encrypt your drive before you wipe it. Use tools like BitLocker on Windows or FileVault on macOS to encrypt the entire SSD first. Post encryption, utilize the secure erase tools. Even if any data is left behind after wiping, it’s encrypted.

4. Linux Tools - hdparm and nvme-cli:
For tech-savvy folks, Linux tools are a strong suit. Use hdparm for SATA SSDs and nvme-cli for NVMe drives. These tools can issue secure erase commands directly to the drives. Example for using hdparm:

sudo hdparm --user-master u --security-set-pass password /dev/sdX
sudo hdparm --user-master u --security-erase password /dev/sdX

Replace /dev/sdX with your actual drive identifier. Be very cautious here; messing up could brick your SSD.

5. Parted Magic:
Despite someone mentioning having to pay for Parted Magic, the Secure Erase feature it offers is reputed among pros. Yes, paying for it might sting – weigh this against the cost of potentially leaked data. It’s compatible with SSDs and does a thorough job. Creating a bootable USB is a minor hassle in comparison.

6. Physical Destruction:
Overkill, yeah, but a hammer to the SSD ensures nobody gets your data. Heat, puncturing the NAND cells, smashing it thoroughly works. Remember though, no SSD left for the resale value of your computer. Last resort, but absolute.

Combining Methods:
Sometimes more is better. Encrypt first, then use manufacturer-specific tools, follow up with a BIOS-based secure erase, and finally a wipe with hdparm or nvme-cli.

7. Shred & Wipe Software:
If still intent on software, some users underrated Shred or Wipe, especially with options for wipe passes. Normally, 2-3 passes each could suffice. These operate directly under Linux and have robust community backing.

Keep a few caveats in mind: different tools have varying effectiveness – always check the tool’s compatibility with your specific SSD model. And remember, for consumer-level security, these methods should suffice; otherwise, destroying the SSD is your next step.

The encryption before erase drops another security layer ensuring even if data lingers, it’s no good without the decryption key. DIY this with integrated OS tools or third-party software for broader coverage.

Wrap up: isn’t so much about paranoia but robust, layered approaches. Encrypt-erase-verify, and if in doubt, destroy. Keep building on what fits your comfort and expertise level, all packaged with a sprinkle of caution.