Fact is that Secure Erase is in face a component of the ATA specification and is integrated into all standards compliant ATA devices in production since 2001. This is not just for SSD technology but also applies to all ATA, IDE, PATA, and SATA magnetic media based hard drive devices as well.
Created by IBM in 1994 as a feature for the TravelStar line of drives, the Center for Magnetic Recording Research at the University of California San Diego had at the insistence of the NSA developed the current version of the Secure Erase technology.
Secure Erase is embedded in the drive controller microcode and is initiated by an externally issued command sequence. Once initiated, SE uses an optimized single pass process that addresses all regions of the storage media, including the Protected Service Areas (when properly launched using compatible hardware). Protected service areas include G-List, Host Protected Area, and the Device Control Overlay (search Wikipedia for a detailed description of the role of each component of the PSA).
Despite the fact that it is launched by external command, and is a highly effective PURGE level sanitization technology it can not be reliably launched in on most host equipment due to host controller protection of the HPA, and the fact that many BIOS manufacturers inhibit SE from being launched due to security concerns. The issue being that if virus or malware were to initiate SE, the target computer would be purged rapidly, and with no hope for recovery.
It is for this reason that Secure Erase is not being exploited en masse by every software vendor. Effectively, the only truly effective means to purge using SE is by using purpose built hardware such as the Digital Shredder manufactured by Ensconce Data Technology (www.deadondemand.com) or other dedicated appliance based solution.
For more information on SSD performance issues, an excellent paper can be found at www.anandtech.com under the storage heading. The comments are well informed, and from the hip.. truly an excellent read.
If you want accurate and up to date guidance on developing policy for the destruction of digital data, I had co-authored a guide with Dr. gordon Hughes of the CMRR titled 'The best Practices for the Destruction of Digital Data' which is based on a review of all available guidance collected from Government, Academic, and vendor sources, as well as, input by industry and security experts. In this guide we present hardware considerations, classification concerns, and review acceptable (and unacceptable) practice... essentially all the tools one needs to create accurate and reliable data destruction policy.
The paper is available as a no charge download at www.converge-net.com, select English, and go to the news page to link to the download request form.
I hope this helps.
Ryk
Hi there,
There is a lot of buzz on the OCZ forum regarding the secure erase feature in CCleaner. Apparently, it performs some magic on their solid state drives that brings the performance of the drive back to it's "like new" level. Can you please give some insight to what this feature is doing.
Thanks!
Scott