Categories
data protection documents archive

“Delete File” Sounds Simple – But It Isn’t

Many people believe that a file is completely gone as soon as it’s moved to the recycle bin and the bin is emptied. In reality, this usually only removes the reference to the file in the file system. The actual data remains on the storage medium – and will stay there until it is eventually overwritten by new data.

HDD vs. SSD – Different Challenges

With traditional hard disk drives (HDDs), files can be made unreadable fairly reliably by overwriting them multiple times. However, with modern solid-state drives (SSDs), things are much more complicated:

SSDs use a controller that independently decides where data is stored. As a result, targeted overwriting of specific files is virtually impossible. Furthermore, many SSDs have hidden reserve areas (known as “overprovisioning” areas) that are inaccessible to the user.

Possible Solutions: Secure Erase & TRIM

A proven method is the Secure Erase command. This is provided by the SSD manufacturer and completely erases all storage areas – including hidden reserves.

Alternatively, modern operating systems use the TRIM command. It marks deleted data blocks as “free” so they can be overwritten in the future. However: the data is not physically deleted immediately – it remains on the drive for some time.

For users without experience in the command line, there are various tools – some free, some paid – that assist with secure deletion. It’s important to ensure the chosen tool is compatible with your drive. Even then, the fact remains: not all SSDs support Secure Erase, and the command may not work on all data areas.

Photo by Ujesh Krishnanon Unsplash

The Smart Alternative: Encrypt Instead of Delete

As you can see, securely deleting data on SSDs runs into technical limitations. A far more effective method is: encrypt the data – and then delete the key.

If sensitive data is encrypted from the start using a strong encryption algorithm like AES-256, it becomes unreadable without the correct key. Once the key is securely deleted, only useless data garbage remains – even specialists won’t be able to decrypt it.Self-Encrypting Drives (SEDs) are based exactly on this principle: with “Secure Erase,” only the stored encryption key is deleted, rendering the data worthless.

But Beware: This Only Works If…

  • …the data was encrypted before being stored. Encrypting afterwards does not protect against unencrypted remnants already saved to the SSD.
  • …the key is securely deleted. Simply deleting a key file is not enough. The key should either be stored only in RAM or come from a storage medium that can be securely erased.
  • …you understand that encrypted data remains visible. While it can’t be opened without the key, its existence is still detectable – important if you rely on plausible deniability.
Photo by sydney Rae on Unsplash

Think Ahead – Encrypt First, Delete Later

Secure data deletion, especially on SSDs, is no simple matter. The best strategy: encrypt data from the outset. If it later needs to be deleted, securely removing the key is often sufficient. Additional safety comes from using deletion tools that support Secure Erase – provided your drive allows it.Professionals physically destroy critical SSDs – by shredding them with specialized equipment. But for home use, that’s rarely feasible, as it requires precise and powerful machinery. Therefore, the rule is: encrypt early – and use Secure Erase when needed.

Checklist

  • Files in the recycle bin are not truly deleted – only the reference is removed; the data physically remains.
  • Secure deletion on SSDs is technically challenging – traditional overwriting often doesn’t work reliably.
  • Secure Erase and TRIM can help, but they’re not fully effective or available on all SSDs.
  • Data should be encrypted before being saved, and the key securely deleted later to render it truly useless.
  • Think ahead about data protection – encrypt early and research the right deletion tools for your storage medium.