You deleted the file. Emptied the trash. Felt that little burst of digital housekeeping satisfaction. Here’s the uncomfortable truth: the data is still there. Every bit of it. What you deleted was a pointer — the file system’s bookmark that said “this data lives at this address.” The address was erased from the index. The data at that address didn’t move, didn’t change, didn’t notice. Anyone with a free recovery tool and ten minutes can bring it back.

If you’re selling a device, donating a laptop, retiring a server, or just trying to make sure something truly gone stays gone, you need to do more than delete. You need to destroy. Here’s how, for every type of storage you’re likely to encounter.

DO / DON’T

DO:

DON’T:

Hard Drives (HDDs)

Traditional spinning hard drives are the simplest to securely wipe because overwriting actually works — when you write new data to a sector on an HDD, the old data in that sector is genuinely replaced.

Full Disk Wipe — DBAN

DBAN (Darik’s Boot and Nuke) is a free, bootable tool that overwrites every sector of a hard drive with zeros or random data.

  1. Download DBAN from dban.org
  2. Write the ISO to a USB drive using Rufus (Windows) or dd (Linux/macOS)
  3. Boot the target machine from the USB
  4. Select the drive to wipe
  5. Choose the DoD Short method (three passes) or Quick Erase (one pass of zeros)
  6. Start the wipe and wait — this takes hours for large drives

One pass is sufficient for modern drives. NIST SP 800-88 Rev. 1 confirms this. The old seven-pass DoD standard is outdated and unnecessary on drives manufactured after 2001. Don’t waste hours on extra passes that provide no additional security.

Linux: The shred Command

If you’re running Linux, shred is built in:

shred -vfz -n 1 /dev/sdX

Replace /dev/sdX with your actual drive device. Triple-check the device name. Running shred on the wrong drive is permanent and unforgiving.

Individual File Deletion on HDDs

For individual files instead of full drives:

Note: individual file shredding on file systems with journaling (NTFS, ext4, APFS) may not catch all copies. The file system journal may retain fragments. For complete assurance on HDDs, full-disk wipe is the only guarantee.

Solid-State Drives (SSDs)

SSDs are fundamentally different from HDDs, and the difference matters for destruction. Wear leveling distributes writes across all cells to prevent premature wear. Over-provisioned reserve blocks are invisible to the operating system. The result: overwriting an SSD with software tools does not guarantee every copy of your data is destroyed.

Manufacturer Secure Erase

The most reliable software method for SSDs is the manufacturer’s secure erase command, which instructs the drive controller to reset all cells:

These tools send the ATA Secure Erase or NVMe Format command directly to the drive controller, which clears all cells including over-provisioned and reserved areas that software overwriting can’t reach.

Crypto-Shredding (The Best Method)

If the drive was encrypted from the start (full-disk encryption via BitLocker, LUKS, or FileVault), destroying the encryption key renders all data on the drive irrecoverable — even though the encrypted data is technically still on the cells. Without the key, it’s indistinguishable from random noise.

This is the NIST SP 800-88-recommended purge method for SSDs. It’s also the fastest — destroying a key takes seconds regardless of drive size.

The lesson: encrypt your SSDs before you store sensitive data on them. It makes end-of-life destruction trivial.

Linux: Secure Erase via hdparm

For SATA SSDs on Linux:

hdparm --user-master u --security-set-pass p /dev/sdX
hdparm --user-master u --security-erase p /dev/sdX

For NVMe drives:

nvme format /dev/nvme0n1 -s 1

The -s 1 flag performs a user data erase. Use -s 2 for a cryptographic erase if supported by the drive.

Mobile Devices

iPhones and iPads

iOS devices have been hardware-encrypted by default since the iPhone 3GS. A factory reset destroys the encryption keys, making data recovery infeasible.

Settings > General > Transfer or Reset iPhone > Erase All Content and Settings

That’s it. Apple’s hardware encryption makes this effective. The data remains on the flash storage, but without the keys it’s cryptographic noise.

Android Devices

Modern Android (6.0+) supports full-disk encryption, and most devices manufactured after 2018 enable it by default. Verify first:

Settings > Security > Encryption — confirm the device shows “Encrypted”

If encrypted: Settings > System > Reset > Factory Reset destroys the encryption keys and renders data unrecoverable.

If NOT encrypted (older devices): Enable encryption first, then factory reset. Doing it in the wrong order leaves recoverable data.

For extra assurance after factory reset: fill the device’s storage with junk data (record a long video, download large files), then factory reset again. This overwrites the flash cells that held your original data.

Cloud Storage

Cloud deletion is different because you don’t control the physical storage. When you delete a file from Google Drive, Dropbox, OneDrive, or S3, you’re sending a delete request to the provider. What happens on their physical infrastructure is their business.

What You Can Control

Crypto-shredding works here too. If you encrypted files with your own keys before uploading, destroying the keys makes the cloud-stored ciphertext irrecoverable — regardless of what the provider does or doesn’t do with the physical storage.

Retention policies: Check your provider’s data retention and backup policies. Some services retain deleted data for 30-90 days (or longer) in backups and version history.

Purge version history. If your cloud storage maintains file versions, delete those too. A “deleted” file with 15 previous versions in the version history isn’t deleted — it’s 15 files.

Close the account. If you’re done with a service entirely, delete all files, purge trash and version history, then delete the account. Request a data deletion confirmation in writing if the service supports it.

When to Physically Destroy

Software methods have limits. If the data is sensitive enough — Restricted classification, regulated data, anything you’d lose sleep over — physical destruction is the answer.

Keep a record. If compliance matters (and it usually does), maintain a log: date, serial number, destruction method, person who performed it, and a witness. Some organizations require certificates of destruction from certified vendors.

If It Already Happened

If you’ve already sold, donated, or discarded a device without wiping it:

The single best thing you can do — right now, before you need to destroy anything — is turn on full-disk encryption on every device you own. BitLocker on Windows, FileVault on macOS, LUKS on Linux, and verify it’s enabled on your phone. When the time comes to dispose of that device, you’ll destroy a key instead of chasing data across flash cells and wear-leveled blocks.

Do it now. Before you forget.