Is there a fullproof way to safely erase SSD data, without physically destroying it?

During my search for an answer to this question I found that TRIM may not be reliable(https://blog.elcomsoft.com/2019/01/life-after-trim-using-factory-access-mode-for-imaging-ssd-drives/)as well as the ATA secure erasure, some have even sa… Continue reading Is there a fullproof way to safely erase SSD data, without physically destroying it?

Why do messages which I have deleted on my phone remain on the desktop version of Signal? [closed]

I would like to be able to delete messages once, rather than three times (on my phone and two separate laptops, all linked to the same Signal account) in order to keep track of when things have been dealt with.
Is this possible? The devic… Continue reading Why do messages which I have deleted on my phone remain on the desktop version of Signal? [closed]

If SSDs cannot be securely wiped then why can’t we recover files after crypto virus attack?

It is my understanding that SSDs do not allow user to overwrite any specific file completely (wear-leveling). So in case of ransomware attack such as CryptoLocker, doesn’t that mean there is still, always, an unencrypted copy of file on th… Continue reading If SSDs cannot be securely wiped then why can’t we recover files after crypto virus attack?

Does running "rm -P /path/to/file" secure erase file from a data forensic perspective when used on spinning disk?

According to man rm:

Overwrite regular files before deleting them. Files are
overwritten three times, first with the byte pattern 0xff,
then 0x00, and then 0xff again, before they are deleted.

How does this compare to the following (use… Continue reading Does running "rm -P /path/to/file" secure erase file from a data forensic perspective when used on spinning disk?