How To Securely Erase An SSD Before Selling It
You’re about to sell your old SSD, and you do what seems logical: right-click the drive, hit “Format,” and call it a day. Except that quick format didn’t actually erase anything. Your files, passwords, browser history, tax documents, and personal photos are all still sitting on that drive, waiting for anyone with free recovery software to pull them back up in minutes.
SSDs store data differently than traditional hard drives, and that means wiping them securely requires a different approach. The old trick of overwriting a drive with zeros multiple times doesn’t work well on solid-state storage, and can actually shorten the drive’s lifespan for no real benefit. You need purpose-built tools and the right commands to make sure your data is truly gone before that SSD changes hands.
This guide walks you through exactly how to do it, using both manufacturer-specific software and universal tools that work on any SSD brand.
Why Standard Formatting Doesn’t Actually Erase Your SSD
When you perform a quick format in Windows, the operating system simply marks the space as available. It removes the file system’s index, but the actual data blocks remain intact. Think of it like removing the table of contents from a book. The chapters are all still there.
Even a full format in Windows 10 or 11 only writes zeros to the visible sectors. SSDs maintain hidden areas called over-provisioned space, which can hold anywhere from 7% to 28% of the drive’s total NAND capacity. This reserved space is invisible to your operating system, but data fragments absolutely live there.
On top of that, SSDs use wear leveling algorithms that constantly shuffle data around to distribute write cycles evenly across memory cells. This means a file you “deleted” months ago might still exist in a cell that hasn’t been rewritten yet. Standard formatting has no way to reach these cells.
ATA Secure Erase vs. Sanitize: Understanding the Two Real Options
Modern SSDs support two firmware-level erase commands that actually do the job properly. Both are executed by the drive’s own controller, which means they can reach every cell on the drive, including the over-provisioned and hidden areas that your operating system can’t touch.
ATA Secure Erase
This command tells the SSD’s controller to reset all storage cells. On most drives, it completes in seconds because it’s essentially resetting the encryption key used by the drive’s hardware encryption engine. Even if the drive wasn’t using encryption from your perspective, many modern SSDs encrypt all data by default at the hardware level (this is called self-encrypting drive, or SED, technology). Destroying the key makes all existing data unrecoverable gibberish.
ATA Secure Erase has been around since the ATA-8 specification and is widely supported across virtually all SATA and many NVMe drives.
Sanitize Command
The Sanitize command is newer, more thorough, and part of both the ATA and NVMe specifications. It supports multiple methods: Block Erase, Crypto Erase, and Overwrite. The key advantage of Sanitize over Secure Erase is that it cannot be interrupted. Once a Sanitize command begins, the drive will complete it even if you lose power midway through, picking up where it left off when power is restored.
For NVMe drives specifically, Sanitize is the preferred method, as the ATA Secure Erase command is technically a SATA/ATA feature. NVMe drives use a different command set, and the NVMe Sanitize command was designed specifically for them.
Which Should You Use?
If your drive supports the Sanitize command, use it. It’s the more modern and reliable option. If your drive only supports ATA Secure Erase (common on older SATA SSDs), that’s still perfectly effective for consumer use. Either one will make your data unrecoverable with any commercially available tools.
Using Manufacturer Tools (The Easiest Method)
Every major SSD manufacturer offers free software that can issue secure erase commands to their own drives. These are the simplest tools to use because they’re designed for exactly this purpose, with guided interfaces that walk you through the process.
Samsung Magician (for Samsung SSDs)
Samsung Magician is one of the better manufacturer utilities out there. It supports the full Samsung SSD lineup, including the popular 860 EVO, 870 EVO, 970 EVO Plus, 980 Pro, and 990 Pro series.
- Download Samsung Magician from Samsung’s official website and install it.
- Open the application and select your Samsung SSD from the drive list on the left.
- Navigate to the Secure Erase section (found under the “Data Management” area in recent versions).
- Samsung Magician will require you to create a bootable USB drive. This is because you can’t securely erase your system drive while Windows is running on it. The tool will build a bootable Linux environment for you.
- Boot from the USB drive, follow the on-screen prompts, and the erase will typically complete in under 30 seconds.
Important note: Samsung Magician will only erase Samsung-branded drives. Don’t expect it to recognize a Crucial or WD SSD.
Crucial Storage Executive (for Crucial/Micron SSDs)
Crucial’s Storage Executive software supports drives like the MX500, BX500, P3, P3 Plus, and the T700 NVMe drives.
- Download Storage Executive from Crucial’s website.
- Select your Crucial SSD from the list of detected drives.
- Look for the Sanitize or PSID Revert option under the drive’s management section.
- For SATA drives, you may need to “freeze” and then “unfreeze” the drive by putting your computer to sleep and waking it. Storage Executive will guide you through this if needed (this is a BIOS security feature, not a bug).
- Confirm the erase and let it complete.
Crucial’s tool is functional but not as polished as Samsung’s. It gets the job done, though.
WD Dashboard (for Western Digital and SanDisk SSDs)
Western Digital’s Dashboard application covers WD Blue, WD Black, WD Green, and SanDisk-branded SSDs (WD owns SanDisk).
- Download WD Dashboard from Western Digital’s support site.
- Select your WD or SanDisk SSD.
- Navigate to Tools and find the Secure Erase or Sanitize option.
- Follow the prompts. Like Samsung’s tool, WD Dashboard may require creating a bootable USB for the erase process.
WD Dashboard can be a bit clunky with its interface, and some users have reported it not detecting drives connected via USB enclosures. For best results, connect your WD SSD directly to a SATA port on your motherboard or an M.2 slot.
Parted Magic: The Universal Tool That Works on Any SSD
Here’s where things get interesting. If you have an off-brand SSD, a drive whose manufacturer doesn’t offer a wipe utility, or you just want one tool that handles everything, Parted Magic is the go-to solution.
Parted Magic is a bootable Linux distribution built specifically for disk management. It includes the Erase Disk utility, which can issue ATA Secure Erase, Enhanced Secure Erase, and NVMe Sanitize commands to virtually any SSD, regardless of manufacturer.
Parted Magic is not free. It’s a paid tool (check their website at partedmagic.com for current pricing), but it’s a one-time purchase and well worth it if you deal with drives regularly. For a single use, you might find older free versions floating around, though I’d recommend getting the latest release for full NVMe support.
How to Use Parted Magic for Secure Erase
- Purchase and download the Parted Magic ISO from partedmagic.com.
- Create a bootable USB drive using Rufus (Windows) or balenaEtcher (Mac/Linux/Windows).
- Boot your computer from the USB drive. You may need to change your boot order in BIOS or press F12 during startup to select the USB.
- Once Parted Magic loads, double-click the Erase Disk icon on the desktop.
- You’ll see several options. Select “Secure Erase – ATA” for SATA SSDs or “NVMe Secure Erase” for NVMe drives.
- Select your target drive. Triple-check you’ve selected the right one.
- If the drive shows as “frozen” (a common security state), Parted Magic will prompt you to put the computer to sleep for a few seconds and wake it. This unfreezes the drive.
- Confirm the erase. The process usually takes anywhere from 2 seconds to 2 minutes depending on the drive and method used.
I recommend Parted Magic as the single best universal option. It handles edge cases that manufacturer tools sometimes choke on, like frozen drives, drives connected through adapters, and mixed-brand setups.
Special Considerations for NVMe Drives
NVMe SSDs (the M.2 drives that connect directly to PCIe lanes) use a different command protocol than SATA drives. The traditional ATA Secure Erase command doesn’t apply to NVMe drives because they don’t speak the ATA protocol.
Instead, NVMe drives support NVMe Format and NVMe Sanitize commands. The NVMe Format command with the “User Data Erase” or “Cryptographic Erase” setting is the NVMe equivalent of ATA Secure Erase. The NVMe Sanitize command works the same way as described earlier.
On Linux, you can use the nvme-cli tool to issue these commands directly from the terminal. The command looks something like: nvme sanitize /dev/nvme0 -a 4 (where -a 4 specifies Crypto Erase). This is a power-user approach, but it’s completely free and very effective.
What About DBAN? Can’t I Just Use That?
DBAN (Darik’s Boot and Nuke) is a legendary tool for wiping hard drives, but it’s not suitable for SSDs. DBAN works by repeatedly overwriting every sector on a drive with random data. On a mechanical hard drive, this is effective because the data is stored magnetically and overwriting it truly destroys the original.
On an SSD, DBAN can’t reach the over-provisioned space, doesn’t interact with the drive’s wear leveling, and will just burn through write cycles unnecessarily. It might look like it worked, but data fragments can survive in areas DBAN never touched. Stick with the tools and commands described above.
Verifying the Erase Worked
After performing a secure erase, you can verify it worked by running a data recovery tool like PhotoRec (free and open source) against the wiped drive. If the erase was successful, PhotoRec should find nothing, or at most, return random noise and unusable fragments.
You can also check the drive’s status using hdparm on Linux. After a successful ATA Secure Erase, the drive should report itself as not frozen and in a clean state. In Parted Magic, the Erase Disk tool will confirm completion with a success message.
Frequently Asked Questions
Can I securely erase an SSD that’s connected via a USB enclosure?
Sometimes, but it’s unreliable. Many USB-to-SATA and USB-to-NVMe enclosures don’t pass through ATA Secure Erase or NVMe Sanitize commands properly. The USB bridge chip in the enclosure often blocks these low-level commands. Your best bet is to connect the SSD directly to a SATA port on your motherboard or insert an NVMe drive directly into an M.2 slot. If you absolutely must use USB, try Parted Magic, as it has better luck with pass-through than most other tools.
Will a secure erase damage my SSD or reduce its lifespan?
No. A proper firmware-level secure erase (whether ATA Secure Erase or Sanitize with Crypto Erase) doesn’t write data to every cell. It typically just destroys the encryption key or resets the NAND cells electronically. This counts as one program/erase cycle at most, which is negligible compared to the thousands of cycles modern NAND can handle. It’s far less wear than running DBAN or manually overwriting the drive with random data.
Can I securely erase my SSD if it’s the boot drive with Windows installed on it?
Not while Windows is running from it. You’ll need to boot from a different source, which is why most tools create a bootable USB drive. Parted Magic, Samsung Magician’s bootable erase feature, and similar tools all work this way. Boot from the USB, then erase the SSD while it’s not in use as the system drive.
Is factory resetting a laptop the same as securely erasing the SSD?
Absolutely not. A factory reset through Windows (Reset This PC, even with the “Remove everything” and “Clean the drive” options) does not perform a firmware-level secure erase. It performs a software-level overwrite of the visible partitions, which misses over-provisioned space and wear-leveled cells. It’s better than a quick format, but it’s not truly secure. If you’re selling a laptop and want the data gone for good, remove the SSD, erase it properly using one of the methods above, then reinstall it and do a fresh Windows install for the buyer.
Final Recommendations
If you own a Samsung, Crucial, or WD SSD, start with the manufacturer’s tool. They’re free, relatively easy to use, and specifically tested for their own hardware. Samsung Magician is the most polished of the three.
For everything else, or if you want a single reliable tool in your kit, buy Parted Magic. It’s the Swiss army knife for SSD erasure, and it handles edge cases better than anything else I’ve used.
Don’t skip this step when selling or donating a drive. A few minutes with the right tool is all it takes to make sure your personal data doesn’t end up in a stranger’s hands.
James Kennedy is a writer and product researcher at Drives Hero with a background in IT administration and consulting. He has hands-on experience with storage, networking, and system performance, and regularly improves and optimizes his home networking setup.



