MarcelloM1973 wrote:
This is different.. SECRUELY ERASE had different options including 7-pass erase. This means not only deleting but writen random data then 000 then random data etc.. many times up to government secure standards. DELETE IMMEDIATLY is something else.. it just jumps the EMPTY TRASH part.
There is a way... for the future... to securely delete and it's to have the drive encripted from the beginning. So everything you delete will stay encripeted. But if you have a drive already up and running and you want to securely erase empty space... at present it can't be done.. and I don't know why they took it away
Multi-pass overwrite is intended only for magnetic storage devices such as traditional rotating hard disks, and is intended as a defense against sophisticated attackers that might use advanced equipment to directly access the magnetic platters on your hard disk with slightly offset head tracking, in an attempt to recover some of the data at the extreme margins of the data tracks. Hard disks have read-write heads, and these historically haven't been exactly aligned on track and can vary very slightly in their positioning. This means that the hard disk read-write data is always what's last written, but that the extreme edges of the area effectively between the tracks might have some minor magnetic remnants of previous data from that part of the disk. Older hard disks from the 1980s and 1990s had more slop and lower density than newer disks, too. Newer disks are rather more densely encoded, and tracking is necessarily more accurate.
Normal reads and writes cannot recover single-pass overwritten data. Again, without physically disassembling the disk and using some very expensive gear, overwritten data is not going to be recovered — outside of from bad blocks.
As for why Apple removed the option, it's because multiple-pass overwrites do not do what is expected on SSDs. Due to wear leveling and due the caching of erased sectors due to the glacial speed of erasure on SSDs, SSDs work completely differently from hard disks. SSDs aren't magnetic, and don't use heads that can be misaligned.
Volume encryption — FileVault 2 — avoids both the issue that multi-pass overwrites are intended to address, and avoids the problems with recovering data from bad blocks that overwrites can't address, and avoids the issues with how SSDs allocate storage. Use an encryption key that's long enough and arcane enough to avoid brute-forcing, obviously.
Various SSDs do support the TRIM command, and SSDs can also support device-level secure erasure. It'd be nice if some future version of OS X provided a path into the secure erasure for SSDs that implement it, but that's not currently available. Not that I'd entirely trust the firmware within some SSDs to implement the erasure correctly, either — hence volume encryption.
If you're a target for advanced attacks or are subject to HIPAA or other regulations — and given the prices of hard disks these days — encrypt your data, get more formal help for your particular situation, and consider simply destroying the storage devices. There are services that perform this sort of physical data destruction, and old disks just aren't worth much anyway. But encrypt your disks. For most folks and for most data, encrypted disks and a single-pass overwrite is sufficient.
Related threads — I've posted various links to additional supporting data here — from earlier discussions:
Re: I downloaded OS X El Capitan and lost my Secure Empty Trash, I just have Empty Trash. How can I get the Secure Empt…
Re: Erasing Hard Drive - No More "Secure" Options?