BackBlaze: Best way to securely wipe data on SSDs involves throwing away the encryption key

The easiest way to make sure data on an old SSD is no longer accessible, is by encrypting all data, according to cloud storage service BackBlaze. Users who want to recycle or get rid of their SSD should encrypt the data and throw away the encryption key if they want to make sure nobody can gain access to current or even deleted data.

This is a companion discussion topic for the original entry at

A question: Most SSD-manufacturer/Rebadger offers a SSD-Tool which offer Secure Erase or Sanitize. Is there a difference to the way you describe?

AFAIK Secure Erase also delete the data in for users non-accessible areas like Pseudo-SLC-cache

I would think that overwriting the data multiple times (with zeros or random data) would do the trick. If overwriting the data doesn’t work the first time, additional times would probably do the trick. Of course, I could be wrong.

Sounds more o used on a HDD because some say if it is only overwritten one time theres still some sort of remance which could be read with the right machine.

SSD is completely different, no remanence.

The trick with fill it by zeros or some trash data should be also work but a Secure Erase wold be easier if the SSD-manufacturer offers a tool.