One of the problems that concerned me about SSD technology was the issue of securing the data on the drive, particularly keeping the deleted data from being recoverable. Since I maintain extensive financial information on various units, the ability to move it in and out of encrypted areas/partitions with secure deletion is very important.
Whether intended or not, from my understanding of TRIM and how SSDs retain/delete data, with TRIM enabled, the problem of overwriting deleted files to make sure they are not recoverable in the case of theft, etc. is possibly solved. Currently I use a tool like Webroot's WindowWasher to clean and overwrite files on conventional HDs to security standards, but this won't work on an SSD due to data being spread over the entire SSD memory instead of located in a specific physical area of a conventional hard drive. However, with TRIM working in the background, it will automatically be done. When the single overwrite by TRIM clears the data in each cell, it's done permanently, since once "the well is dry" or the cell's storage is cleared, it's not recoverable by current technology.
The only issue is the speed with which TRIM works, and that probably depends on how much idle time is available after the file deletion process is initiated by the user. However, from what I hear, TRIM should be able to be initiated manually, and that would be the best practice for critical data security situations. What are other member's opinions on this and suggestions for maintaining SSD security?
Whether intended or not, from my understanding of TRIM and how SSDs retain/delete data, with TRIM enabled, the problem of overwriting deleted files to make sure they are not recoverable in the case of theft, etc. is possibly solved. Currently I use a tool like Webroot's WindowWasher to clean and overwrite files on conventional HDs to security standards, but this won't work on an SSD due to data being spread over the entire SSD memory instead of located in a specific physical area of a conventional hard drive. However, with TRIM working in the background, it will automatically be done. When the single overwrite by TRIM clears the data in each cell, it's done permanently, since once "the well is dry" or the cell's storage is cleared, it's not recoverable by current technology.
The only issue is the speed with which TRIM works, and that probably depends on how much idle time is available after the file deletion process is initiated by the user. However, from what I hear, TRIM should be able to be initiated manually, and that would be the best practice for critical data security situations. What are other member's opinions on this and suggestions for maintaining SSD security?