When you normally delete a file, it doesn't actually delete it, to save time it just marks the space as free, so any new files can be written into that part of your drive.
But the actual data just remains there until a new file is written to the storage.
SecureErase does the second part without making an actual file.
Erase takes the address off your mailbox and leaves the mail in it for the next resident to use. Secure erase opens it and scritches off all the words from your mail. Takes time though.
Your disk is like a file cabinet, there's also an index folder where for example it says that "your file.txt" is in cabinet C7. You go there and there's a sheet of paper written in pencil with the contents of your file. In this analogy here's how several solutions work:
Delete the file: throw away the index folder. Now if you need to write to disk you might think C7 is free and when you go there to write something else you find the old paper, which you erase and write on top. But if someone gets to your cabinet before that and they open C7 your file Will be there in its entirety, there just isn't an index telling you which cabinet to open.
Zero wipe: you go to C7, erase the file, and then throw away the index. Now if someone gets to your cabinet they might go to C7 but all they see is a white sheet of paper. However it's technically possible with a white sheet of paper to see what was written before, so this is considered better but not perfect.
Random wipe: same as before, except you erase and write random stuff on the sheet of paper. So it becomes a lot more difficult to recover what was there.
Multiple passes: Same as before, but you do this several times, so after dozens of random writes your original data should be completely impossible to recover.
It's worth mentioning that the OS index is what gets deleted when a file is deleted, the SSD is untouched by this, but SecureErase is a special command sent to the SSD controller inside the unit that deletes its own index of what entries correspond to which 1s and 0s on which separate internal NAND flash chips (and dies, planes, blocks and pages) and in what order. This makes recovering data very very difficult even if the actual data is not overwritten in any way, because SSDs will often write in parallel for speed, which renders the oldest most bruteforcry digital forensic technique in the book on HDDs - simply transplanting the platters into a different drive, imaging them into hex and looking for file headers and subsequent zeroes (to identify empty space after a file) and reading in files as if they were written linearly to see what comes out.
Most of these answers are mostly right: deleting a file on disk doesn't actually erase the data, it just marks the space as available to write over - meaning that so long as nobody's used the space since, you can go retrieve the contents with an undelete utility.
Most of the time, people don't care - but if for instance you're selling the PC or there's highly sensitive information involved, that might not be good enough.
As such, there are utilities that can go out and specifically overwrite the contents of a file with all zeroes, so ensure that it's dead-dead - and there are other utilities that can do the same to an entire disk.
There's one wrinkle: Magnetic HDDs don't reliably erase and overwrite completely in a single pass; just like rubbing out pencil writing, it can leave faint impressions under the new content, and it is actually possible (with serious effort by forensic recovery people) to glean some of the previous content. If there's serious money / security at stake, a simple overwrite is not enough, so there's software that certifiably-randomly scribbles over each bit, seven times over, making the chances of recovering the original astronomically slim. Again, this can be done for individual files or the entire disk.
SSDs aren't prone to leftover impressions, thankfully - what's gone is gone. And they have one other neat feature: while a magnetic disk can only be erased one bit at a time, so large disks can take hours - SSDs can just open the floodgates and ground every cell at once, fully erasing the entire disk in an instant.
This instant-erase, while comprehensive... returns before you've even taken your finger off the ENTER key, so fast it feels like it can't possibly have done anything, it must be broken, how can I trust it? So BIOS manufacturers hype it up, call it something impressive to underline that it's big and powerful, and actually impose a 10-second countdown to make it feel like it's doing something complicated.
Any of these different things have been called 'secure erase' at various points, so it's a little context dependent. But from the end-user perspective: this data is getting shredded then incinerated then added to cattle feed; it's not coming back.
No one has ever recovered overwritten data, as far as anyone can tell. Go look it up. The technique was only a theoretical attack on ancient MFM/RLL hard drive encoding (Gutmann's paper). Even 20 year old drives' (post 2001, approx) magnetic encoding are so small there isn't an 'edge' to read on the bits. A single pass of random data is sufficient to permanently destroy data, even against nation-state level actors. Certainly enough for personal data.
Most of the patterns in the Gutmann method were designed for older MFM/RLL encoded disks. Gutmann himself has noted that more modern drives no longer use these older encoding techniques, making parts of the method irrelevant. He said "In the time since this paper was published, some people have treated the 35-pass overwrite technique described in it more as a kind of voodoo incantation to banish evil spirits than the result of a technical analysis of drive encoding techniques"
NOW THAT BEING SAID there is no harm in doing a secure, 35-pass overwrite other than the time, energy and disk wear. If watching all the bit-patterns of a DoD-level wipe using DBAN on a magnetic disk tickles your fancy, or you think this is a CIA misinformation campaign to get people to do something insecure so they can steal your secrets, please just go ahead and do a 35-pass overwrite with alternating bit patterns followed by random data. I can tell you that I believe in my heart-of-hearts, that one pass is sufficient.
Interesting. We mostly use DBAN at work because it's a one-button process you can walk away from, and it has drivers for hardware old enough that we're disposing it. Nobody's ever selected the fancy super-paranoid stuff as far as I know.
If the hardware won't boot, we take a layer-1 approach instead :D
There’s one wrinkle: Magnetic HDDs don’t reliably erase and overwrite completely in a single pass; just like rubbing out pencil writing, it can leave faint impressions under the new content, and it is actually possible (with serious effort by forensic recovery people) to glean some of the previous content.
No, it's not. At least it has never been done on more than single bits, with an accuracy higher than 50% (which means even when trying to restore a single byte, your chances of it being correct are 1/256).
Your storage is like a book, with an index at the beginning. This index tells whatever computer reading it “the contents of “Math Homework 5.odt” start on page 100 and ends on page 125”, for example.
When a new file needs to be stored, the computer only has to quickly read the index, find a spot in the book with empty pages, and write the file on those pages.
Nkw, when you delete a file, the computer will only erase the index, which is much quicker. Math Homework 5.odt is gone so more another file can be written onto pages 100 through 125!
A thief getting their hands on your storage could still read the part with your file's content on it, though, so it's not safe!
“Secure delete” means the computer will not only erase the index entry, but even every letter from every page related to your file's content. This takes a long time, but a thief trying to read those pages will simply see blank pages, so that's why it's safe!
Normal delete just marks things as deleted, freeing up that space to be overwritten later, but the original data is still there until it is overwritten. Secure delete overwrites the data with random 1's and 0's, so it is actually gone and can't be recovered. It's the difference between throwing a physical document into the trash, but not taking the trash out, or instead putting the physical document through the shredder and then burning the shredded paper. In the first example anyone with access can reach into the trash can and read your document, and in the second example it's unrecoverable.
With an HDD, your operating system can (mostly) directly access bits on the magnetic disks, so you can wipe them by just writing 0 to it over and over (historically, there was a paper saying 7 times would make any bits unrecoverable - this changed as density got higher)
With SSDs, your operating system has very little control over what bits a write is touching, a lot more was moved into the firmware on the flash memory itself
So SSDs need a special command “Secure Erase” to wipe them
It's worth it to mention that after a single pass it was possible to recover single bits with an electron microscope, but not even a full byte. One pass has always been enough to delete actually meaningful data.
One thing other answers have missed is that some ssds encrypt data before writing and obviously after reading (this prevents a swap the storage controller type attack) A secure erase on such a device consists of changing the read/write key. Takes milliseconds. Irrevocable (unless you find a way to read previous contents of the key storage)
If your hard drives are encrypted then it doesn't delete the data, it deletes the encryption key which makes the data effectively unrecoverable, while others will take the existing ones and zeros of data and turn them all into ones, then turn them all into zeros and repeat 3 or 4 times just to be sure.
Computers use an address to tell it where the data is stored on your memory drive
Erase just deleted the address referencing the location, meaning other things can overwrite it.
Secure erase actually deletes the address and overwrites the data that was at where the address was pointing to. Sometimes it’s all zeros, some programs will write random crap over it
I’ll take a shot at the metaphor.
Delete: telling someone they can use the whiteboard (but you didn’t erase it)
Secure: cleaning it off when you’re done for the next user.
Less of an option and more of choosing the right tool to do the trick.
In day-to-day life I might not care how files are deleted. But when I intend to sell my drive on ebay or so I would make sure that really all the data ia gone.
There's a map that shows where every file on your disk is. Doing a regular trash just erases the map pointer for that file, but the 1s and 0s that the file is made of are still sitting there on your disk. Secure erase writes 0s into that area on the disk, so even if you knew where that file used to be located on the disk, now you'll just find 0s there, instead of finding the 1s and 0s of the old file.