Very interesting reply at the original link. Strikes me as credible (despite its cavalier approach to capitalization), but I am no expert on drive hardware.<br><br><a href="http://www.h-online.com/security/news/forum/S-True-but/forum-111495/msg-14370181/read/">http://www.h-online.com/security/news/forum/S-True-but/forum-111495/msg-14370181/read/</a><br>
<br>"""<br>considering the limitations of software or any overwrite process that<br>
uses the data interface of the drive to clear legacy information is<br>
limited by the technical limitations of this process. In many cases,<br>
any data in the HPS will not be modifiable unless the process is HPA<br>
aware and the process enables the host controller to facilitate<br>
access to this region. likewise, G-list sectors may not be accessible<br>
to most externally initiated overwrite processes. <br><br>[...]<br><br>
to address the need for a reliable and efficient purge based process<br>
that renders the processed device reusable, and void of all data<br>
beyond laboratory effort a good solution is Secure Erase. This<br>
technology is embedded in all ATA standard compliant hard drives<br>
manufactured since 2001. Although SE is an integrated purge level<br>
technology, the means to deploy it is a challenge. developed as a<br>
means for IT admins to have a reliable sanitization technology<br>
integrated in to every drive, the potential for SE to be exploited by<br>
virus, malware or malicious intentions was too significant to leave<br>
it unprotected. consequently SE can not be initiated reliably through<br>
the use of software, or on devices connected to their host.<br>"""<br><br>That's news to me at least.<br>