Unfortunately, the erase block size is usually 4MB or so. Therefore, while it's *better* to do a full trim of all logical volumes/partitions on the drive immediately after deleting and/or "overwriting" sensitive data you wish to be erased, it's very difficult to really erase "overwritten" data on the drive. That's why I always recommend using both software encryption (LUKS) and hardware encryption (an OPAL supporting SSD with either OPAL enabled via sedutil or ATA password under the OPAL compliance requirements).
As implied above, trim does not guarantee immediate erasure. However, it increases the likelihood of the block in question being erased sooner by ensuring:
a) that part of the block is marked as no longer in use and
b) as many other blocks are marked as no longer in use as possible.
The background "ssd filesystem layer processes"* on contemporary drives seeks out partially used flash blocks and, for slowly-changing data areas, combines them into more fully used blocks, reaping the remaining no-longer-used 4MB content by erasing the physical flash blocks. This assures a higher amount of empty, fully-writable flash blocks available for the next peak write session.
If you're paranoid (and some should be) - rather than reinstall, I'd recommend the following:
a) ata secure erase or ata sanitize a new SSD drive of the same size and type;
b) make the LUKS password change as above;
c) clone your current drive onto the new, erased drive (don't reverse this by accident...);
d) swap the new drive for the old drive;
e) boot up the new drive a few times and use it for a while to make sure it works;
f) ata secure erase and/or ata sanitize the old drive. I usually do an ATA Secure erase, an ATA Sanitize Crypto Scramble and then another ATA secure erase. Very quick.**
g) validate that the old drive is erased.
Brendan
*this is the internal filesystem of the drive that maps physical flash blocks into a series of logical blocks to optimize wear leveling, avoid write amplification, etc..., not your user-exposed filesystem.
** when thinking more paranoid, I do: a) ata secure erase, b) write data to a randomly-chosen block x, c) ata sanitize crypto scramble, d) verify that many sample blocks are still zero but block x and sometimes some adjacent blocks (depending on manufacturer/controller) now appear to have non-zero randomized data in it/them because the drive's user area key has been changed, e) ata secure erase.
It's not /dev/sda2. Could you help me with getting this figured out? I did a 'lsblk' on dom0 and the luks is attached to nvme0n1 > nvme0n1p1 > nvme0n1p2. Is any of these the partition? If not how can I determine this correctly?
Thank you.
Thank you