Data sanitization is one of the topics Iād like to have a systematic and comprehensive guide for since it is very difficult to achieve and verify properly.
There are many things to consider including, but not limited to, your specific threat model(more specifically, the amount of resources and technology your adversary is capable of utilizing and the expected value of your data when recovered), the type of your storage media (SSD, HDD, USB, CD/DVD, paper, etc), and the degree of sanitization (clear, purge, destroy).
One of the best references in data sanitization is the NIST SP(special publication) 800-88 Revision 1.
IEEE also published a more recent standard for storage sanitization(IEEE 2883-2022) with related draft recommendations. I strongly recommend that anyone who plans to perform a proper data sanitization go through the two papers above.
Also, the VeraCrypt official documentation has some pretty practical information regarding difficulties and caveats of data sanitization(TRIM, wear-leveling, reallocated sectors).
Encryption(especially full-disk encryption) greatly helps data sanitization through a method named cryptoshredding(=cryptographic erasure).
A simple format of a disk drive can neither sanitize data nor protect a disk from forensics, since it simply *marks* the disk as empty, while leaving the actual data in place.
One easy way to overcome this issue is to perform a low level format which overwrites the whole disk with zeroes(binary bit 0).
However, due to the variety of manufacturing vendors and many ancillary technologies implemented and hardwired into the device to prevent data loss (e.g., overprovisioning space, wear-leveling, TRIM, reallocated sectors), this method many not completely overwrite all sectors fully.
AFAIK, there is no single-best universal option that could be applied to all devices. Instead, you should extensively search for the method that best suits your very specific situation.
If youāre okay with closed-source softwares, the built-in sanitization tool of your BIOS, or the manufacturerās management tool(e.g., Samsung Magician, SK Hynix Drive Manager, Western Digital Drive Utilities) is a good option, although they still might not be perfect due to inappropriate implementation of technologies (pretty sure I saw an article regarding this, but canāt find the exact source. please let me know if you find any).
The best open-source tool for data sanitization Iām currently aware of is ShredOS. Although it has some compatibility issues, it uses official commands that are documented in the specifications of the hardware (such as ATA secure erase, NVMe-sanitize, etc).
Additionally, Linux users can directly issue a sanitize command to their NVMe using the NVME-cli
Data sanitization is extremely difficult to achieve perfectly unless you physically destroy the device (which renders the storage media unavailable for reuse).
However, unless your threat model is a nation-wide actor that is capable of utilizing state of the art technologies with nearly infinite resources and time, I believe a single or twice low-level format, or a simple format of a VeraCrypt-encrypted disk is more than sufficient for most people.
In short, if you need absolute data sanitization, throw it into a blast furnace.
Otherwise, just do a clean all
on cmd(or maybe SDelete, Cipher.exe?)