The method that offers the highest level of security is based on a process developed by Peter Gutmann and presented in his article “Secure Deletion of Data from Magnetic and Solid-State Memory”. In this method, deleted data is overwritten by a series of 35 different deletion cycles that are executed in a random order.