@Dashrender said:
Actually, there is another way.
If you use full disk encryption from day one, once you delete the encryption key you don't have to worry about it.
Any encryption can be broken. That is why the article I linked talks about getting verified information from the vendor.