So I'm currently learning more about NVMe drives that ship with a feature called SED (Self Encrypting Drive). Take the Smasung 970 EVO for instance. It clearly states that it features SED.
The 970 EVO provides multiple advanced data encryption features. Self-Encrypting Drive (SED) security technology will help keep data safe at all times. The 970 EVO includes an AES 256-bit hardware-based encryption engine to ensure that your personal files remain secure. Being hardware-based, the encryption engine secures your data without the performance degradation that you may experience with software-based encryption. Also, the 970 EVO is compliant with various advanced security management solutions (TCG Opal and Encrypted Drive-IEEE1667).
Usually these drives come with an encryption key preinstalled from the factory that the Encryption Engine utilizes. And apparently older SSD's the normal 2.5" drives can utilize something called "ATA Sanatize" which is a feature that comes with software such as PartedMagic. And it's suppose to generate a new key. Not sure how and I would love for someone to explain how it does it.
Nevertheless..
Since NVMe drives don't support ATA Sanitization, how would you generate a new key? There is a feature that PartedMagic offers called "NVMe Secure Erase - Erase entire drive at the hardware level" and I'm not sure if that's the same.