Since FDE encrypts unused disk space and all the disks space in general, this would make the use of wipe-tools like open source Eraser in theory no longer essential, but this wont keep anyone who has stolen your pre-boot password (or forcing it out of you) from restoring any of your previously deleted files which where not wiped. Ive tested it myself by first fully encrypting my disk and then normally delete some random files, then I checked the amount of restorable files, changed the pre-boot password, rebooted and checked again for restorable files and counted the files again and the numbers matched exactly, confirming this simple theory. So with a security and privacy prospective in mind, this solution is no longer as attractive as it first seemed, if you want to make sure your files are gone, a ++ solution would be a better idea but.... My question is: Can one still remain using Eraser or likewise tools in conjunction with Full Disk Encryption without having as a consequence, data corruption due to the wiping of unused disk space and or file's in general. Ive done allot of direct searches on multiple security and privacy related forums like this one, without ever posting the direct question myself, because my credo when it comes to Internet information gathering is, don't post before you search, because it is irritating when forums are flooded by the same questions over and over that are already answered. This time I didn't came up with right answer to mine. Probably because text that has anything to do with these sort of peculiar subjects get removed or mysteriously vanish from web pages (not all), including google's cache, or when using particular search terms the results are deliberately made hard to find via search engines.