Watch this video on YouTube
Which approach to data removal involves the destruction of keys rather than the actual deletion of data?