"Parted Magic" can be used to perform a Secure ATA erase. I do it on my rMBP. In addition to wiping data, it also restores the SSD's factory-fresh performance. Not sure this is comparable to writing zeroes or any other erase procedure.
It's not comparable.
Writing zeros needs to be done on magnetic media such as a drive with spinning platters. You write zeros over the sectors on those platters to overwrite any data that's there. The more passes you make, and if you randomize the data too (not just do zeros), then the more "secure" the "erase" is.
Flash storage is different. Something like PartedMagic is a decent tool to use, because its disk erase utility has the ability to send an ATA secure erase command directly to an SSD's controller, which (in theory) should erase everything. There is no magnetic media with flash storage. It's just 1's and 0's stored in memory cells. The issue with flash is that an SSD's controller can mark a cell as bad, even though technically it's still working ... Just "failing", which makes it no longer accessible by a user. The data's still there. Using legacy format or those traditional "secure erase, multi pass" methods will not erase the data that's there. Only the SSD's controller can do that ... Hence the need to send that ATA secure erase command to the controller.
But wait, there's more. In the early days of SSD's, somewhere like 4-6 years ago or even earlier, not all SSD manufacturers followed the ATA specs when they made their products. If I remember right, early Sandforce controllers were bad for this. So, even if you passed a secure erase command to the controller, it wouldn't actually erase all the data that was in any region not accessible by the user. I believe all of that's been dealt with these days, so that it's most likely not a concern today, but as a general rule of thumb, if you want to be certain your data is gone, then encrypt it all before you erase. Then, maybe cross your fingers and pray that there's no unencrypted data in areas that are not accessible by anything except the drive's controller.
Of course this is all kinda silly anyway, because you would have to be a pretty important individual or have some sort national security type data on your system in order for it to be important enough for it to be worth the effort of person with the skill and know-how to get data from those hidden regions of flash memory, and anybody in that position that would have that type of data on a portable system that is taken outside of a secure facility (even if it's encrypted) should probably be fired, but that's veering off-topic.
Encrypt it, then boot into recovery, repartition and format.