IIRC, some of these programs use a strategy of writing some nonsensical data pattern to all the disk locations occupied by the undesirable file. Then those locations are tagged as available to be used/overwritten in the future.
I'm no expert, but, this method would seem to be safe for any file system.
If you find more info, keep us updated.