The New iShredder™ 2
Shred it like a Pro!
Another breakthrough from the
market leader in data erasure
of iOS devices.
unwanted files to the Nirvana on the
iPhone, iPad, or iPod touch with ease.
Selling or giving away
your Apple™ device?
You'll want to destroy all the files on it first – without a trace.
Before you sell or give away your iPhone, iPad, or iPod touch,
you'll need to make sure that all your personal files on the device
have been blitzed beyond recovery.
It's dead easy to restore supposedly deleted files from the memory on your Apple™ device these days – files containing notes, passwords, address book, photos, videos, calendars, bookmarks and more.
"Deletion without trace in
three easy steps"
You might think you've deleted those photos and videos on your iPhone
or iPad, but anyone can restore those manually deleted files from the free
space on your device until the free space itself has been overwritten using
secure deletion algorithms.
It takes just three simple steps to overwrite that free space using patented security standards, making it impossible to rescue any deleted files.
First, open ProtectStar™ iShredder™
Second, select a secure deletion algorithm
Third, start the deletion process
"Like a state-of-the-art paper shredder,
this tiny program goes beyond
international security standards."
ProtectStar™ iShredder™ surpasses international standards used
by state and military organisations in secure file deletion with
a wide selection of tried-and-trusted state-of-the-art deletion
Each algorithm has been analysed by authorities and independent organisations to make sure it really does what it says on the tin – data destruction beyond redemption.
Depending on the edition, the iShredder™ package comes with deletion algorithms such as DoD 5220.22-M E, US Air Force (AFSSI-5020), US Army AR380-19, DoD 5220.22-M ECE, BSI/VS-ITR TL-03423 Standard, BSI-VS-2011, NATO Standard, Gutmann, HMG InfoSec No.5, DoD 5220.22 SSD and others.
Available in four editions
Apple AppStore Volume Purchasing
for your Business
Whether you’re providing apps to ten employees or ten thousand, the Volume Purchase Program makes it simple to buy, and distribute the ProtectStar apps your business needs.
Please note that ProtectStar sells on a per device basis, not on a per user basis. For every single device in your company you need to purchase one license.
Awards and recognition.Has won several awards.
Have peace of mind. ProtectStar™ iShredder™ is the easiest and most secure software for your security
From US$ 2.99Get it on the AppStore
See the most frequently asked questions.More Info
Learn more about the wiping methods.More InfoThe software erases all existing data including confidential, secret and top-secret security level data.
With ProtectStar™ iShredder Standard (only select methods are available) and ProtectStar™ iShredder Professional (all methods are available) users can choose from the following different secure deletion methods:
US Air Force AFFSI-5020
The AFSSI-5020 sanitization method was originally defined in the Air Force System Security Instruction 5020 by the United States Air Force (USAF) in 1996 and may still be today.
US NAVSO P-5239-26 (RLL)
This is the US Navy standard NAVSO P-5239-26 for RLL encoded drives. This deletion method first writes the fixed value (0xffffffff) to the target data area, then the fixed value (0x27ffffff) and then random values. Finally, the target data area is read to verify the overwrites.
US NAVSO P-5239-26 (MFM)
This is the US Navy standard NAVSO P-5239-26 for MFM encoded drives. This deletion method first writes the fixed value (0xffffffff) to the target data area, then the fixed value (0xbfffffff) and then random values. Finally, the target data area is read to verify the overwrites.
The German Federal office for IT Security (BSI) describes in the technical BSI guideline for 'Requirements to overwrite memory media' from July 2010 the modern method BSI-2011. This clause includes 5 steps, which is implemented in sequential order.
50 Cycles: ProtectStar™ Secure Deletion Algorithm©
Is one of the best such algorithms available today. It carries out 50 deletion processes and in a manner that complies with all international data security standards.
35 Cycles: Gutmann
The secure erase method from Peter Gutmann makes 35 overwrite passes in total, and is considered one of the state-of-the-art methods for data destruction.
8 Cycles: German BSI / VS-ITR Standard (TL-03423)
In March 2010 the German Federal office for IT Security (BSI) published a new method which is to VSITR standard for magnetic storage media. In total the new algorithm has 8 cycles, which have to be worked through in chronological order.
7 Cycles: DoD 5220.22-M ECE
The method is based on the January 1995 'National Industrial Security Program Operating Manual' by the U.S. Department of Defense (DoD).
4 Cycles: DoD 5220.22-M E for Flash
This method is specially developed for flash memory, based on the U.S. Department of Defense's standard DoD 5220.22-M E.
3 Cycles: HMG InfoSec. No. 5
The HMG Infosec Standard No 5 - enhanced level is approved to wipe UK Government Top Secret data and has also been approved by NATO. The algorithm is a three pass overwriting algorithm: first pass - with zeros (0), second and third passes with its complementary and random values(with last pass verification).
3 Cycles: US Army AR380-19
AR380-19 is the data shredding algorithm specified and published by the U.S. Army.
3 Cycles: DoD 5220.22-M E
This method is for low security but for high execution speed is based on the January 1995 'National Industry Security Program Operating Manual' from the U.S. Department of Defense.
1 Cycle: It overwrites data once with a random pattern
This method is specially developed for flash memory. It offers one cycle in which data are overwritten with a random pattern.
1 Cycle: It overwrites data once with the pattern 0xff
This method is specially developed for flash memory. It offers one cycle in which data are overwritten by the pattern "0xFF".
- US Air Force AFFSI-5020
Whenever or wherever you need outstanding customer support.Get Assistance