speaker20 YearsProtectstar celebrates its birthday. Find out what’s waiting for you!Learn more

The Guide to Secure Data Erasure: iShredder™ and the 4-Cycles Protectstar ASDA Erasure Method

The Guide to Secure Data Erasure: iShredder™ and the 4-Cycles Protectstar ASDA Erasure Method
July 10, 2023

As our lives become increasingly connected, so does our data's risk. Your sensitive information, personal or professional, is more vulnerable than ever to potential breaches and theft. Consequently, data security is paramount, and knowing how to delete that data securely is a fundamental part of this equation.

This article introduces you to secure data deletion with iShredder™, a leading data shredder app, and its 4-cycles Protectstar ASDA erasure method.


The Rising Importance of Data Security

Your device carries sensitive information, from private texts and emails to business-related documents and passwords. Data breaches are rampant in our connected world and can cause devastating damages at the individual and organizational levels. These damages range from financial loss and identity theft to severe reputational harm and regulatory penalties for businesses. It's not just external threats to worry about, either. Suppose you're planning to sell, donate, or recycle your device. In that case, you need to ensure that all your personal and sensitive data is not just deleted but permanently erased and irretrievable. The last thing you want is for your private information to end up in the wrong hands because it was inadequately erased from a device you no longer control.

 

iShredder™

iShredder™ is the gold standard in secure data erasure. This data shredder app, compatible with iOS, Android, Windows, and Mac, is trusted worldwide by defense departments and government agencies. Offering military-grade data deletion, iShredder™ ensures that your data is completely overwritten and unrecoverable.
When you delete a file manually, the data can still be recovered from your device's free space. This is because the operating system removes the file's association, marking the corresponding sector as 'free' but leaving the data intact. iShredder™, with its advanced deletion algorithms, ensures your files or storage space are overwritten beyond recovery, safeguarding your privacy in the process.

The Power of iShredder™ lies in its more than 20 certified deletion algorithms, which exceed international government and military security standards for secure data erasure. Each deletion method has been thoroughly analyzed by authorities and independent organizations for its security and effectiveness, ensuring your data is irretrievably destroyed.

These erasure algorithms include, but are not limited to, the DoD 5220.22-M E, U.S. Air Force (AFSSI-5020), U.S. Army AR380-19, NATO Standard, CSEC ITSG-06, and HMG InfoSec No.5. Each of these algorithms employs complex techniques to overwrite data, making recovery virtually impossible.

For instance, the DoD 5220.22-M E algorithm, widely used by the U.S. Department of Defense, overwrites data multiple times with different patterns, leaving no traces behind. Similarly, the NATO Standard or the U.S. Army AR380-19 applies sophisticated methods to overwrite data, ensuring your sensitive information remains secure and unrecoverable.


Securely Erase Before Selling or Giving Away Devices

If you plan to sell or give away your smartphone, tablet, P.C., laptop, or Mac, securely erasing the data stored on your device is a non-negotiable step. iShredder™ ensures that even data that appears to have been deleted, such as notes, passwords, address books, photos, and videos, are securely erased and irrecoverable by third parties. This keeps your privacy intact and prevents the misuse of your sensitive data.

Standard deletion processes may appear effective on the surface, but they leave behind data fragments that can be pieced together using specialized software or hardware tools. This is where iShredder™'s military-grade secure deletion methods come into play. By overwriting your data multiple times, iShredder™ ensures your sensitive information is entirely obliterated and irrecoverable, thus keeping it secure.

iShredder™ provides more than just secure data deletion. It also includes erasure reports as proof of deletion. These reports offer auditable and verifiable assurance that all data has been purged according to published standards like GDPR, U.K. Government InfoSec No. 5, U.S. DoD, and NIST 800-88.

 

Customizable, User-Friendly, and Trusted by Businesses

iShredder™ offers a host of customizable settings to suit your specific needs. You can choose from multiple deletion algorithms based on your security requirements or adjust the number of overwrite passes to balance speed and effectiveness.

Businesses that handle sensitive data can trust iShredder™ for securely deleting customer information, financial records, and confidential data, ensuring it cannot be recovered and misused. This helps businesses maintain their reputation, comply with data protection regulations, and reduce the risk of costly data breaches. Designed to be user-friendly, iShredder™'s intuitive interface lets you securely delete files, folders, or free memory space with just a few taps or clicks. Moreover, step-by-step instructions guide you through the deletion process, making it accessible to beginners and experienced users.

 

4-Cycles Protectstar ASDA Erasure Method: The Gold Standard of Secure Deletion

One of the newest additions to iShredder™'s deletion methods is the 4-Cycles Protectstar ASDA erasure method. This advanced secure deletion algorithm, developed by Protectstar Inc. in 2017, replaces the older Secure Deletion Algorithm and includes four steps processed in sequential order.

  1. In the first pass, all data is overwritten with the pattern “0xff”.
  2. The second pass completely encrypts the blocks using the 256-bit AES (Advanced Encryption Algorithm).
  3. The third pass completes written data verification alongside secure deletion with the pattern "10010010, 01001001, 00100100". Any sectors or blocks read or verified incorrectly are documented in the erasure report.
  4. Finally, the last pass overwrites all data with a random pattern. High-quality random numbers generated based on Federal Information Processing Standards (FIPS) are used.


Each pass of this method adds a layer of security to the deletion process. The repeated overwriting and verification, combined with encryption and the use of high-quality random numbers, ensure that the data is not just deleted but completely obliterated, leaving no chance for recovery.

The 4-cycles Protectstar ASDA erasure method makes iShredder™ the ultimate tool for secure data deletion. Whether you're an individual looking to protect your personal information or a business seeking to maintain compliance with data protection regulations, iShredder™ provides the robust security you need.
 

Learn more:
iShredder apps: https://www.protectstar.com/en/products/ishredder
Advanced Secure Deletion Algorithm: https://www.protectstar.com/en/secure-erase

 

Was this article helpful? Yes No
10 out of 10 people found this article helpful
Cancel Submit