speakerNEW!iShredder iOS Enterprise is now available for Business users.Learn more

iShredder

iShredder

iShredder™

The #1 in Secure Deletion: Final data destruction for professionals and private users—so secure that even the military and government agencies rely on it.

Anti Spy

Downloads

4M+

App rating

4.9 star 477 reviews

Language

EN, DE, +17 more

OS

Android macOS Windows

go go

Top reasons to
Choose iShredder

check

Irreversible Deletion
Prevent sensitive data from being recovered later. iShredder™ removes files so thoroughly that even professional recovery tools fail.

check

Certified Deletion Algorithms
Whether it’s DoD 5220.22-M, BSI TL-03423, or other recognized standards—iShredder™ uses algorithms trusted by the military and government agencies alike.

check

Three Steps to Success
Simply select the data you want to erase, choose the deletion algorithm, and confirm with one click. Your data is securely gone.

check

Cleaning Temporary Files
iShredder™ also hunts down hidden caches, logs, and other leftovers. This frees up storage space and prevents unwanted data traces.

check

Perfect for Selling Your Device
No one should gain access to your private photos, passwords, or other information. With iShredder™, you can safely pass on your smartphone, tablet, or PC.

check

Deletion Reports & Documentation
For extra assurance, iShredder™ generates a detailed report for each deletion action—ideal for businesses that need GDPR-compliant records.

Military-grade
secure deletion

iShredder™ is the most popular data shredder for iOS, Android, Windows, and Mac. The app is equally suitable for beginners and professionals to delete data securely. Deletion report included.

iShredder™ deletes so securely with international military security standards that defense departments and government agencies use the technology.

iShredder iShredder

Irreversible Deletion in Three Steps

For example, suppose you have deleted files such as documents or photos. In that case, this manually deleted data can be recovered from the device's free space until the data has been securely overwritten using deletion algorithms.

In just three steps, your files or storage space will be overwritten according to patented security standards, and data recovery will be impossible:

Select the data you want to delete

Select the data you want to delete

1. Scan: Identify the files, folders, or storage areas you want to destroy.
next
Choose between 20 and more deletion methods

Choose between 20 and more deletion methods

2. Choose Algorithm: Opt for a certified erasure standard (e.g., DoD 5220.22-M).
next
iShredder

Begin to shred with one simple click

3. Confirm: One click is all it takes—your data is permanently wiped from storage.

Deleted Doesn’t Necessarily Mean Gone

Even after so-called “deletion” or “formatting,” a large portion of your files can still be recovered. iShredder™ shows you exactly what remnants lurk in free space and uses powerful routines to keep anyone from reconstructing those fragments.

Use the “Securely Erase Free Space” feature in iShredder™ to securely overwrite free space so that previously deleted data cannot be recovered.

iShredder iShredder

Certified deletion algorithms

With over 20 approved erasure algorithms, iShredder™ even exceeds international government and military security standards for secure data erasure. In addition, authorities and independent organizations have analyzed each deletion method for its security and to ensure safe data destruction.

Depending on the edition used, erasure algorithms such as DoD 5220.22-M E, U.S. Air Force (AFSSI-5020), U.S. Army AR380-19, DoD 5220.22-M ECE, BSI/VS-ITR TL-03423 Standard, BSI-2011-VS, BSI TL-03423, NATO Standard, CSEC ITSG-06, HMG InfoSec No.5, DoD 5220.22 SSD and others are available.

Choose method
  • 50 Cycles: Protectstar SDA (2007)
  • 35 Cycles: Gutmann method
  • 8 Cycles: German BSI TL-03423
  • 7 Cycles: NATO Standard
  • 7 Cycles: DoD 5220.22-M ECE
  • 7 Cycles: CANADIAN RCMP TSSIT OPS-II
  • 5 Cycles: BSI-2011-VS
  • 4 Cycles: Protectstar ASDA (2017)
  • 4 Cycles: DoD 5220.22-M E for SSD
  • 3 Cycles: Canadian CSEC ITSG-06
  • 3 Cycles: HMG Nr. 5 extended
  • 3 Cycles: AFSSI-5020
  • 3 Cycles: NAVO P-5239-26 (MFM)
  • 3 Cycles: NAVO P-5239-26 (RLL)
  • 3 Cycles: US Army AR380-19
  • 3 Cycles: DoD 5220.22-M E
  • 3 Cycles: NCSC-TG-025
  • 3 Cycles: NIST SP 800-88
  • 2 Cycles: RUSSIAN GOST R 50739-95
  • 1 Cycle: Australian ISM 6.2.92
  • 1 Cycle: 0XFF for SSD
  • 1 Cycle: Random Values
  • 1 Cycle: NIST SP 800-88 Rev. 1 (2014)

Specifically developed by Protectstar™ Inc. in 2007 it runs through fifty erasure routines.
Data will be overwritten for two times with a random value, afterwards with their complements. It includes and the DoD 5220.22-M (E) standard and Peter Gutmann method and random algorithms.

The algorithm from Peter Gutmann was found in 1996 and makes 35 overwrite passes in total.
This algorithm is one of the state-of-the-art methods for data destruction.

In March 2010 the German Federal office for IT Security (BSI) published a new technical BSI Guideline for "Requirements to overwrite memory media".
The method is similar to VSITR standard for magnetic storage media.
In total the new algorithm has 8 cycles, which has to be worked through in chronological order. Includes one cycle of verification.

The NATO method is the deletion standard of North Atlantic Treaty Organization (NATO).
It will overwrite the target data area 7 times.
The first six overwrites are with the fixed values (0x00) and (0xff), alternating between passes.
The 7th overwrite is with a random value i.e. 0x00,0xFF,0x00,0xFF,0x00,0xFF and 7th pass with a random value.

The method for high security is based on the January 1995 'National Industrial Security Program Operating Manual'by the Department of Defense (DoD).
In this seven cycle variation (DoD 5220.22-M ECE), data is first overwritten three times with DoD 5220.22-M (E) Standards, then with a specific random value, and finally once again with DoD 5220.22-M (E).

The Royal Canadian Mounted Police Standard RCMP TSSIT OPS-II overwrites data securely with alternating sequences with a total of seven cycles.

The German Federal office for IT Security (BSI) describes in the technical BSI guideline for 'Requirements to overwrite memory media' from July 2010 the modern method BSI-2011.
This clause includes 5 steps, which is implemented in sequential order.

This method is specially developed for SSD (Solid State Drive) and flash memory, based on the U.S.
Department of Defense's standard DoD 5220.22-M E. It will overwrite data four times.

This method is specially developed for SSD (Solid State Drive) and flash memory, based on the U.S.
Department of Defense's standard DoD 5220.22-M E. It will overwrite data four times.

The Canadian CSEC ITSG-06 sanitization method has three cycles and was published in 2006 by Communication Security Establishment Canada (CSEC).

The HMG Infosec Standard No 5 - enhanced level is approved to wipe UK Government Top Secret data and has also been approved by NATO.
The algorithm is a three pass overwriting algorithm: first pass - with zeros (0), second and third passes with its compliment and random values(with last pass verification).

The AFSSI-5020 sanitization method was originally defined in the Air Force System Security Instruction 5020 by the United States Air Force (USAF) in 1996 and may still be today.

This is the US Navy standard NAVSO P-5239-26 for MFM encoded drives.
This deletion method first writes the fixed value (0xffffffff) to the target data area, then the fixed value (0xbfffffff) and then random values.
Finally, the target data area is read to verify the overwrites.

This is the US Navy standard NAVSO P-5239-26 for RLL encoded drives.
This deletion method first writes the fixed value (0xffffffff) to the target data area, then the fixed value (0x27ffffff) and then random values.
Finally, the target data area is read to verify the overwrites.

AR380-19 is the data shredding algorithm specified and published by the U.S. Army.
The algorithm is a three pass overwriting algorithm: first pass - with random bytes, second and third passes with certain bytes and with its compliment (with last pass verification).

The method for low security but for high execution speed is based on the January 1995 'National Industry Security Program Operating Manual' from the DoD (US DoD 5220.22-M).
The variation (DoD 5220.22-M E) offers 3 cycles in which the data are overwritten with first a set value, then its compliment, and then a random value.

The American NCSC-TG-025 standard of the National Computer Security Center (NCSC) securely overwrites existing information on a data medium three times.

The in 2006 released standard is the Special Publication 800-88 from NIST, which is the go-to data erasure standard for organizations in the United States. Its principles can apply to magnetic, flash-based, and other storage technologies, from USB drives to servers.

The Russian data deletion standard GOST R 50739-95 for secure data erasure overwrites the target data are two tome. In the first pass with a zero, and in the second pass with random characters.

ISM 6.2.92 is the Australian government's data sanitization standard.
The method was originally defined in the Information Security Manual (ISM) issued by the Australian Department of Defense: Intelligence & Security.
The ISM 6.2.92 sanitization can not be used to sanitize classified information.

This method is specially developed for SSD (Solid State Drive) and flash memory.
It offers one cycle which data are overwritten by the pattern "0xFF".

This method for lowest security but for very high execution on speed. It offers only one cycle which data are overwritten with random values.

In December 2014, the guidelines were revised, making the current version “NIST Special Publication 800-88 Rev. 1”.

See here the description of the method you have selected.

Cleaning Up Temporary Data

What many people overlook are browser caches, log files, and other temporary storage. iShredder™ cleans these areas as well, giving you more free storage and protecting your privacy.

iShredder

You Want to Sell Your Device

Unknown security risk? No thanks!
Whenever you resell a smartphone, laptop, or tablet, there’s usually still a digital footprint of your personal data left behind. iShredder™ irreversibly deletes those traces, ensuring no stranger can access photos, passwords, or documents. That means you can hand over or sell your device with total peace of mind.

100% Confidence: Detailed Deletion Reports

After every deletion action, iShredder™ creates a comprehensive report with a timestamp, file list, and the algorithm used. This is your proof that the data truly is gone—ideal for businesses needing GDPR compliance (or UK Government InfoSec No. 5, U.S. DoD, NIST 800-88) or for private users who insist on top-notch security.

Erasure report

What people say about us

ishredder_android

4.9 review

477 reviews

4M+

Downloads

5 review
425
4 review
44
3 review
7
2 review
1
1 review
0

Trust iShredder™—the #1
in Secure Data Erasure.

Download iShredder™ for free now, or choose the edition (Free, Pro, Military, GOV) that best meets your needs.
Enjoy military-grade erasure protection without complicated settings.

free
pro
mil
gov

FREE

Best for new users who want to get acquainted with apps

$0.00
Unlimited
  • check Securely overwrite the freespace
  • check Secure freespace wipe of SD card
  • check Preinstalled standard deletion algorithms
  • check Wipe methods in total: 4
  • check Create and Export Erasure Reports

PRO

Best for users who want to have more advanced features

$7.90
per year (no subscription)
  • check Securely overwrite the freespace
  • check Secure freespace wipe of SD card
  • check Preinstalled standard deletion algorithms
  • check Wipe methods in total: 14
  • check Securely wipe SD card
  • check Secure delete external usb sticks, hard disk, etc.
  • check Securely Erase files and folders
  • check Securely Erase media files
  • check Securely Erase contacs and clipboard
  • check Create and Export Erasure Reports

MILITARY

Best for users who want the military-grade features

$12.90
per year (no subscription)
  • check Securely overwrite the freespace
  • check Secure freespace wipe of SD card
  • check Preinstalled standard deletion algorithms
  • check Wipe methods in total: 25
  • check Securely wipe SD card
  • check Secure delete external usb sticks, hard disk, etc.
  • check Securely Erase files and folders
  • check Securely Erase media files
  • check Securely Erase contacs and clipboard
  • check Additional Military Grade and Enterprise deletion methods
  • check Set default deletion method
  • check Password Protection
  • check Create and Export Erasure Reports

GOV

Best for experts who want to have all the benefits

$19.90
per year (no subscription)
  • check Securely overwrite the freespace
  • check Secure freespace wipe of SD card
  • check Preinstalled standard deletion algorithms
  • check Wipe methods in total: 25
  • check Securely wipe SD card
  • check Secure delete external usb sticks, hard disk, etc.
  • check Securely Erase files and folders
  • check Securely Erase media files
  • check Securely Erase contacs and clipboard
  • check Securely Erase SMS, MMS and call logs
  • check Additional Military Grade and Enterprise deletion methods
  • check Set default deletion method
  • check Password Protection
  • check Create and Export Erasure Reports
pro
military

PRO

Best for users who want to have more advanced features

$29.90
per year (no subscription)
  • check Secure erase of files, folders and partitions
  • check Secure cutting and pasting of files and directories
  • check Secure erase of external devices
  • check Smart secure erase wizard
  • check Secure erase of temporary Windows files
  • check Secure erase of temporary internet files
  • check Advanced deletion logs
  • check Special secure wiping algorithms for SSD & flash memory
  • check Protectstar™ Secure Deletion Algorithm
  • check Data Shredder for Solid State Drives
  • check 1 Year technical support
  • check 11 erasing methods in total

MILITARY

Best for users who want the military-grade features

$49.90
per year (no subscription)
  • check Secure erase of files, folders and partitions
  • check Secure cutting and pasting of files and directories
  • check Secure erase of external devices
  • check Smart secure erase wizard
  • check Secure erase of temporary Windows files
  • check Secure erase of temporary internet files
  • check Advanced deletion logs
  • check Special secure wiping algorithms for SSD & flash memory
  • check Protectstar™ Secure Deletion Algorithm
  • check Data Shredder for Solid State Drives
  • check Enhanced military deletion methods like NATO standard, US Navy NAVSO P-5239-26 , USAF AFSSI-5020 and CSEC ITSG-06.
  • check 1 Year technical support
  • check 18 erasing methods in total
pro
military

PRO

Best for users who want to have more advanced features

$19.90
per year (no subscription)
  • check Compatible with all models of MacBook, MacBook Air, Macbook Pro, iMac, iMac Pro and Mac Pro
  • check Secure data deletion up to the top secret security standard level
  • check Deletion algorithms like DoD 5220.22-M ECE, Peter Gutmann, DoD 5220.22-M, HMG Infosec No.5, German BSI-2011-VS, US Army AR380-19 and more
  • check Detailed erasure report provides evidence of deletion
  • check Compatible with Solid State Drives (SSD) and Flash memory
  • check Full Drag & Drop support
  • check Erasing methods in total (11)
  • check Incl. 1 year technical support and free upgrades
  • check 24/7 Support by e-Mail

MILITARY

Best for users who want the military-grade features

$29.90
per year (no subscription)
  • check Compatible with all models of MacBook, MacBook Air, Macbook Pro, iMac, iMac Pro and Mac Pro
  • check Secure data deletion up to the top secret security standard level
  • check Deletion algorithms like DoD 5220.22-M ECE, Peter Gutmann, DoD 5220.22-M, HMG Infosec No.5, German BSI-2011-VS, US Army AR380-19 and more
  • check Detailed erasure report provides evidence of deletion
  • check Compatible with Solid State Drives (SSD) and Flash memory
  • check Full Drag & Drop support
  • check Advanced deletion reports
  • check Enhanced military deletion methods like NATO standard, US Navy NAVSO P-5239-26 (MFM & RLL), USAF AFSSI-5020, BSI TL-03423 and CSEC ITSG-06
  • check Erasing methods in total (21)
  • check Incl. 1 year technical support and free upgrades
  • check 24/7 Support by e-Mail
pro
military

PRO

Best for users who want to have more advanced features

$29.90
per year (no subscription)
  • check Compatible with all iPhone®, iPad® and iPod® touch models
  • check Compatible with all iOS® versions
  • check Securely overwrite the freespace
  • check Complete wipe of all data on the iOS® device
  • check Secure cleaning of temporary data
  • check Incl. 1 year technical support and free upgrades
  • check Advanced deletion reports
  • check 24/7 Support by e-Mail
  • check 11 erasing methods in total
  • check Protectstar™ Advanced Secure Deletion Algorithm (2017)

MILITARY

Best for users who want the military-grade features

$49.90
per year (no subscription)
  • check Compatible with all iPhone®, iPad® and iPod® touch models
  • check Compatible with all iOS® versions
  • check Securely overwrite the freespace
  • check Complete wipe of all data on the iOS® device
  • check Secure cleaning of temporary data
  • check Incl. 1 year technical support and free upgrades
  • check Advanced deletion reports
  • check Integrated Secure File Explorer
  • check Securely delete AppleTV (all models)
  • check 24/7 Support by e-Mail
  • check 18 erasing methods in total
  • check Protectstar™ Advanced Secure Deletion Algorithm (2017)
  • check 50-cycles wiping method Protectstar™ Secure Deletion Algorithm®