NEW: Antivirus AI Mac is now availableDiscover now →
English
Deutsch Español Français Italiano Português Русский العربية हिन्दी 日本語 简体中文
For Home
Your privacy.
Uncompromised.
Real-time AI security for Android, iPhone, Mac and Windows. Independently certified and multiple award-winning.
Explore our products
AndroidAndroid
Anti Spy newfree
Detect & block spyware
Antivirus AI newfree
Real-time AI protection
Firewall AI free
Control network access
Camera Guard free
Monitor camera in real time
Micro Guard free
Protect microphone from spying
iShredder newfree
Permanently delete data
iOSiOS
iShredder iOS new
Securely delete photos & files
MacMac
Antivirus AI Mac free
Virus protection for macOS
Camera Guard Mac
Monitor camera in real time
iShredder Mac
Certified file deletion
iShredder iOS
Also runs on Apple Silicon Macs
iLocker Mac
Encrypt & lock apps
WindowsWindows
iShredder Windows
Certified data erasure
iShredder Server
For servers & IT teams
iShredder Technical
23 certified erasure standards
For Business
Security for
your organization.
Certified data erasure and security for SMBs, government agencies and enterprises – fully GDPR-compliant.
Explore business solutions
Android & iOS
iShredder Business b2b
Securely wipe multiple devices
iShredder Enterprise
MDM integration & certificates
Windows Server
iShredder Server b2b
Wipe servers & RAID arrays
iShredder Technical
Bootable, 23 certified erasure standards
For Defense
Defense Solutions
Defense Solutions gov
Trusted by government agencies & defense organizations worldwide
About Us
Shaping Security
since 2004.
We protect the privacy of over 8 million people worldwide – independently, transparently, without unnecessary data collection.
Our story
Company
About Protectstar
Who we are & what drives us
Our Philosophy
Security as a human right
Why Protectstar
Certified & award-winning
Your Privacy
How we protect your data
Environment
Our commitment to the planet
Team & Press
Our Team
The people behind Protectstar
Founder's Message
Vision & mission first-hand
Press Center
Media, logos & press kit
Intelligence
Artificial Intelligence
Artificial Intelligence
On-device AI detecting new threats in real time
iShredding
iShredding
23 certified erasure standards
For Home
For Business
About Us
FAQ & SupportBlog

What is the Advanced Secure Deletion Algorithm developed by Protectstar™? What steps are involved in the Advanced Secure Deletion Algorithm (ASDA)?

What is the Advanced Secure Deletion Algorithm developed by Protectstar™? What steps are involved in the Advanced Secure Deletion Algorithm (ASDA)?
January 18, 2023

The Advanced Secure Deletion Algorithm (ASDA) was introduced by Protectstar™ Inc. in 2017 to provide a more secure and thorough data erasure method than the Secure Deletion Algorithm, which had been in use for over ten years. With ASDA, you can erase data on various storage media (hard drives, SSDs, USB sticks, memory cards, smartphones, etc.) in such a way that even professional forensic experts or hackers have no chance of recovering the original content.
 

Why Do You Need Such a Complex Erasure Algorithm?

When you move a file to the recycle bin and then empty it, the data isn’t actually removed physically. The storage space the file occupied is merely marked as “available.” With the right tools, these files can often be recovered. To truly ensure that personal or business-critical information disappears, you need an erasure algorithm that not only renders the data unreadable but also destroys it in a way that’s irreversible, even for specialists.
 

The Four Steps of the Advanced Secure Deletion Algorithm (ASDA)

1. Initial Overwrite with a Defined Pattern

In the first pass, all data is overwritten with the hex value 0xFF. This means every sector or block of your storage medium is filled with this fixed value, making it much more difficult to retrieve any original data from the underlying storage structure.

2. Complete AES-256 Encryption

In the second step, all data blocks are fully encrypted using AES-256 (Advanced Encryption Standard with a 256-bit key). Even if minimal traces of the original content still remained, they are now encrypted. For anyone attempting data recovery, this poses a huge challenge—usually an impossible task without the key.

3. Verification and Overwrite with a Unique Pattern

Next, a comprehensive verification of the previously written data is carried out. It is then erased again using a unique bit pattern (10010010, 01001001, 00100100), followed by another verification. All incorrectly read or verified sectors/blocks are logged in the erasure report. This gives you a complete record of whether every area of the storage medium has been properly erased.

4. Final Overwrite with High-Quality Random Data

Finally, the medium is overwritten once again with random data. These random values are generated by high-quality (FIPS-compliant) random number generators, making any potential reconstruction even more difficult. At this point, the device has not only been overwritten and encrypted multiple times but also filled with highly unpredictable random patterns.
 

What Makes ASDA Special?

  1. Combination of Multiple Methods: ASDA employs overwriting, encryption, verification, and high-quality random numbers in a well-coordinated process.
  2. Continuous Development: Since 2017, the algorithm has been regularly updated to keep pace with evolving standards and technological challenges.
  3. Documentation & Compliance: Every erasure generates a detailed report, which is essential for businesses and organizations to meet data protection requirements or compliance standards (e.g., GDPR, HIPAA, PCI-DSS).
  4. Broad Hardware Support: ASDA is integrated into Protectstar™ software solutions like the iShredder series or Data Shredder, and works across different platforms (Windows, macOS, iOS, Android).
     

Who Should Use ASDA?

  • Home Users: If you want to ensure that personal photos, private documents, or other sensitive information truly disappear for good.
  • Businesses: To securely and irreversibly delete trade secrets, customer data, and confidential information, for instance when disposing of old hard drives or reselling company devices.
  • IT Professionals/Forensic Experts: As a robust standard method for high-security applications requiring maximum reliability and traceability in the data erasure process.

 

The Advanced Secure Deletion Algorithm (ASDA) by Protectstar™ combines various security measures—overwriting with known patterns, strong AES-256 encryption, thorough verification, and overwriting with high-quality random data—into a four-step procedure. This ensures data is truly erased, making it extremely difficult to recover, even with forensic methods.

If you’re looking for a sophisticated, reliable, and continually updated method of data erasure, ASDA is an excellent choice.

Learn more about the Advanced Secure Deletion Algorithm and Protectstar™’s corresponding software solutions at:
https://www.protectstar.com/en/secure-erase

Was this article helpful? Yes No
31 out of 34 people found this article helpful
Cancel Submit
Back Go back