NEW: Antivirus AI Mac is now availableDiscover now →
English
Deutsch Español Français Italiano Português Русский العربية हिन्दी 日本語 简体中文
For Home
Your privacy.
Uncompromised.
Real-time AI security for Android, iPhone, Mac and Windows. Independently certified and multiple award-winning.
Explore our products
AndroidAndroid
Anti Spy newfree
Detect & block spyware
Antivirus AI newfree
Real-time AI protection
Firewall AI free
Control network access
Camera Guard free
Monitor camera in real time
Micro Guard free
Protect microphone from spying
iShredder newfree
Permanently delete data
iOSiOS
iShredder iOS new
Securely delete photos & files
MacMac
Antivirus AI Mac free
Virus protection for macOS
Camera Guard Mac
Monitor camera in real time
iShredder Mac
Certified file deletion
iShredder iOS
Also runs on Apple Silicon Macs
iLocker Mac
Encrypt & lock apps
WindowsWindows
iShredder Windows
Certified data erasure
iShredder Server
For servers & IT teams
iShredder Technical
23 certified erasure standards
For Business
Security for
your organization.
Certified data erasure and security for SMBs, government agencies and enterprises – fully GDPR-compliant.
Explore business solutions
Android & iOS
iShredder Business b2b
Securely wipe multiple devices
iShredder Enterprise
MDM integration & certificates
Windows Server
iShredder Server b2b
Wipe servers & RAID arrays
iShredder Technical
Bootable, 23 certified erasure standards
For Defense
Defense Solutions
Defense Solutions gov
Trusted by government agencies & defense organizations worldwide
About Us
Shaping Security
since 2004.
We protect the privacy of over 8 million people worldwide – independently, transparently, without unnecessary data collection.
Our story
Company
About Protectstar
Who we are & what drives us
Our Philosophy
Security as a human right
Why Protectstar
Certified & award-winning
Your Privacy
How we protect your data
Environment
Our commitment to the planet
Team & Press
Our Team
The people behind Protectstar
Founder's Message
Vision & mission first-hand
Press Center
Media, logos & press kit
Intelligence
Artificial Intelligence
Artificial Intelligence
On-device AI detecting new threats in real time
iShredding
iShredding
23 certified erasure standards
For Home
For Business
About Us
FAQ & SupportBlog

How Protectstar protects your privacy: data protection, data minimization, and secure processing explained simply

At Protectstar, one simple principle applies: Your privacy is not a side topic — it is part of the product. That is why our apps rely on strict data minimization, no trackers, no advertising IDs, and no sale or sharing of your data for marketing purposes.

What we deliberately do not do

We do not collect content from your files or apps, no GPS or movement data, and no advertising or tracking IDs. Our security apps are designed to protect you — not to build a profile about you.

What data we process in a minimal way

To make protection against malware, spyware, tampering, and suspicious patterns possible at all, some Android apps require certain technical signals. These primarily include:

  • App names / package identifiers
  • Checksums such as SHA-256 or MD5
  • optionally device metadata such as Android version, manufacturer, or model
  • in certain technical cases, short-term IP processing

This data helps detect threats, make tampering visible, and continuously refine detection — for example to reduce false positives. The key point is this: We do not transfer private content, only the technical characteristics required for protection.

How we protect this data

According to our current policies, processing is carried out encrypted via HTTPS / AES-256. Protectstar also states that it uses ISO 27001-certified data centers in Germany and describes the processing as taking place for only as long as necessary, typically only for the specific analysis purpose. For Android apps that process technical data, a clear in-app disclosure with user consent is also described.

What this means for you in practice

You get strong protection without unnecessarily sacrificing your privacy. That is exactly our goal: as much security as possible with as little data processing as possible. No security solution can work entirely without technical signals — but it can handle them transparently, sparingly, and responsibly. That is exactly the standard by which we design our products.

Was this article helpful? Yes No
2 out of 2 people found this article helpful