Why aren't Protectstar apps (fully) open source?
For many years, the IT security industry has debated the pros and cons of open source versus closed source. Advocates such as Edward Snowden point out that publicly accessible source code strengthens trust and enables independent security reviews. In addition, Kerckhoffs’s principle states that the security of a system should not depend on keeping the algorithm secret, but on keeping the key secret.
Protectstar nevertheless relies on proprietary technologies, including self-developed AI algorithms and patented erasure methods. To protect this know-how while still providing maximum security, we follow a balanced approach:
Targeted disclosure: For certifications (for example, DEKRA MASA L1 and L2), we provide our source code to authorized testing institutions so that independent security reviews can be carried out.
Gradual publication: We have already disclosed parts of our source code, for example for the Extended AES algorithm or our Secure Erase technologies (such as the Advanced Secure Deletion Algorithm, ASDA).
You can find more information here:
Extended AES
Secure Erase
We recognize the advantages of open source and want to balance transparency with protecting our intellectual property. Through targeted disclosure, independent certifications, and the preservation of our proprietary technologies, we ensure that our users receive trustworthy and secure products. This is backed by numerous awards and certifications, as well as our consistent practice of not storing or collecting user data.


