speakerNEW!iShredder™ Business for iOS and Android are now available for Enterprise users.Learn more

Why are Protectstar’s apps not (fully) open source?

In the IT security industry, there has long been a debate about the advantages and disadvantages of open source versus closed source. Advocates like Edward Snowden emphasize that publicly accessible source code enhances trust and facilitates independent security reviews. In addition, Kerckhoffs’s principle states that the security of a system should not depend on keeping its algorithm secret, but rather on keeping its key secret.

However, Protectstar relies on proprietary technologies, including our own AI algorithms and patented data erasure methods. In order to protect this know-how while still ensuring maximum security, we follow a balanced approach:

  • Targeted Disclosure: For certifications (e.g., DEKRA MASA L1 and L2), we grant authorized auditing institutions access to our source code, enabling independent security reviews.
  • Gradual Release: We have already published parts of our source code, for example, our Extended AES Algorithm and Secure Erase technologies (such as the Advanced Secure Deletion Algorithm, ASDA).
    For more information, please visit:
    Extended AES: https://www.protectstar.com/en/extended-aes
    ASDA Algorithm: https://www.protectstar.com/en/secure-erase

We acknowledge the benefits of open source and strive to reconcile transparency with the protection of our intellectual property. Through targeted disclosure, independent certifications, and the preservation of our proprietary technologies, we ensure our users receive trustworthy and secure products. This is evidenced by numerous awards and certifications, as well as our steadfast commitment not to store or collect any user data.

Was this article helpful? Yes No
1 out of 1 people found this article helpful