NEW: Antivirus AI Mac is now availableDiscover now →
English
Deutsch Español Français Italiano Português Русский العربية हिन्दी 日本語 简体中文
For Home
Your privacy.
Uncompromised.
Real-time AI security for Android, iPhone, Mac and Windows. Independently certified and multiple award-winning.
Explore our products
AndroidAndroid
Anti Spy newfree
Detect & block spyware
Antivirus AI newfree
Real-time AI protection
Firewall AI free
Control network access
Camera Guard free
Monitor camera in real time
Micro Guard free
Protect microphone from spying
iShredder newfree
Permanently delete data
iOSiOS
iShredder iOS new
Securely delete photos & files
MacMac
Antivirus AI Mac free
Virus protection for macOS
Camera Guard Mac
Monitor camera in real time
iShredder Mac
Certified file deletion
iShredder iOS
Also runs on Apple Silicon Macs
iLocker Mac
Encrypt & lock apps
WindowsWindows
iShredder Windows
Certified data erasure
iShredder Server
For servers & IT teams
iShredder Technical
23 certified erasure standards
For Business
Security for
your organization.
Certified data erasure and security for SMBs, government agencies and enterprises – fully GDPR-compliant.
Explore business solutions
Android & iOS
iShredder Business b2b
Securely wipe multiple devices
iShredder Enterprise
MDM integration & certificates
Windows Server
iShredder Server b2b
Wipe servers & RAID arrays
iShredder Technical
Bootable, 23 certified erasure standards
For Defense
Defense Solutions
Defense Solutions gov
Trusted by government agencies & defense organizations worldwide
About Us
Shaping Security
since 2004.
We protect the privacy of over 8 million people worldwide – independently, transparently, without unnecessary data collection.
Our story
Company
About Protectstar
Who we are & what drives us
Our Philosophy
Security as a human right
Why Protectstar
Certified & award-winning
Your Privacy
How we protect your data
Environment
Our commitment to the planet
Team & Press
Our Team
The people behind Protectstar
Founder's Message
Vision & mission first-hand
Press Center
Media, logos & press kit
Intelligence
Artificial Intelligence
Artificial Intelligence
On-device AI detecting new threats in real time
iShredding
iShredding
23 certified erasure standards
For Home
For Business
About Us
FAQ & SupportBlog
Data privacy across the entire device lifecycle

Protect. Erase.
Prove.

Protect devices in active use. Erase securely at return, resale, or decommissioning. Deliver digitally signed proof for audits, privacy compliance, and asset disposition.

Methodology

Two steps.
Documented proof of erasure.

Using iShredder iOS as an example: Apple’s factory reset covers only one of the two steps. iShredder adds the second.

Key wipe

Like a factory reset.

The encryption key is removed. The data becomes unreadable — provided the key cannot be reconstructed.

What Apple and Android do
Addressable-area overwrite

What iShredder adds.

iShredder extends the key wipe with targeted overwriting of addressable data areas — using recognized methods such as NIST SP 800-88 Rev. 2 or BSI TL-03423. The result is documented in a signed erasure report.

The Protectstar difference

No recovery
under the documented test setup.

Traceable by erasure method, device ID, timestamp, result, and digital signature — so IT, privacy, and audit teams can rely on the same evidence.

Methods aligned with NIST SP 800-88 Rev. 2 · DoD 5220.22-M · BSI TL-03423
Products

For every device
in the lifecycle.

Protection in active use. Erasure at retirement. Proof for audits.

Principles

Three commitments.
Since 2004.

Privacy starts with data minimization. Protectstar relies on local analysis, independent testing, and documented processes — so protection, erasure, and proof stay transparent.

Data-minimizing by design.

Local analysis. No mandatory cloud. No identifying fingerprints.

Independently tested.

AV-TEST. DEKRA MASA L1. ISO 27001-certified data centers in Germany.

Lifecycle-oriented.

Use devices longer. Transfer them securely. Erase with documentation. Goal: greenhouse-gas-neutral by 2027.

Contact

Let’s talk about your project.

Send us a message. We’ll respond within one business day.

By submitting this form, we will process your information to handle your inquiry. Details are available in our Privacy Policy.
Reseller? → Reseller Program