Protect devices in active use. Erase securely at return, resale, or decommissioning. Deliver digitally signed proof for audits, privacy compliance, and asset disposition.
Using iShredder iOS as an example: Apple’s factory reset covers only one of the two steps. iShredder adds the second.
1
Key wipe
Like a factory reset.
The encryption key is removed. The data becomes unreadable — provided the key cannot be reconstructed.
What Apple and Android do
2
Addressable-area overwrite
What iShredder adds.
iShredder extends the key wipe with targeted overwriting of addressable data areas — using recognized methods such as NIST SP 800-88 Rev. 2 or BSI TL-03423. The result is documented in a signed erasure report.
The Protectstar difference
No recovery under the documented test setup.
Traceable by erasure method, device ID, timestamp, result, and digital signature — so IT, privacy, and audit teams can rely on the same evidence.
Methods aligned with NIST SP 800-88 Rev. 2 · DoD 5220.22-M · BSI TL-03423
Products
For every device in the lifecycle.
Protection in active use. Erasure at retirement. Proof for audits.
Erasure · Available
When a device leaves service.
Six editions. One signed, auditable erasure record.
Privacy starts with data minimization. Protectstar relies on local analysis, independent testing, and documented processes — so protection, erasure, and proof stay transparent.
Data-minimizing by design.
Local analysis. No mandatory cloud. No identifying fingerprints.
Independently tested.
AV-TEST. DEKRA MASA L1. ISO 27001-certified data centers in Germany.
Lifecycle-oriented.
Use devices longer. Transfer them securely. Erase with documentation. Goal: greenhouse-gas-neutral by 2027.
Contact
Let’s talk about your project.
Send us a message. We’ll respond within one business day.