Data Shredder for Mac®

Minimalist in military grade deletion

Secure Erasing for macOS®

The new generation Data Shredder for Mac® is a professional app that allows for secure deletion of data from hard drives and external data storage devices on macOS®.

The software meets and exceeds government, military and industry standards for the permanent erasure of digital information.
It erases all existing data up to top-secret security level data and enables users to efficiently delete their data in such a way as to preclude reconstruction, even by government agencies.


Secure Erasing for macOS®

Certified Deletion Algorithms

Depending on the edition, Data Shredder for Mac® comes with secure deletion algorithms such as DoD 5220.22-ME, US Air Force (AFSSI-5020), US Army AR380-19, DoD 5220.22-M ECE, BSI/VS-ITR TL-03423, BSI-2011-VS, CSEC ITSG-06, NATO Standard, Gutmann, HMG InfoSec No.5, DoD 5220.22 SSD and others.

Each algorithm has been analyzed by authorities and independent organizations to make sure it really does what it says on the tin – data destruction beyond redemption.

Up to EIGHTEEN methods of erasure

In a sector where trust and security are primary concerns, ProtectStar™ provides his customers with only modern and first-class products: Data Shredder for Mac® offers up to eighteen secure deletion methods that certified by government and military organizations.

Up to EIGHTEEN methods of erasure

Deletion Method:

- Choose method
  • 50 Cycles: ProtectStar SDA (2007)
  • 35 Cycles: Gutmann method
  • 8 Cycles: German BSI TL-03423
  • 7 Cycles: NATO Standard
  • 7 Cycles: DoD 5220.22-M ECE
  • 5 Cycles: BSI-2011-VS
  • 4 Cycles: ProtectStar ASDA (2017)
  • 4 Cycles: DoD 5220.22-M E for SSD
  • 3 Cycles: Canadian CSEC ITSG-06
  • 3 Cycles: HMG Nr. 5 extended
  • 3 Cycles: AFSSI-5020
  • 3 Cycles: NAVO P-5239-26 (MFM)
  • 3 Cycles: NAVO P-5239-26 (RLL)
  • 3 Cycles: US Army AR380-19
  • 3 Cycles: DoD 5220.22-M E
  • 1 Cycles: Australian ISM 6.2.92
  • 1 Cycles: 0XFF for SSD
  • 1 Cycles: Random Values
Click to see all 18 methods
Specifically developed by ProtectStar™ Inc. in 2007 it runs through fifty erasure routines.
Data will be overwritten for two times with a random value, afterwards with their complements. It includes and the DoD 5220.22-M (E) standard and Peter Gutmann method and random algorithms.
The algorithm from Peter Gutmann was found in 1996 and makes 35 overwrite passes in total.
This algorithm is one of the state-of-the-art methods for data destruction.
In March 2010 the German Federal office for IT Security (BSI) published a new technical BSI Guideline for "Requirements to overwrite memory media".
The method is similar to VSITR standard for magnetic storage media.
In total the new algorithm has 8 cycles, which has to be worked through in chronological order. Includes one cycle of verification.
The NATO method is the deletion standard of North Atlantic Treaty Organization (NATO).
It will overwrite the target data area 7 times.
The first six overwrites are with the fixed values (0x00) and (0xff), alternating between passes.
The 7th overwrite is with a random value i.e. 0x00,0xFF,0x00,0xFF,0x00,0xFF and 7th pass with a random value.
The method for high security is based on the January 1995 'National Industrial Security Program Operating Manual'by the Department of Defense (DoD).
In this seven cycle variation (DoD 5220.22-M ECE), data is first overwritten three times with DoD 5220.22-M (E) Standards, then with a specific random value, and finally once again with DoD 5220.22-M (E).
The German Federal office for IT Security (BSI) describes in the technical BSI guideline for 'Requirements to overwrite memory media' from July 2010 the modern method BSI-2011.
This clause includes 5 steps, which is implemented in sequential order.
The Advanced Secure Deletion Algorithm developed by ProtectStar™ in 2017 includes a pass that encrypts the blocks completely using the 256-bit AES doing a complete verification of written data.
The last pass wipes all data through a random pattern, while high-quality random numbers are generated based on Federal information processing standards (FIPS).
This method is specially developed for SSD (Solid State Drive) and flash memory, based on the U.S.
Department of Defense's standard DoD 5220.22-M E. It will overwrite data four times.
The Canadian CSEC ITSG-06 sanitization method has three cycles and was published in 2006 by Communication Security Establishment Canada (CSEC).
The HMG Infosec Standard No 5 - enhanced level is approved to wipe UK Government Top Secret data and has also been approved by NATO.
The algorithm is a three pass overwriting algorithm: first pass - with zeros (0), second and third passes with its compliment and random values(with last pass verification).
The AFSSI-5020 sanitization method was originally defined in the Air Force System Security Instruction 5020 by the United States Air Force (USAF) in 1996 and may still be today.
This is the US Navy standard NAVSO P-5239-26 for MFM encoded drives.
This deletion method first writes the fixed value (0xffffffff) to the target data area, then the fixed value (0xbfffffff) and then random values.
Finally, the target data area is read to verify the overwrites.
This is the US Navy standard NAVSO P-5239-26 for RLL encoded drives.
This deletion method first writes the fixed value (0xffffffff) to the target data area, then the fixed value (0x27ffffff) and then random values.
Finally, the target data area is read to verify the overwrites.
AR380-19 is the data shredding algorithm specified and published by the U.S. Army.
The algorithm is a three pass overwriting algorithm: first pass - with random bytes, second and third passes with certain bytes and with its compliment (with last pass verification).
The method for low security but for high execution speed is based on the January 1995 'National Industry Security Program Operating Manual' from the DoD (US DoD 5220.22-M).
The variation (DoD 5220.22-M E) offers 3 cycles in which the data are overwritten with first a set value, then its compliment, and then a random value.
ISM 6.2.92 is the Australian government's data sanitization standard.
The method was originally defined in the Information Security Manual (ISM) issued by the Australian Department of Defense: Intelligence & Security.
The ISM 6.2.92 sanitization can not be used to sanitize classified information.
This method is specially developed for SSD (Solid State Drive) and flash memory.
It offers one cycle which data are overwritten by the pattern "0xFF".
This method for lowest security but for very high execution on speed. It offers only one cycle which data are overwritten with random values.
See here the description of the method you have selected.
Drag & Drop without trace

Drag & Drop without trace

Data Shredder for Mac® offering a high level of user friendliness.
With the intuitive drag & drop navigation, users can completely delete data from their hard drives or external data storage devices.

Drag & Drop files, folders, hard drives or even external devices to the drag & drop area and securely erase it with just a push of the shred button.

Securely wipe the freespace using patented security standards, making it impossible to recover any deleted data.

Do you know what is still there in your free space?

When you delete a file or a photo the operation system just removes the reference to that data, but doesn’t delete the actual files on your memory. It just simply marked as free so that another file can come and use those blocks.

With the award-winning freespace erase option in Data Shredder for Mac® you can wipe the unused disk space securely so that deleted data cannot be recovered.

Care Plan

System Requirements

Supported Operating Systems for Software

  • Mac OS 10.11 or higher (OS X El Capitan, macOS Sierra, macOS High Sierra)

Minimal Hardware Requirements

  • Minimal system requirements of the operation system
  • 50 MB free hard drive space
  • Internet connection for updates and activation

Languages

  • English, German

DATA SHREDDER FOR MAC®

MINIMALIST. MILITARY GRADE DATA DELETION

DATA SHREDDER FOR MAC®

Available in two editions

Professional

  • Compatible with all models of MacBook, MacBook Air, Macbook Pro, iMac, iMac Pro and Mac Pro
  • Secure data deletion up to the top secret security standard level
  • Deletion algorithms like DoD 5220.22-M ECE, Peter Gutmann, DoD 5220.22-M, HMG Infosec No.5, German BSI-2011-VS, US Army AR380-19 and more
  • Detailed deletion report provides evidence of deletion
  • Compatible with Solid State Drives (SSD) and Flash memory
  • Full Drag & Drop support
  • Advanced deletion reports
  • Enhanced military deletion methods like NATO standard, US Navy NAVSO P-5239-26 (MFM & RLL), USAF AFSSI-5020, BSI TL-03423 and CSEC ITSG-06
  • Erasing methods in total (11)
  • incl. 1 year technical support and free upgrades
  • 24/7 Support by e-Mail

Military

  • Compatible with all models of MacBook, MacBook Air, Macbook Pro, iMac, iMac Pro and Mac Pro
  • Secure data deletion up to the top secret security standard level
  • Deletion algorithms like DoD 5220.22-M ECE, Peter Gutmann, DoD 5220.22-M, HMG Infosec No.5, German BSI-2011-VS, US Army AR380-19 and more
  • Detailed deletion report provides evidence of deletion
  • Compatible with Solid State Drives (SSD) and Flash memory
  • Full Drag & Drop support
  • Advanced deletion reports
  • Enhanced military deletion methods like NATO standard, US Navy NAVSO P-5239-26 (MFM & RLL), USAF AFSSI-5020, BSI TL-03423 and CSEC ITSG-06
  • Erasing methods in total (18)
  • incl. 1 year technical support and free upgrades
  • 24/7 Support by e-Mail