NEW: Antivirus AI Mac is now availableDiscover now →
English
Deutsch Español Français Italiano Português Русский العربية हिन्दी 日本語 简体中文
For Home
Your privacy.
Uncompromised.
Real-time AI security for Android, iPhone, Mac and Windows. Independently certified and multiple award-winning.
Explore our products
AndroidAndroid
Anti Spy newfree
Detect & block spyware
Antivirus AI newfree
Real-time AI protection
Firewall AI free
Control network access
Camera Guard free
Monitor camera in real time
Micro Guard free
Protect microphone from spying
iShredder newfree
Permanently delete data
iOSiOS
iShredder iOS new
Securely delete photos & files
MacMac
Antivirus AI Mac free
Virus protection for macOS
Camera Guard Mac
Monitor camera in real time
iShredder Mac
Certified file deletion
iShredder iOS
Also runs on Apple Silicon Macs
iLocker Mac
Encrypt & lock apps
WindowsWindows
iShredder Windows
Certified data erasure
iShredder Server
For servers & IT teams
iShredder Technical
23 certified erasure standards
For Business
Security for
your organization.
Certified data erasure and security for SMBs, government agencies and enterprises – fully GDPR-compliant.
Explore business solutions
Android & iOS
iShredder Business b2b
Securely wipe multiple devices
iShredder Enterprise
MDM integration & certificates
Windows Server
iShredder Server b2b
Wipe servers & RAID arrays
iShredder Technical
Bootable, 23 certified erasure standards
For Defense
Defense Solutions
Defense Solutions gov
Trusted by government agencies & defense organizations worldwide
About Us
Shaping Security
since 2004.
We protect the privacy of over 8 million people worldwide – independently, transparently, without unnecessary data collection.
Our story
Company
About Protectstar
Who we are & what drives us
Our Philosophy
Security as a human right
Why Protectstar
Certified & award-winning
Your Privacy
How we protect your data
Environment
Our commitment to the planet
Team & Press
Our Team
The people behind Protectstar
Founder's Message
Vision & mission first-hand
Press Center
Media, logos & press kit
Intelligence
Artificial Intelligence
Artificial Intelligence
On-device AI detecting new threats in real time
iShredding
iShredding
23 certified erasure standards
For Home
For Business
About Us
FAQ & SupportBlog
ASDA · Advanced Secure Deletion Algorithm

Erased means erased.

What you erase should never come back. ASDA overwrites addressable storage areas in four precise passes – verified, cryptographically reinforced, and documented for audits.

Fortress Cybersecurity Award 2025 for iShredder · ASDA at the core since 2017 View award
Live · ASDA in action

From original data to random noise.

Visual demonstration. Actual erasure time depends on file size, storage medium, platform, and erasure method.

0 Ready Original file in storage
Practically unusable for forensic recovery.
4 passes
Precisely defined erasure phases
Read‑after‑Write
Write operations verified
Erasure report
Traceable documentation for audits
How ASDA works

Four steps. Verified. Documented.

  1. Initialization

    Overwrite with 0xFF

    The addressable storage area is overwritten with 0xFF. Original content becomes unreadable within the overwritten area.

  2. Cryptographic

    AES‑256 encryption

    The buffer content is encrypted with AES‑256 and written back. The key exists only temporarily in RAM and is erased afterward.

  3. Verified

    Bit pattern & verification

    A defined bit pattern is written. Read‑after‑write verification checks the write operation – deviations are overwritten again and documented in the erasure report.

  4. Finalization

    Cryptographic random data

    Finally, CSPRNG-generated random data in accordance with NIST SP 800‑90A is written. Remaining patterns are overwritten.

Why ASDA

Faster. Lower wear. Verifiable.

Faster in everyday use

Four passes instead of fifty – with comparable protection in the addressable area.

Reduced wear for modern storage

Fewer write operations reduce unnecessary write load – especially on flash- and SSD-based storage media.

Audit-ready documentation

Every relevant step is logged – as a building block for GDPR documentation, ISO‑27001 processes, and compliance audits.

Important for SSDs and flash storage.

Modern storage uses wear leveling, spare blocks, and over‑provisioning. As a result, simple overwriting may not affect certain areas outside addressable storage. For higher protection requirements, additional purge mechanisms such as Block Erase or Cryptographic Erase are required.

That is why iShredder differentiates between overwriting, verification, and additional purge mechanisms depending on platform, medium, and supported erasure path. This classification follows the media-specific, risk-based logic of NIST SP 800‑88 Rev. 2.

Comparison

Four instead of fifty.

4
passes
ASDA · since 2017
vs
50
passes
Legacy method · 2007–2017
92 % fewer write operations.
Comparable protection in the addressable area – faster in everyday use and lower wear for modern storage.
What ASDA combines
  • Read‑after‑write verification
  • Audit-ready erasure report
  • AES‑256 encryption
  • CSPRNG based on NIST SP 800‑90A
Our belief

Privacy is not a feature.
It is a fundamental right.

ASDA has been at the core of iShredder since 2017 – the data erasure solution honored with the Fortress Cybersecurity Award in 2025. Built for people who refuse to compromise on privacy.