What you erase should never come back. ASDA overwrites addressable storage areas in four precise passes – verified, cryptographically reinforced, and documented for audits.
Fortress Cybersecurity Award 2025for iShredder · ASDA at the core since 2017 View award
Live · ASDA in action
From original data to random noise.
Visual demonstration. Actual erasure time depends on file size, storage medium, platform, and erasure method.
Storage contentOriginal
0ReadyOriginal file in storage
Practically unusable for forensic recovery.
4 passes
Precisely defined erasure phases
Read‑after‑Write
Write operations verified
Erasure report
Traceable documentation for audits
How ASDA works
Four steps. Verified. Documented.
1
Initialization
Overwrite with 0xFF
The addressable storage area is overwritten with 0xFF. Original content becomes unreadable within the overwritten area.
2
Cryptographic
AES‑256 encryption
The buffer content is encrypted with AES‑256 and written back. The key exists only temporarily in RAM and is erased afterward.
3
Verified
Bit pattern & verification
A defined bit pattern is written. Read‑after‑write verification checks the write operation – deviations are overwritten again and documented in the erasure report.
4
Finalization
Cryptographic random data
Finally, CSPRNG-generated random data in accordance with NIST SP 800‑90A is written. Remaining patterns are overwritten.
Why ASDA
Faster. Lower wear. Verifiable.
Faster in everyday use
Four passes instead of fifty – with comparable protection in the addressable area.
Reduced wear for modern storage
Fewer write operations reduce unnecessary write load – especially on flash- and SSD-based storage media.
Audit-ready documentation
Every relevant step is logged – as a building block for GDPR documentation, ISO‑27001 processes, and compliance audits.
Important for SSDs and flash storage.
Modern storage uses wear leveling, spare blocks, and over‑provisioning. As a result, simple overwriting may not affect certain areas outside addressable storage. For higher protection requirements, additional purge mechanisms such as Block Erase or Cryptographic Erase are required.
That is why iShredder differentiates between overwriting, verification, and additional purge mechanisms depending on platform, medium, and supported erasure path. This classification follows the media-specific, risk-based logic of NIST SP 800‑88 Rev. 2.
Comparison
Four instead of fifty.
4
passes
ASDA · since 2017
vs
50
passes
Legacy method · 2007–2017
92 % fewer write operations.
Comparable protection in the addressable area – faster in everyday use and lower wear for modern storage.
What ASDA combines
Read‑after‑write verification
Audit-ready erasure report
AES‑256 encryption
CSPRNG based on NIST SP 800‑90A
Our belief
Privacy is not a feature. It is a fundamental right.
ASDA has been at the core of iShredder since 2017 – the data erasure solution honored with the Fortress Cybersecurity Award in 2025. Built for people who refuse to compromise on privacy.