In this post, we are going to explain how different shredding methods work. This will help you select the algorithm that best suits your needs. Different files contain different information. While you may want to delete a private photo in a relatively quick way, deleting files that contain your financial information requires more advanced shredding, so that your bank statements can’t be undeleted even by professional hackers.
How to choose a file shredding method
Easy File Shredder provides a vast choice of different shredding methods that delete your data in different number of passes, using various overwriting methods. You can select a shredding method from the drop-down menu of the scan window:
When deleting files with Easy File Shredder, you can select one of the following shredding algorithms:
- Bruce Schneier’s Algorithm – a data deletion algorithm created by Bruce Schneier. It overwrites information in seven passes.
- German VSITR – data deletion algorithm released by the German Federal Office. Overwrites data in seven passes.
- ITSG 06 – originally published by Communication Security Establishment Canada (CSEC), this method shreds data in three passes.
- Peter Gutmann’s Algorithm – a shredding method by Peter Gutmann that overwrites data in 35 passes. This method offers high security, but it can take a while to complete.
- Russian GOST P50739-95 – a Russian government approved shredding method that overwrites data in two passes.
- US Air Force 5020 – a method defined in the Air Force System Security Instruction 5020. Overwrites data in three passes.
- US Army AR380-19 – a US Army data deletion algorithm. Overwrites data in three passes.
- US Dept of Defense DoD 5200.28 STD(7) – a United States Department of Defense standard.
- US Dept of Defense DoD 5200.22 M(3) – a United States Department of Defense standard.
- US Dept of Defense DoD 5200.22-M (E) – a United States Department of Defense standard.
- US Dept of Defense DOD 5200.22-M(ECE) – a United States Department of Defense standard.
- US DoD 5220.22-M(ECE) – a United States Department of Defense standard , overwrites in seven passes.
- US DoD 5220.22-M(E) – a United States Department of Defense standard, overwrites data in three passes.
- Custom shredding method
- Random shredding method – overwrites data with random characters in one pass.
Basically, the more passes a shredding method uses, the more secure it is. But remember that more passes require more time to complete. So if you shred free disk space with Peter Gutmann method, be prepared for a long wait.