════════════════════════════════════════════════════════════════════════════════
Six fathoms. That is the depth the Royal Navy considered sufficient for permanent disposal, deep enough that no grappling hook could reach, no salvage diver follow. To deep six something was to commit it to the irretrievable. Obsolete charts. Expired operational orders. Signals traffic that had served its purpose and could not be allowed to surface in hostile hands. When information reached the end of its operational life, the Navy had a doctrine for ensuring it stayed there. DEEP_SIX applies the same principle to data.
Standard OS deletion is a lie. Move a file to Trash, empty it, and the data is not gone. The filesystem simply marks that space as available. The file header is erased, but the bytes remain on disk, perfectly intact, waiting to be imaged. Every major forensic toolkit, Autopsy, FTK, Cellebrite, recovers "deleted" files as a routine first step. Your operating system was not designed to protect you from this. DEEP_SIX was.
The distinction between deletion and destruction matters. Deletion removes the pointer. Destruction removes the data.
For SSD and flash media, where physical overwrite cannot be guaranteed due to wear-leveling and controller firmware, DEEP_SIX encrypts the target data with AES-256-GCM using a randomly generated single-use key, then destroys that key in RAM. The ciphertext left on disk is permanently and mathematically inaccessible. No forensic tool recovers what has no key. For legacy magnetic storage, multi-pass physical overwrite patterns are applied: DoD 5220.22-M, Gutmann 35-pass, or both.
But shredding files you know about is only half the problem.
Every file you deleted before DEEP_SIX existed is still on your drive. The OS marked the sectors available. The data is intact. A forensic imager can pull months of deletion history from the free space on a standard machine. Wipe Free Space closes that window. DEEP_SIX fills every unallocated sector on the target volume with zeros until the drive is full, then removes the fill file. What remains is a volume where the entire free space has been overwritten. Nothing precedes DEEP_SIX. Nothing survives the wipe.
This is not a convenience utility. It is a terminal instrument for data that cannot be allowed to surface. DEEP_SIX sends the ship to the bottom.
DJL destroys what it protects. DEEP_SIX destroys everything else.
────────────────────────────────────────────────────────────────────────────────
PROTOCOL 01: FORENSIC RECOVERY
THREAT ▸ Device seized. Standard deletion forensically reversed. Files reconstructed.
DEEP_SIX implements DoD 5220.22-M 3-pass and optional Gutmann 35-pass overwrite patterns before filesystem removal. Every byte of targeted data is overwritten with structured noise, making reconstruction mathematically impossible regardless of the imaging tool deployed.
PROTOCOL 02: DEVICE HANDOVER
THREAT ▸ Device must be surrendered, sold, or retired. Sensitive files must not survive the transfer.
DEEP_SIX applies cryptographic erasure across the target directory before handover. The VMK-equivalent for your data. On flash media, ciphertext without a key is indistinguishable from empty storage. On magnetic drives, the multi-pass overwrite leaves nothing for recovery tools to reconstruct.
PROTOCOL 03: EMERGENCY DESTRUCTION
THREAT ▸ Situation has changed. Files must be gone before the next knock on the door.
Dead Man's Switch triggers on a global hotkey or physical event (USB unmount). Instantly shreds the pre-defined burn folder and issues RAM flush commands. The trigger is silent, single-input, and executes in under one second. No confirmation dialogs. No hesitation.
────────────────────────────────────────────────────────────────────────────────
NIST CERTIFIED — THE SAME STACK FEDERAL AGENCIES ARE CURRENTLY SCRAMBLING TO ADOPT
STANDARDCERTIFICATIONCLASSIFICATIONOPERATIONAL DETAIL
AES-256-GCMNIST SP 800-88 · Purge ClassSP 800-88 PURGE CLASSPrimary erasure method for SSD and flash media. Target data is encrypted with AES-256-GCM using a randomly generated single-use key, then the key is destroyed in RAM and never written to disk. The ciphertext remaining on disk is permanently and mathematically inaccessible. No forensic tool recovers data without the key. The key no longer exists.
DoD 5220.22-MDoD 5220.22-M · 3-PassDOD COMPLIANTThree-pass overwrite (0x00, 0xFF, random) per the Department of Defense data sanitization standard. Applied to legacy magnetic storage (HDD, removable media) where physical overwrite is reliable.
Gutmann MethodGutmann 1996 · 35-PassMAXIMUM PARANOIAFull 35-pass overwrite sequence including random passes and all known MFM/RLL encoding patterns. Reserved for legacy magnetic storage in high-threat environments.
Volume-Level SanitizationNIST SP 800-88 · Media SanitizationFREE SPACE WIPEWipe Free Space fills every unallocated sector on the target volume with zeros using a single fill operation, then removes the fill file. This overwrites all remnant data from files deleted at any point prior to DEEP_SIX installation. A forensic imager reading the free space after a wipe finds only zeros. No file carver can reconstruct data from zeroed sectors. Consistent with NIST SP 800-88 Clear-class sanitization applied at the volume level.
RAM FlushPOSIX mlock / madviseMEMORY HYGIENEOn Dead Man's Switch activation, issues memory release advisories and overwrites sensitive process heap regions before termination to collapse the cold-boot extraction window.
────────────────────────────────────────────────────────────────────────────────
Cryptographic erasure (SSD/flash): AES-256-GCM encryption with a randomly generated single-use key; key destroyed in RAM immediately after; ciphertext on disk is permanently and mathematically inaccessible
DoD 5220.22-M Overwrite: 3-pass write pattern (0x00, 0xFF, random) makes forensic recovery impossible on HDDs and removable magnetic media
Gutmann 35-Pass Mode: maximum-paranoia overwrite sequence for legacy magnetic storage in high-threat environments; leaves no recoverable remnant
Wipe Free Space: fills every unallocated sector on the target volume with zeros until the drive is full, then removes the fill file; overwrites all data from files deleted before DEEP_SIX was installed; forensic imaging tools find nothing in free space; run once at the end of a session to close the entire pre-DEEP_SIX deletion history
Dead Man's Switch: global hotkey or USB unmount triggers instant shred of the burn folder and RAM flush; executes in under one second; no dialogs, no delay
Burn Folder: pre-define a target directory; one trigger obliterates the entire contents without navigation or confirmation delay
Drag-and-drop shredder: drop files directly onto the interface; no menus, no multi-step confirmation for standard shred operations
Batch Operations: shred entire directory trees in a single atomic operation with recursive scope confirmation
Shred log: maintains an encrypted local record of every destruction operation with file paths, method applied, and timestamp
────────────────────────────────────────────────────────────────────────────────
⚠ Single-operator license. WARNING: Secure overwrite is irreversible. Verify targets before execution. No recovery mechanism exists. Not for redistribution. SSD overwrite effectiveness is subject to controller firmware behaviour. Consult device documentation.
════════════════════════════════════════════════════════════════════════════════
ACQUISITION_COST: $39.99 USD
SECURE PAYMENT VIA STRIPE · INSTANT DIGITAL DELIVERY · VERIFIED PRIVATEERS ONLY