Skip to content

ErfanNamira/BitBlender

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 

Repository files navigation

BitBlender 🛡️

Welcome to BitBlender, a simple file shredding application designed to securely erase your files and folders using various methods. This README will guide you through the setup and usage of the script.

Features ✨

  • Multiple Overwriting Methods: Choose from random data, Gutmann method, DoD 5220.22-M standard, Schneier's method, RCMP TSSIT OPS-II method, British HMG IS5 method, or a simple single-pass overwrite.
  • User-Friendly Interface: A Tkinter-based GUI with ttkbootstrap styling for an enhanced user experience.
  • Progress Tracking: Real-time progress updates and logging to keep you informed.
  • File and Folder Management: Easily add or remove files and folders for shredding.

Getting Started 🚀

Prerequisites

Ensure you have the following packages installed:

  • ttkbootstrap
  • pyperclip

You can install these packages using pip:

pip install ttkbootstrap pyperclip

Running the Application 💻

To run BitBlender, simply execute BitBlender.pyw.

Usage Instructions 📖

  1. Add Files/Folders: Use the "Add Files" or "Add Folder" buttons to select files or directories you wish to shred.
  2. Select Shredding Method: Choose a shredding method from the options provided.
  3. Start Shredding: Click the "Shred Files/Folders" button to begin the shredding process.
  4. View Logs: Monitor the shredding progress in the log section. You can copy or clear the log messages using the respective buttons.

Shredding Methods 🔒

Random Data Overwrite

  • Description: This method overwrites the file with random data for a specified number of passes. Each pass writes random bytes to the file, ensuring that the original data is thoroughly obscured.
  • Default Passes: 7
  • Use Case: This method is suitable for general-purpose file shredding where moderate security is required.

Gutmann Method

  • Description: The Gutmann method is a comprehensive data erasure technique that performs 35 passes of overwriting. It uses a combination of random data and specific patterns designed to obliterate the magnetic remnants of the original data.
  • Passes: 35
  • Use Case: Ideal for extremely sensitive data that needs to be irrecoverable, even with advanced forensic techniques.

DoD 5220.22-M Standard

  • Description: The Department of Defense (DoD) 5220.22-M standard specifies a 3-pass overwriting process: the first pass writes zeros, the second pass writes ones, and the third pass writes random data.
  • Passes: 3
  • Use Case: Suitable for military and governmental use, providing a high level of security.

Schneier's Method

  • Description: Developed by cryptographer Bruce Schneier, this method involves overwriting the file with specific patterns to ensure the data is thoroughly erased. Typically, it includes two passes: one with zeros and one with ones.
  • Passes: 2
  • Use Case: Effective for general use, providing a good balance between speed and security.

RCMP TSSIT OPS-II Method

  • Description: The Royal Canadian Mounted Police (RCMP) TSSIT OPS-II method uses two passes: the first pass writes ones and the second pass writes zeros.
  • Passes: 2
  • Use Case: Approved for use by the Canadian government, offering a reliable level of data security.

British HMG IS5 Method

  • Description: The British HMG Infosec Standard 5 (IS5) method involves a single pass of zeros to overwrite the file.
  • Passes: 1
  • Use Case: Suitable for less sensitive data where quick deletion is required.

Simple Overwrite

  • Description: This basic method performs a single pass overwrite with zeros. It is the fastest method but offers the least security.
  • Passes: 1
  • Use Case: Best for non-sensitive data where speed is more critical than security. Each method is designed to meet specific security requirements and can be chosen based on the sensitivity of the data and the level of security required. BitBlender provides flexibility by allowing users to select the method that best suits their needs.

Disclaimer 🛑

This application is provided as-is without any guarantees or warranties. While every effort has been made to ensure the reliability and security of the shredding methods, the developers assume no responsibility or liability for any data loss, damage, or system malfunction caused by the use of BitBlender. Use at your own risk.

Contributions 🤝

Feel free to contribute to this project by submitting issues or pull requests.

License 📄

This project is licensed under the MIT License. See the LICENSE file for details.