Cryptographic Erasure Platform

Provable Data Erasure. Cryptographically Verifiable.

ZeroTrace is a cryptographic erasure platform that transforms storage devices into verifiable, auditable, and irrecoverable states.

Cryptographically Verifiable Pluggable Engine Architecture ED25519 Signed Certificates Research-Grade IPAX Engine

Platform Overview

Built for verifiable destruction at scale

Erase Engines

Modular execution layer for multiple secure destruction strategies.

Certificate Engine

Generates signed, audit-ready proof artifacts after every operation.

Cryptographic State Engine

Tracks state transitions with verifiable hashing and attestation metadata.

Ledger System

Tamper-evident operation logs for independent verification workflows.

Plugin Architecture

Extend the platform with custom engines and enterprise integrations.

CLI & Automation

Scriptable interfaces for fleet-scale erasure and compliance pipelines.

Core Engine

IPAX: Cryptographic Erasure Engine

IPAX (In-Place Authenticated XChaCha20) transforms storage using authenticated cryptographic state transitions.

  • Per-chunk cryptographic transformation
  • State chain verification
  • Ledger-based attestation
  • Tamper-evident erase proof
  • Crash-safe recovery model

Modular Design

Pluggable Engine Architecture

ZeroTrace supports modular erase engines:

overwrite ipax secure erase crypto erase

Certificate Layer

Signed Erasure Certificates

ZeroTrace generates signed JSON certificates containing:

  • Device metadata
  • Engine used
  • Erasure proof
  • Cryptographic state hash
  • ED25519 signature

Workflow

From device to cryptographic proof

1

Discover device

2

Select engine

3

Execute transformation

4

Generate certificate

5

Verify proof

CLI

Automation-first operations

./zerotrace erase --device test.img --engine ipax

./zerotrace sign \
  --cert zerotrace_cert.json \
  --key zt_priv.pem

./zerotrace verify \
  --cert zerotrace_cert.json \
  --key zt_pub.pem

Use Cases

Trusted by high-assurance teams

Enterprise ITAD

Forensics labs

Cloud providers

Security researchers

Privacy professionals

Security Model

Verification-first cryptographic assurance

ZeroTrace binds erase execution to cryptographic state transitions, then signs the resulting certificate with ED25519. Independent verifiers can recompute state hashes, validate chain integrity, and confirm tamper-evident proof without trusting runtime logs alone.

Deploy provable erasure workflows today.